Tag Archive: NSA


Government Claims EFF’s Lawsuits Don’t Cover Ongoing Surveillance – Raising Fears Key Documents May Have Been Destroyed

UPDATE: Judge White today continued his temporary restraining order in these two cases until a more permanent order could be put in place. The question of whether the government improperly destroyed evidence so far will be briefed over the next several weeks.

San Francisco – The Electronic Frontier Foundation (EFF) will fight disturbing new government claims in an emergency court hearing Wednesday – claims that may imply records documenting ongoing government surveillance have been destroyed despite a judge’s order.

Over the last several weeks, EFF has been battling to ensure that evidence of the NSA surveillance program will be preserved as part of its two cases challenging the illegal government spying: Jewel v. NSA and First Unitarian Church of Los Angeles v. NSA. But in a court filing late Monday, the government made shocking new assertions, arguing that its obligation to preserve evidence was limited to aspects of the original Bush-era spying program, which the government contends ended eight years ago with a transition to FISA court orders.

“This argument simply does not make sense. EFF has been demanding an injunction to stop this illegal spying program, regardless of the government’s shifting justifications,” said EFF Legal Director Cindy Cohn, who will argue in front of U.S. District Court Judge Jeffrey S. White at the hearing Wednesday. “But these government claims aren’t just nonsensical – they are extremely worrisome and dangerous. The government is suggesting it may have destroyed years’ worth of evidence about its illegal spying, justified by its own secret interpretation of our case. This is about more than just phone records; it’s about evidence concerning all of the government’s spying. EFF is asking the court for a full accounting of just what is going on here, and it’s time for the government to come clean.”

Read More Here

 

Enhanced by Zemanta
About these ads

 photo facebook-nsaspying_zpsd164f9c0.png

Desert Rose Creations  (C)  2014

…..

Snowden Docs Expose How the NSA “Infects” Millions of Computers, Impersonates Facebook Server

democracynow democracynow

Guests

Ryan Gallagher, reporter for The Intercept.

New disclosures from Edward Snowden show the NSA is massively expanding its computer hacking worldwide. Software that automatically hacks into computers — known as malware “implants” — had previously been kept to just a few hundred targets. But the news website The Intercept reports that the NSA is spreading the software to millions of computers under an automated system codenamed “Turbine.” The Intercept has also revealed the NSA has masqueraded as a fake Facebook server to infect a target’s computer and exfiltrate files from a hard drive. We are joined by The Intercept reporter Ryan Gallagher.

Transcript

This is a rush transcript. Copy may not be in its final form.

AMY GOODMAN: We turn now to our last segment, the latest on leaks from Edward Snowden. TheIntercept.org reported last week the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The Intercept also revealed the NSA has masqueraded as a fake Facebook server to infect a target’s computer and exfiltrate files from a hard drive.

Joining us now is Ryan Gallagher from The Intercept, co-wrote the piece, “[How] the NSA Plans to Infect ‘Millions’ of Computers with Malware.” Explain, Ryan.

RYAN GALLAGHER: Hi, Amy. Yeah, and the story we wrote last week, really, the key thing about it is the extent to which these techniques have really rapidly escalated in the last decade. And what we can see and what we reported was that, since about 2004, the National Security Agency has expanded the use of what it calls these “implants,” which are sort of malicious software implants within computers and computer networks, and even phone networks, to basically steal data from those systems. About 10 years ago, they had, they say, about a hundred and a hundred and—between a hundred and 150 of these implants, but within the last decade that expanded to an estimated 100,000, in some reports, and they’re building a system to be capable of deploying “millions,” in their own words, of these implants.

AMY GOODMAN: The revelation around the issue of Facebook has led Facebook founder Mark Zuckerberg to call President Obama on Wednesday and demand an explanation. He later wrote in a blog post, quote, “I’ve been so confused and frustrated by the repeated reports of the behavior of the US government. When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.”

RYAN GALLAGHER: Yeah, and Mark Zuckerberg was definitely very agitated, we think, about the report and seems to have got on the phone to Obama. And interestingly, the NSA later issued a—actually claimed that they hadn’t impersonated U.S. websites. However, their own documents actually say that they pretended to be the Facebook server for this particular surveillance technique, so their denial sort of doesn’t really hold up to scrutiny when compared with their own documents. And there’s a bit of sort of a—you know, there’s questions to be asked about that.

