Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
SWIM worked for a major computer chip manufacturer. He strongly believes that there are actually hardware level backdoors in selected server processor architectures including something called Xeon Chips. Have you read anything about this?. http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/
Breaking: Congress Passes Bill Giving Police Unlimited Access to Citizens’ Private Communications “One of the most egregious sections of law I’ve encountered during my time as a representative: It grants the executive branch virtually unlimited access to the communications of every American.” By Jay Syrmopoulos, The Free Thought Project In a sneak attack on the civil liberties of all Americans, the Intelligence Authorization Act for 2015 was rushed to the House floor with virtually no debate. http://thefreethoughtproject.com/br...ying-domestic-criminal-cases-focused-torture/
Electronic Frontier Foundation Statement on the 2015 Intelligence Authorization Bill On Wednesday of last week, the Intelligence Authorization Act of 2015 passed in the US House of Representatives. The bill, H.R. 4681, contains Section 309, which imposes guidelines for when the intelligence community can keep some communications collected under Executive Order 12333 (EO 12333). President Reagan wrote the policy document in the 1980s to provide the framework for intelligence agency conduct. Today, it is used to justify mass surveillance of communications. Congress showed that it is willing to tackle the mass spying conducted under EO 12333 by inserting Section 309 into the bill. It’s one of the first times Congress has publicly stood up to spying covered by the Executive Order. It's a good sign, but it doesn’t go nearly far enough. The bill must usher in more vigilant — and public — Congressional oversight of EO 12333 and other NSA spying activities. Unfortunately, the procedures in Section 309 reflect the current status quo: the over-collection, over-retention, and over-sharing of innocent users' communications. The procedures in Section 309 try to protect the communications of non-targets, but include massive loopholes. These loopholes do not grant any new authority, but they do allow the President to continue the egregious retention and sharing of innocent users' communication, which is a practice that must be stopped. While the language in Section 309 was taken from the Senate Intelligence Authorization bill (.pdf), the House did not take time to debate it. We’ve learned over the past year that, at a minimum, both Congress and the public need time to read these intelligence bills and understand their implications. Yet again, this didn't happen. And yet again, the American public is left without a voice on the surveillance laws used to collect their communications. Source: https://www.eff.org/deeplinks/2014/12/eff-statement-2015-intelligence-authorization-bill
If the Supreme Court tackles the NSA in 2015, it’ll be one of these five cases | Ars Technica How a church, terror suspects, and some lawyers are pushing privacy on the legal front. http://arstechnica.com/tech-policy/...-nsa-in-2015-itll-be-one-of-these-five-cases/
US Politicians Take Advantage of France Terror Attack to Call for More NSA Spying Following the abominable shooting of Parisian journalists at Charlie Hebdo, United States politicians and officials are predictably claiming that mass surveillance of citizens is the solution to terrorism. http://theantimedia.org/france-terror-more-nsa-spying/
In Historic Ruling, UK Surveillance Secrecy Declared Unlawful | The Intercept The United Kingdom’s top surveillance agency has acted unlawfully by keeping details about the scope of its Internet spying operations secret, a British court ruled in an unprecedented judgment issued on Friday. Government Communications Headquarters, or GCHQ, was found to have breached human rights laws by concealing information about how it accesses surveillance data collected by its American counterpart, the National Security Agency. The ruling was handed down by the Investigatory Powers Tribunal, a special court that handles complaints related to covert surveillance operations conducted by law enforcement and intelligence agencies. In its 15-year history, the tribunal has never before upheld a complaint against any intelligence agencies. The legal challenge was brought by human rights groups, including Privacy International and Liberty, following disclosures from NSA whistleblower Edward Snowden. The groups alleged that GCHQ was unlawfully obtaining data through the NSA’s online spying program PRISM, which collects data stored by Internet giants such as Google, Apple, Microsoft, and Yahoo. The groups also focused on GCHQ’s role in obtaining private communications swept up by the NSA directly from internet cables, known as so-called “upstream” collection. The court ruling against GCHQ found that by keeping the rules underpinning the surveillance secret, the agency had “contravened” the privacy and free expression provisions of the European