Archive

Posts Tagged ‘NSA’

NSA’s goal is elimination of individual privacy worldwide – Greenwald to EU

December 18, 2013 Comments off

rt.com

Glenn Greenwald (Reuters / Ueslei Marcelino)Glenn Greenwald (Reuters / Ueslei Marcelino)

The NSA’s ultimate goal is to destroy individual privacy worldwide, working with its UK sidekick GCHQ, journalist Glenn Greenwald warned an EU inquiry, adding that they were far ahead of their rivals in their “ability to destroy privacy.”

Greenwald, the former Guardian journalist renowned for publishing Edward Snowden’s leaks, criticized EU governments’ muted response to the revelations about the NSA’s mass espionage. Most governments reacted with “apathy and indifference” to reports that ordinary citizens were being spied upon, Greenwald said, pointing out that EU politicians only took action when they discovered that they themselves were being targeted.

“I think western governments have inculcated people to accept that privacy does not really have much value,” said Greenwald, adding it was “to get populations accustomed to violations of their privacy.”

Greenwald testified before the European Parliament’s Committee on Civil Liberties and Home Affairs via a video link, contributing to an inquiry into the NSA’s surveillance on Read more…

Categories: NSA Tags: , ,

NSA locates cell phones even when they are turned off

August 10, 2013 Comments off

EndtheLie.com

Reuters / Lucas Jackson
Reuters / Lucas Jackson

Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the NSA: a new report has revealed that the National Security Agency’s spy powers allow the government to grab location data on just about anyone.

In an article published by the Washington Post over the weekend, journalist Dana Priest detailed how one of the most secretive agencies administered by the United States government has expanded drastically in the decade-plus since the terrorist attacks of September 11, 2001. An increased demand for intelligence encouraged the development and implementation of surveillance tactics previous confined to the pages of science fiction, she wrote, and those tools today rival even what has already been unearthed by Read more…

Categories: Privacy Tags: , , ,

Is the U.S. Exaggerating the Terror Threat to Embassies to Silence Critics of NSA Domestic Surveillance?

August 6, 2013 Comments off

alternet.org

Is the U.S. Exaggerating the Terror Threat to Embassies to Silence Critics of NSA Domestic Surveillance?

Greenwald also discusses Reuters’ report on the Drug Enforcement Agency spying on Americans.

The Obama administration has announced it will keep 19 diplomatic posts in North Africa and the Middle East closed for up to a week, due to fears of a possible militant threat. On Sunday, Senator Saxby Chambliss, the top Republican on the Senate Intelligence Committee, said the decision to close the embassies was based on information collected by the National Security Agency. “If we did not have these programs, we simply would not be able to listen in on the bad guys,” Chambliss said, in a direct reference to increasing debate over widespread spying of all Americans revealed by Glenn Greenwald of The Guardian. “Nobody has ever questioned or disputed that the U.S. government, like all governments around the world, ought to be eavesdropping and monitoring the conversations of people who pose an actual threat to the United States in terms of plotting terrorist attacks,” Greenwald says. Pointing to the recent revelations by leaker Edward Snowden that he has reported on, Greenwald explains, “Here we are in the midst of one of the most intense debates and Read more…

Categories: GOVERNMENT Tags: , ,

U.S. directs agents to cover up program used to investigate Americans

August 6, 2013 Comments off

chicagotribune.com

A slide from a presentation about a secretive information-sharing program run by the U.S. Drug Enforcement Administration’s Special Operations Division (SOD)

WASHINGTON (Reuters) – A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of Read more…

Categories: Privacy Tags: , , ,

What does the future hold for the company whose visionary plans include implanting a chip in our brains?

August 6, 2013 Comments off

independent.co.uk

The power of computing, and the thrill of its apparently infinite possibilities, has also long been a source of fear.

Going into a San Francisco second-hand book shop, shortly before a visit to Google’s headquarters in California, I happened upon a copy of Dick Tracy, an old novel based on Chester Gould’s cartoon strip starring America’s favourite detective.

For a 1970 publication, the plot seemed remarkably topical. Dick, and his sidekick Sam Catchem, find themselves battling a sinister character known as “Mr Computer” who wants to control the world. His strange powers enable him to remember everything he hears or sees and recall it instantly. This is a bad guy who can store data, analyse voice patterns and read private thoughts.