Read More Here

Enhanced by Zemanta

FULL: Edward Snowden and ACLU at SXSW

T Bert·

 

 

Published on Mar 10, 2014

Edward Snowden speaks about privacy and technology with the ACLU’s Ben Wizner and Christopher Soghoian at SXSW Interactive. -Links are below-

http://washingtonexaminer.com/edward-…

https://www.aclu.org/

https://www.aclu.org/time-rein-survei… – Main “Time to Rein in the Surveillance State
https://www.aclu.org/time-rein-survei… – Patriot Act Info
https://www.aclu.org/time-rein-survei… – FISA Amendments
https://www.aclu.org/time-rein-survei… – FISA Court Info

Edward Snowden warns of personal data vulnerability

The former NSA contractor takes part in a video conference at the South by Southwest tech event in Texas and answers questions via Twitter to an enthusiastic audience.

Edward Snowden

Former National Security Agency contractor Edward Snowden speaks remotely to the South by Southwest Interactive conference in Austin, Texas, superimposed over an image of the Constitution. (Spencer Bakalar / Los Angeles Times / March 10, 2014)

AUSTIN, Texas — Edward Snowden brought no bombshells when he arrived to an excited round of applause Monday, his stubbled face relaxed as it was beamed in from across the continents for a “virtual conversation” about the vulnerability of personal data. His presence was event enough.

Public appearances by the former National Security Agency contractor and U.S. exile are rare, and this one was beamed in from an undisclosed location in Russia via several online proxies for his own security, a bit of technological cloak-and-dagger that could only add to his mystique for the three roomfuls of international tech specialists struggling to hear his words in video that was choppy and often inaudible.

His message still got through: Personal information is vulnerable not only to government prying but to growing numbers of outside infiltrators because companies have failed to adequately protect the data of their customers. His own exile after leaking to reporters secret information he had gathered while an NSA consultant has made him a central figure in that conversation, and he says he has no regrets.

“Would I do it again? Absolutely,” Snowden said into the camera, in response to one of several questions submitted to him via Twitter (#AskSnowden) and screened backstage at the South by Southwest Interactive conference. “I took an oath to support and defend the Constitution. And I saw the Constitution was being violated on a massive scale.”

He warned, “If we allow the NSA to continue unrestrained, every other government will accept that as a green light to do the same.”

The chosen Twitter questions were notably nonconfrontational for a figure often the subject of heated debate even among supporters. One asked whether the mass surveillance was driven by privatization. Another wondered about the potential for society to “reap benefits” from the “big data.” None asked about his life in Russia, or what further revelations might be coming.

The first question came from Timothy John Berners-Lee, a British scientist known as the inventor of the World Wide Web, who asked Snowden how he would create an accountability system for governance.

Read More Here

 

…..

Edward Snowden discusses NSA leaks at SXSW: ‘I would do it again’

• Whistleblower patches in to Texas conference from Russia
• Snowden insists leaks have strengthened national security

Edward Snowden, the NSA whistleblower whose unprecedented leak of top-secret documents led to a worldwide debate about the nature of surveillance, insisted on Monday that his actions had improved the national security of the United States rather than undermined it, and declared that he would do it all again despite the personal sacrifices he had endured.

In remarks to the SXSW culture and technology conference in Texas, delivered by video link from his exile in Russia, Snowden took issue with claims by senior officials that he had placed the US in danger. He also rejected as demonstrably false the suggestions by some members of Congress that his files had found their way into the hands of the intelligence agencies of China or Russia.

Snowden spoke against the backdrop of an image of the US constitution, which he said he had taken an oath to protect but had seen “violated on a mass scale” while working for the US government. He accepted praise from Sir Tim Berners-Lee, the inventor of the world wide web, accorded the first question via Twitter, who described him as “acting profoundly in the public interest”.

The session provided a rare and extensive glimpse into the thoughts of Snowden, granted temporary asylum by Russia after the US revoked his passport. He struck back strongly against claims made again last week by the NSA director, General Keith Alexander, that his release of secret documents to the Guardian and other outlets last year had weakened American cyber-defences.

“These things are improving national security, these are improving the communications not just of Americans, but everyone in the world,” Snowden said. “Because we rely on the same standard, we rely on the ability to trust our communications, and without that, we don’t have anything.”