Convention on Human Rights. The secret policies were released for the first time in December, meaning that until then GCHQ had been operating unlawfully, likely for several years. (GCHQ has had access to PRISM since at least 2010, according to reports based on Snowden documents.) The judges cited a previous ruling that stated laws must be publicly available and clear enough so that individuals have “adequate protection against arbitrary interference.” But they did not deem the surveillance itself to be an illegal invasion of privacy; it was only the secrecy shrouding it that they ruled a violation of human rights. Friday’s decision was therefore more of a victory for transparency than it was for online privacy. Eric King, deputy director of Privacy International, said the ruling showed spy agencies cannot justify mass surveillance using “secret interpretations of secret laws.” “For far too long, intelligence agencies like GCHQ and NSA have acted like they are above the law,” King said in a statement. “Today’s decision confirms to the public what many have said all along — over the past decade, GCHQ and the NSA have been engaged in an illegal mass surveillance sharing program that has affected millions of people around the world.” James Welch, legal director for Liberty, said that the group would continue its fight against GCHQ mass surveillance by taking a case to the European Court of Human Rights. Continued here: https://firstlook.org/theintercept/2015/02/06/surveillance-uk-gchq-unlawful-human-rights/
Did British Spies Use NSA Data to Spy on You? By Quinn Norton “There are few chances that people have to directly challenge the seemingly unrestrained surveillance state, but individuals now have an opportunity to finally hold GCHQ accountable,” said Eric King of Privacy International. https://medium.com/message/did-gchq-use-nsa-data-to-spy-on-you-a0cd75a34a5b
YAN https://twitter.com/YourAnonNews Interesting article: What it looks like when the NSA hacks into your Gmail and Facebook http://www.businessinsider.com/nsa-...ata-generated-by-the-camera-he-took-it-with-1 Another: https://motherboard.vice.com/read/email-provider-tutanota-linked-to-alleged-nsa-dumps-we-cant-help Snowden: http://uproxx.com/news/edward-snowden-nsa-hack/
My ruffle suffered a bit, but it's better now. I went to "camp." Most of us never leave the home and I was terrified. I suppose it's like people and their "oh noes that's too scary. 'camp" had a no phone rule and honestly, it was incredible. I'd take a 10 year old pillow fight over someone playing a game on me anytime.
A Twitter Account many are familiar with. Account has been continually tweeting found information Mustafa Al-Bassam @musalbas Aug 16 A comprehensive list of all exploits, implants and tools contained or referenced in the latest Equation Group dump: https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html …
Meant to add thread with ongoing updates. Same as above but here is op/otweet Mustafa Al-Bassam @musalbas I'm going to tweet about interesting things I've found in the new NSA/Equation Group dump in this thread. Retweets 136 Likes 169 3:47 PM - 15 Aug 2016
I was wondering today what the NSA would use to store all of their information? William Binney was speaking in an interview about a hypothetical small 20' x 40' building that could store all of the worlds metadata in stacks of 1TB thumb drives- and it made me think. In Citizenfour the film maker shows us several massive sites around the country in which NSA is constructing buildings full of servers to store all of our data. Could somebody who knows anything about economics or business look into trends in the private sector to see what company may be working with/for NSA, AND maybe this could lead to more proof of the collection of content, rather than this 'metadata' bullshit excuse.
All of your questions and much more are answered in the book Nowhere To Hide by Glenn Greenwald. The book tells the story of Glen Greenwalds interview with Edward Snowden in Hong Kong where he was accompanied by the film maker Laura Poitras and Guardian journalist Ewen MacAskill. Another book answering those same questions is The Snowden Files by Luke Harding, both books are an eye opener to say the least and worth spending the time and money to purchase them. If you want to know how much of your personal information is harvested by the NSA and other security agencies both in USA and in the United Kingdom of anywhere in the world then read these books. You'll be horrified at the amount of data collected and by whom ,and worse still how the law is flagrantly ignored or circumvented to justify the harvesting of information. Read the books starting with The Snowden Files first to gain some perspective then read Glenn Greenwalds book. You're in for the shock of your life.
And it's not the metadata you should be concerned about it's the worrying details like the fact your phone and laptop can be used to gather information about you in ways you never thought possible. And everything is harvested , every last thing.