My visit to the legendary “Googleplex” at Mountain View comes at an awkward time for the company. Edward Snowden’s revelations about the snooping of the Read more…

FBI can remotely activate microphones in Android smartphones, source says

August 3, 2013 Comments off

foxnews.com

The Wall Street Journal

FBI headquarters in Washington, D.C.

J. Edgar Hoover Building.jpgLaw-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.

Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links—techniques more commonly associated with attacks by criminals.

‘[The FBI] hires people who have hacking skill, and they purchase tools that are capable of doing these things.’

– a former official in the agency’s cyber division

People familiar with the Federal Bureau of Investigation’s programs say that the use of hacking tools under court orders has grown as agents seek to keep up with Read more…

Categories: Big Brother Tags: , , , ,

NSA Whistleblowers: NSA Collects ‘Word for Word’ Every Domestic Communication

August 3, 2013 2 comments

washingtonsblog.com

Anyone Who Says the Government Only Spies On Metadata Is Sadly Mistaken

PBS interviewed NSA whistleblowers William Binney and Russell Tice this week.

Binney is the NSA’s former director of global digital data, and a 32-year NSA veteran widely regarded as a “legend” within the agency.  Tice helped the NSA spy with satellites.

Binney and Tice confirmed that the NSA is recording every word of every phone call made within the United States:

[PBS INTERVIEWER] JUDY WOODRUFF:   Both Binney and Tice suspect that today, the NSA is doing more than just collecting metadata on calls made in the U.S. They both point to this CNN interview by former FBI counterterrorism agent Tim Clemente days after the Boston Marathon bombing. Clemente was asked if the government had a way to get the Read more…

Mexico and Canada declared part of US homeland by Senate maps (Video)

August 2, 2013 Comments off

rt.com

As an aide holds up a poster, U.S. Sen. Dianne Feinstein (D-CA) speaks during a hearing before the Senate Judiciary Committee July 31, 2013 on Capitol Hill in Washington, DC (AFP Photo / Alex Wong)As an aide holds up a poster, U.S. Sen. Dianne Feinstein (D-CA) speaks during a hearing before the Senate Judiciary Committee July 31, 2013 on Capitol Hill in Washington, DC (AFP Photo / Alex Wong)

Sen. Dianne Feinstein referred to the US, Canada and Mexico as “the Homeland” at an NSA Senate briefing on Wednesday, presenting a map that united the three nations as one.

At a Senate Judiciary Committee meeting held to acquire details on the National Security Agency’s mass surveillance programs, Sen. Feinstein (D-Calif.) made a geographic mistake in which she united three large countries into one. The error went by without comment during the briefing, but generated a significant response upon Read more…

XKeyscore: The NSA program that collects ‘nearly everything’ that you do on the internet

August 2, 2013 1 comment

extremetech.com

Where is NSA's XKeyscore located?If you were shocked by the NSA’s Prism program, hold onto your hat: The NSA also operates another system, called XKeyscore, which gives the US intelligence community (and probably most of the US’s Western allies) full access to your email, IMs, browsing history, and social media activity. To view almost everything that you do online, an NSA analyst simply has to enter your email or IP address into XKeyscore. No formal authorization or warrant is required; the analyst just has to type in a “justification” and press Enter. To provide such functionality, the NSA collects, in its own words, “nearly everything a typical user does on the internet.” Perhaps most importantly, though, it appears that HTTPS and SSL might not protect your communications from Read more…

We’re Watching You: Surveillance Expansion In the Land of the Free is Unprecedented In Human History

September 15, 2011 1 comment

shtfplan

Have you ever heard of a Yottabyte? To put this number into perspective consider the size of a terabyte, which is about the size of a typical modern hard drive. It can hold roughly 100 high definition DVD’s.

A yottabyte is 1,099,511,627,776 terabytes – or over 1 trillion terabytes of information.

This is important because according to a recent report from Politico, the National Security Agency (NSA), which is the security apparatus responsible for monitoring electronic communications across the globe, is building a new data warehousing center in Utah at the cost of $2 billion dollars. It will be housed in a one million square foot complex and be capable of storing at least one yottabyte of data.

We pointed out the various ways that the U.S. government is monitoring Read more…