He added later that thanks to the more secure communication activity that had been encouraged by his disclosures, “the public has benefited, the government has benefited, and every society in the world has benefited”.

 

Read More Here

 

…..

Enhanced by Zemanta

• 1.8m users targeted by UK agency in six-month period alone
• Optic Nerve program collected Yahoo webcam images in bulk
• Yahoo: ‘A whole new level of violation of our users’ privacy’
• Material included large quantity of sexually explicit images
Yahoo webcam image.

The GCHQ program saved one image every five minutes from the users’ feeds. Photograph: Chris Jackson/Getty Images

Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of “a whole new level of violation of our users’ privacy“.

GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans’ images being accessed by British analysts without an individual warrant.

The documents also chronicle GCHQ‘s sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.

NSA ragout 4

 

Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.

The system, eerily reminiscent of the telescreens evoked in George Orwell’s 1984, was used for experiments in automated facial recognition, to monitor GCHQ‘s existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.

Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users’ feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ‘s servers. The documents describe these users as “unselected” – intelligence agency parlance for bulk rather than targeted collection.

One document even likened the program’s “bulk access to Yahoo webcam images/events” to a massive digital police mugbook of previously arrested individuals.

“Face detection has the potential to aid selection of useful images for ‘mugshots’ or even for face recognition by assessing the angle of the face,” it reads. “The best images are ones where the person is facing the camera with their face upright.”

The agency did make efforts to limit analysts’ ability to see webcam images, restricting bulk searches to metadata only.

However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display “webcam images associated with similar Yahoo identifiers to your known target”.

Optic Nerve was based on collecting information from GCHQ‘s huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA’s XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo’s webcam traffic.

Bulk surveillance on Yahoo users was begun, the documents said, because “Yahoo webcam is known to be used by GCHQ targets”.

NSA ragout 3

 

Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to “minimize”, or remove, domestic citizens’ information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.

 

Read More Here

Enhanced by Zemanta

MSN

Former intelligence contractor Edward Snowden poses for a photo during an interview in an undisclosed location in December 2013 in Moscow.

Students at the University of Glasgow elected former NSA contractor Edward Snowden as the official representative of the student body.

LONDON — Former National Security Agency contractor Edward Snowden was elected Tuesday as the official representative of the student body at the University of Glasgow.

Students at the institution say that they nominated Snowden to make a statement about democratic rights.

“We showed Edward Snowden and other brave whistleblowers that we stand in solidarity with them, regardless of where they are,” they said in a statement.

Read More Here

…..

Edward Snowden wins UK university role

Updated: 11:19, Wednesday February 19, 2014

Edward Snowden wins UK university role

Edward Snowden, the former US National Security Agency analyst who revealed US surveillance of phone and internet communications, has been elected rector of Glasgow University.

The analyst was nominated by a group of students at the Scottish institution who said they had received his approval through his lawyer.

The group said: ‘We are incredibly delighted to see Edward Snowden elected as the new rector of Glasgow University.’

The statement said the institution had a ‘virtuous tradition of making significant statements through our rectors’.

It added: ‘Our opposition to pervasive and immoral state intrusion has gone down in the records.

…..

Enhanced by Zemanta

S.C.G. News

Posted by S.C.G. February 12, 2014

Rather than grovel and beg for the U.S. government to respect our privacy, these innovators have taken matters into their own hands, and their work may change the playing field completely.

People used to assume that the United States government was held in check by the constitution, which prohibits unreasonable searches and seizures and which demands due process in criminal investigations, but such illusions have evaporated in recent years. It turns out that the NSA considers itself above the law in every respect and feels entitled to spy on anyone anywhere in the world without warrants, and without any real oversight. Understandably these revelations shocked the average citizen who had been conditioned to take the government’s word at face value, and the backlash has been considerable. The recent “Today We Fight Back” campaign to protest the NSA’s surveillance practices shows that public sentiment is in the right place. Whether these kinds of petitions and protests will have any real impact on how the U.S. government operates is questionable (to say the least), however some very smart people have decided not to wait around and find out. Instead they’re focusing on making the NSA’s job impossible. In the process they may fundamentally alter the way the internet operates.

