10.16.13

Gemini version available ♊︎

NSA Roundup: New Evidence of Crimes, Greenwald Moves Towards Independence, and More

Posted in Action at 11:29 am by Dr. Roy Schestowitz

Summary: Newest stories about the NSA and its allies

THE NSA saga is far from over. There are new revelations all the time and the corporate press is trying to distract us by speaking about China [1] and Russia [2]. Don’t take this hypocritical bait.

As an MI5 whistleblower puts it, “US/UK spy chiefs cover up NSA surveillance scandal” [3] while Glenn Greenwald, a US citizen living in Brazil, finds independence by forming a new media outlet with help from eBay’s founder [4]. He will hopefully help nations which are victims of NSA espionage [5] without getting censored by The Guardian.

Tor, which is a project that came from the US military and is run by pseudonyms, is getting more attention from the NSA [6] and is becoming less safe to use [7], despite Edward Snowden’s promotion of it.

Snowden, the whistleblower who shamed the NSA, has his father visit him in Russia (despite or because of warnings about collaborations with the FBI) [8] and personal awards are being granted [9], with more possibly on the way [10]. Snowden is a hot target for the US government right now [11].

Richard Stallman has just published a long article about surveillance [12] and the EU Parliament, a famous victim of espionage managed by the NSA, is now turning its back on privacy [13,14].

Moves are being made to decentralise the US-centric Internet [15,16] as the NSA’s mischiefs go deeper and deeper [17,18], with complicity from US tech giants [19-22]. Lavabit is in the headline again, mostly for being the exception when it comes to selling customers down the river, only to be hunted down by the US government [23,24].

More interesting revelations come out of Britain, the US’ ally in espionage [25-28], with similar actions seen in Canada (also “Conservatives” [29]).

The NSA is fortunately having some growing pains [30]. The leaks can’t be helping Big Brother.

Related/contextual items from the news:

  1. China has more internet monitors than soldiers
  2. Russian embassy set up to intercept secrets: ASIO

    Russia used its embassy in Canberra to intercept Australian intelligence and political communications, targeting the capital’s main telecommunications tower, the Defence Department, Australian electronics firms and the Tidbinbilla space tracking station, according to confidential accounts of ASIO counter-espionage in the Cold War obtained by Fairfax Media.

  3. US/UK spy chiefs cover up NSA surveillance scandal

    The dis­par­ity in response to Edward Snowden’s dis­clos­ures within the USA and the UK is aston­ish­ing. In the face of right­eous pub­lic wrath, the US admin­is­tra­tion is con­tort­ing itself to ensure that it does not lose its treas­ured data-mining cap­ab­il­it­ies: con­gres­sional hear­ings are held, the media is on the warpath, and senior securo­crats are being forced to admit that they have lied about the effic­acy of endemic sur­veil­lance in pre­vent­ing ter­ror­ism.

    Just this week Gen­eral Alex­an­der, the head of the NSA with a long track record of mis­lead­ing lying to gov­ern­ment, was forced to admit that the endemic sur­veil­lance pro­grammes have only helped to foil a couple of ter­ror­ist plots. This is a big dif­fer­ence from the pre­vi­ous num­ber of 54 that he was tout­ing around.

    Cue calls for the sur­veil­lance to be reined in, at least against Amer­ic­ans. In future such sur­veil­lance should be restric­ted to tar­geted indi­vidu­als who are being act­ively invest­ig­ated. Which is all well and good, but would still leave the rest of the global pop­u­la­tion liv­ing their lives under the bale­ful stare of the US pan­op­ticon. And if the cap­ab­il­ity con­tin­ues to exist to watch the rest of the world, how can Amer­ic­ans be sure that the NSA et al won’t stealth­ily go back to watch­ing them once the scan­dal has died down — or just ask their best bud­dies in GCHQ to do their dirty work for them?

  4. Glenn Greenwald announces departure from the Guardian

    Journalist who broke stories about widespread NSA surveillance leaving to pursue ‘once-in-a-career journalistic opportunity’

  5. Glenn Greenwald to publish Snowden leaks on France and Spain
  6. Report: NSA has little success cracking Tor

    The agency has attacked other software, including Firefox, in order to compromise the anonymity tool, according to documents

  7. How the NSA identifies Tor users in 6 easy steps
  8. Snowden’s father arrives in Russia
  9. Snowden Accepts Whistleblower Award

    Though former NSA contractor Edward Snowden has been indicted for leaking secrets about the U.S. government’s intrusive surveillance tactics, he was honored by a group of former U.S. intelligence officials as a courageous whistleblower during a Moscow ceremony, reports ex-CIA analyst Ray McGovern who was there.