1

Decentralized Social Media – Vole.cc

Anyone who was paying attention at all over the past several years knows that many of the top social media websites Facebook and Google have cooperated with the NSA’s surveillance program under PRISM, handing over the personal information that they’ve been hoarding over the years. Many of us have grown to despise these companies but continue to use their services due to the fact that no real competitors have presented themselves. Yes there are a few sites oriented towards the anti-government niche but nothing that has the potential of opening up the kind of reach that’s possible on Facebook or Google plus. The underlying problem here is that the server technology to run a site even a fraction of the size of Facebook is highly expensive, and to build and maintain a code base that can handle millions of users requires a full time team of highly skilled programmers. What this means is that anyone who wants to launch a real competitor to these sites would have needed to be well funded and have a sustainable business model. But what if someone came up with a system that removed the need for massive centralized servers? That’s just what vole.cc is working to accomplish. Vole.cc is a decentralized social media system in development based on bittorrent and Ember.js which completely cuts the server out of the equation and allows users to build social media networks without exposing their personal information to “authorities” or data mining companies.

2

Getsync Decentralized and Encrypted File Sharing – A Dropbox Alternative

With the revelations that data in Apple’s iCloud was available to the NSA as part of PRISM it has become clear that any centralized file sharing service is vulnerable, and any information that you upload to services like dropbox may end up being inspected by government agents. The folks at Bittorrent didn’t like that idea, so they decided to build a viable alternative, one that doesn’t depend on a centralized server at all and encrypts your data to make it difficult if not impossible to open without your permission. The service claims to already have amassed over 2 million users. Interestingly the vole.cc social media project uses Getsync to manage the social media data on your computer.

 

3

Decentralized & Encrypted Communications – Bittorrent Chat

Don’t like the fact that the NSA has been rummaging through your skype chats, emails and other instant messaging services? Well if you were a bit tech savvy you might have opted to set up your own mumble server or IRC channel, but this route will likely never be approachable for the average citizen and the reliance on a centralized server brings security vulnerabilities. However work is currently underway on a protocol that will completely remove the need for a centralized server and cut the NSA out of the loop entirely.

 

Read More Here

Enhanced by Zemanta

The//Intercept

By and 10 Feb 2014, 12:03 AM EST
Featured photo - The NSA’s Secret Role in the U.S. Assassination Program Credit: Kirsty Wigglesworth/Associated Press.

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.

“They might have been terrorists,” he says. “Or they could have been family members who have nothing to do with the target’s activities.”

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”

The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision.

In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.”

But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.

The NSA declined to respond to questions for this article. Caitlin Hayden, a spokesperson for the National Security Council, also refused to discuss “the type of operational detail that, in our view, should not be published.”

In describing the administration’s policy on targeted killings, Hayden would not say whether strikes are ever ordered without the use of human intelligence. She emphasized that “our assessments are not based on a single piece of information. We gather and scrutinize information from a variety of sources and methods before we draw conclusions.”

Hayden felt free, however, to note the role that human intelligence plays after a deadly strike occurs. “After any use of targeted lethal force, when there are indications that civilian deaths may have occurred, intelligence analysts draw on a large body of information – including human intelligence, signals intelligence, media reports, and surveillance footage – to help us make informed determinations about whether civilians were in fact killed or injured.”

The government does not appear to apply the same standard of care in selecting whom to target for assassination. The former JSOC drone operator estimates that the overwhelming majority of high-value target operations he worked on in Afghanistan relied on signals intelligence, known as SIGINT, based on the NSA’s phone-tracking technology.

“Everything they turned into a kinetic strike or a night raid was almost 90 percent that,” he says. “You could tell, because you’d go back to the mission reports and it will say ‘this mission was triggered by SIGINT,’ which means it was triggered by a geolocation cell.”

In July, the Washington Post relied exclusively on former senior U.S. intelligence officials and anonymous sources to herald the NSA’s claims about its effectiveness at geolocating terror suspects.

Within the NSA, the paper reported, “A motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’”

But the Post article included virtually no skepticism about the NSA’s claims, and no discussion at all about how the unreliability of the agency’s targeting methods results in the killing of innocents.

In fact, as the former JSOC drone operator recounts, tracking people by metadata and then killing them by SIM card is inherently flawed. The NSA “will develop a pattern,” he says, “where they understand that this is what this person’s voice sounds like, this is who his friends are, this is who his commander is, this is who his subordinates are. And they put them into a matrix. But it’s not always correct. There’s a lot of human error in that.”

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Bryant describes the program as highly compartmentalized: Drone operators taking shots at targets on the ground have little idea where the intelligence is coming from.

“I don’t know who we worked with,” Bryant says. “We were never privy to that sort of information. If the NSA did work with us, like, I have no clue.”

During the course of his career, Bryant says, many targets of U.S. drone strikes evolved their tactics, particularly in the handling of cell phones. “They’ve gotten really smart now and they don’t make the same mistakes as they used to,” he says. “They’d get rid of the SIM card and they’d get a new phone, or they’d put the SIM card in the new phone.”

As the former JSOC drone operator describes – and as classified documents obtained from Snowden confirm – the NSA doesn’t just locate the cell phones of terror suspects by intercepting communications from cell phone towers and Internet service providers. The agency also equips drones and other aircraft with devices known as “virtual base-tower transceivers” – creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge.

That, in turn, allows the military to track the cell phone to within 30 feet of its actual location, feeding the real-time data to teams of drone operators who conduct missile strikes or facilitate night raids.

The NSA geolocation system used by JSOC is known by the code name GILGAMESH. Under the program, a specially constructed device is attached to the drone. As the drone circles, the device locates the SIM card or handset that the military believes is used by the target.

Read More Here

Enhanced by Zemanta

- Jon Queally, staff writer

Not content to wait for action at the federal level, those opposed to the ongoing mass surveillance of the NSA and other agencies are speaking out and pushing laws at the state level to ensure privacy rights are protected. (Image: thedaywefightback.org)Concerned about the government’s increasing surveillance powers but unimpressed with the congressional response in Washington so far, state lawmakers from both major political parties are now taking it upon themselves to protect the online and communication privacy of their constituents.

Meanwhile, individuals and privacy groups are planning their own grassroots response to mass surveillance, hoping to repeat past victories by harnessing the power of digital communications to ensure they are adequately protected from government overreach.

As the Associated Press reports Wednesday, efforts are now underway “in at least 14 states are a direct message to the federal government: If you don’t take action to strengthen privacy, we will.”

According to AP:

Republican and Democratic lawmakers have joined in proposing the measures, reflecting the unusual mix of political partnerships that have arisen since the NSA revelations that began in May. Establishment leadership has generally favored the programs, while conservative limited government advocates and liberal privacy supporters have opposed them.

Supporters say the measures are needed because technology has grown to the point that police can digitally track someone’s every move.

Devices such as license plate readers and cellphone trackers “can tell whether you stayed in a motel that specializes in hourly rates, or you stopped at tavern that has nude dancers,” said David Fidanque, director of the American Civil Liberties Union of Oregon.

“It’s one thing to know you haven’t violated the law, but it’s another thing to know you haven’t had every one of your moves tracked,” he said.

Next week, on February 11, privacy advocates and online freedom groups are mobilizing against NSA and other government surveillance in a day of action they’ve dubbed ‘The Day We Fight Back.’

According to Katitza Rodriguez at the Electronic Frontier Foundation, one of the groups organizing the action, those participating will be demanding “an end to mass surveillance in every country, by every state, regardless of boundaries or politics.”

Galvanized by what they see as 13 Principles of internet and communication freedoms, activists will use the day to call attention to those goals, lobby on their behalf with their representatives, and declare an end to the encroaching, unaccountable, and unregulated surveillance apparatus.

“The Principles spellout just why mass surveillance is a violation of human rights,” explained Rodriguez, and they “give sympathetic lawmakers and judges a list of fixes they could apply to the lawless Internet spooks. On the day we fight back, we want the world to sign onto those principles. We want politicians to pledge to uphold them. We want the world to see we care.”

_______________________________

Enhanced by Zemanta

Prepper Podcast Radio Network

The seven ways to stop the NSA from gaining intel on you

Posted by James Smith on January 27, 2014

(or at least have to work REALLY hard for the data)

The seven ways to stop the NSA from gaining intel on you

By James Smith

28 Jan 2014

You cannot swing a dead cat without hitting a news story about the National Security Administration (NSA) finding ways to glean information about your personal life. From learning your sexual proclivity to your bank’s PIN, they seem to have an animalistic hunger for your personal details.

The information I am giving you is life changing. It offers freedom where there is captivity. And, believe it or not, actually works!

#1 Get rid of your smart phone.

Your smart phone is the first way the NSA has its claws into you. From your location to your banking info, which any rogue NSA agent can sell (think Edward Snowden with gambling debts), your smart phone is a liability.

Changing to a simple cell phone means you can’t keep up to date with your Facebook buddies, but that’s okay. They don’t like you anyways. And the NSA may be able to track your phone calls and location despite your best efforts. This is one way you can keep the NSA and local law enforcement wondering where you’ve been.

 Open the back of the cell phone and locate the GPS chip like these:

GPS chips 300x124 The seven ways to stop the NSA from gaining intel on you

And apply a hot soldering iron to the center for a few seconds. Repeat a few times. That will damage the chip to the point of being unreliable or inoperative.

One GPS website, in 2009 stated:

“This type of technology would also make these GPS tracking chips for children too. In fact, it would probably enable a future society to be able to know the exact location of every person in the world at the exact same time! If I wanted to get all 1984-esque, if there was a small microphone on the cell phone component then you would know where everyone in the world was and what they were talking about at any given moment. Now that would be something.”

They had no idea how accurate they were in their prognostication, however, the NSA was in full swing of knowing where people were by the GPS chips in their cell phones.

#2 Delete your Facebook Account

Actually, get rid of all your social media accounts. Facebook is losing more followers than President Obama, and Twitter is REALLY overpriced for the value they hold. If you must use social media – limit it to work issues only, such as current sales and special offers. Private information should stay private. No one, including the NSA, needs to know of problems in your personal life. Save that for #5 and $6.

Read More Here

Enhanced by Zemanta

NSA is after industrial spying – Snowden to German TV

Published time: January 26, 2014 09:44
Edited time: January 27, 2014 08:15

AFP Photo / Jim Watson

AFP Photo / Jim Watson

The NSA agency is not preoccupied solely with national security, but also spies on foreign industrial entities in US business interests, former American intelligence contractor, Edward Snowden, has revealed in an interview to German TV.

Edward Snowden chose the German ARD broadcaster to make his first TV interview ever since he became a whistleblower. The interview was made in strict secrecy in an unspecified location in Russia, where Snowden is currently living under temporary asylum.

“There is no question that the US is engaged in economic spying,” said Snowden.

If an industrial giant like Siemens has something that the NSA believes “would be beneficial to the national interests, not the national security, of the United States, they will go after that information and they’ll take it,” the whistleblower said, giving an example.

Reuters / Tobias Schwarz

Reuters / Tobias Schwarz

Edward Snowden disavowed participation in any future publications of the documents he withdrew from the NSA databanks, saying in the same interview that he no longer possesses any NSA data. The information has been distributed among a number of trustworthy journalists, who are going to decide for themselves what to make public and in what sequence.

The full 30-minute version was aired at 11pm local time (22:00 UTC) on Sunday.

The former NSA contractor’s revelations about US global spying activities, including snooping on its closest allies, put transatlantic ties “to the test,” said German Chancellor Angela Merkel last November and demanded that Washington give Germany clarity over the future of the NSA in the country.

Snowden’s revelation hit Berlin particularly hard because Germany is a non-Anglophone country, and therefore is not a member of the ‘Five eyes’ intelligence alliance that incorporates NSA-equivalent agencies in Britain, Canada, Australia and New Zealand, Deutsche Welle points out. While members of the ‘Five eyes’ were exchanging intelligence on a regular basis, Berlin had to consider itself satisfied with less data, while both Washington and London, for example, were blatantly listening to German Chancellor Angela Merkel’s cell phone right in the middle of Germany’s capital.

The Germans – according to polls – have lost confidence in the US as a trustworthy partner, and the majority of them consider NSA whistleblower Edward Snowden a hero.

Read More Here

…..

NSA’s big nose in big business: Snowden says agency spies on industry

RT

Published on Jan 27, 2014

The NSA agency is not preoccupied solely with national security, but also spies on foreign industrial entities in US business interests, former American intelligence contractor, Edward Snowden, has revealed in an interview to German TV. READ MORE: http://on.rt.com/4knl08

RT LIVE http://rt.com/on-air

…..

Enhanced by Zemanta
Follow

Get every new post delivered to your Inbox.

Join 1,503 other followers