  10. Open letter by 23 European organisations in support of Snowden’s nomination for the Sakharov prize

    Today, 23 European non-governmental organisations released an open letter to the Conference of Presidents of the European Parliament in support of Edward Snowden’s nomination for the Sakharov Prize for Freedom of Thought 2013.

  11. Snowden: DOJ Won’t Prosecute Official For Lying, But Will Stop At Nothing To Persecute Someone For Telling The Truth
  12. Stallman: How Much Surveillance Can Democracy Withstand?

    The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use.

    Using free/libre software, as I’ve advocated for 30 years, is the first step in taking control of our digital lives. We can’t trust non-free software; the NSA uses and even creates security weaknesses in non-free software so as to invade our own computers and routers. Free software gives us control of our own computers, but that won’t protect our privacy once we set foot on the internet.

  13. Will EU Parliament Sacrifice our Privacy for Electoral Reasons?

    A crucial vote for EU Citizens fundamental right to privacy will take place on October 21st, in the “Civil Liberties” committee (LIBE) of the European Parliament. The future of the EU Regulation on the protection of individuals to the processing of their personal data will be decided by a vote on “compromise amendments”1. The rapporteur seems willing to request a mandate to enter closed-doors negotiations to severely cut short any chance of public debate. La Quadrature du Net calls on all citizens to contact the members of the LIBE committee to urge them to refuse this obscure hijacking of the democratic debate.

  14. [Video] Will EU Parliament Sacrifice our Privacy for Electoral Reasons?
  15. The US is losing control of the internet
  16. NSA Blowback Spreads to Internet Governance Organizations

    The unexpected disclosures of NSA activities by Edward Snowden presents a splendid example of U.S. government, as well as popular, indifference to world opinion. As part of its efforts to control the political damage of the embarrassing revelations, the Obama administration repeatedly stressed that only foreign nationals had been the targeted. As the breathtaking breadth of the data accessed and analyzed became clear, this rationale raised the question of how the foreign citizens – and even leaders – of U.S. allies might feel about being considered to be fair game for the NSA’s attention.

    The answer to that question is that they weren’t happy. Nor, as we will see, were a group of NGOs that had no reason to think they were targeted at all.

    Some foreign governments doubtless communicated their concerns privately through diplomatic channels. But others made their displeasure very public indeed. Brazil’s President Dima Rouseff, for one, cancelled a bilateral summit with President Obama after it was reported that her telephone calls and email had been intercepted. Late last week, she went a step further, announcing that Brazil will host a global summit to oppose U.S. surveillance.

  17. The NSA’s New Codebreakers

    But TAO doesn’t just spy on America’s rivals. In 2012, the group reportedly compromised the encryption system used by an important G8 country to transmit sensitive diplomatic communications via satellite to its embassies around the world. The same is true with a number of countries in the Middle East and South Asia, including Egypt, Syria, Iran, and Pakistan, although the details of these successes are not yet known. And finally, sources report that TAO has successfully compromised the privacy protection systems currently used on a range of 4G cell phones and hand-held devices, thanks in large part to help from a major American telecommunications company.

  18. NSA Has Spurred Renewed Interest In Thorough Security Audits Of Popular ‘Secure’ Software

    In yet another bit of fallout from the NSA surveillance efforts — and, specifically, the NSA’s covert takeover of security standards to insert vulnerabilities — it appears that there’s suddenly much more skepticism towards well-known security offerings. This is a good thing. There have already been some revelations concerning attempts to compromise Tor, and security researcher Matthew Green has now called for a thorough security audit of TrueCrypt, the (very) popular disk encryption tool. Green and some others have kicked off the project on the aptly named website IsTrueCryptAuditedYet.com.

  19. If the Internet were a game of Risk, Facebook and Google would be winning
  20. Tech titans’ muted response on NSA data mining
  21. Latest NSA revelation is black eye for Yahoo

    Yahoo plans to make encryption a default setting for all Yahoo Mail users in January — four years after rival Google took what is considered a basic security step.

  22. NSA collects millions of e-mail address books globally

    The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.

    The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.

  23. Meet Lavabit’s founder: An American hero hiding in plain sight
  24. Lavabit Case Shows Why We Need Tech Literate Judges

    While there’s plenty of attention being paid to Lavabit’s temporary re-opening for the sake of letting people export their accounts, a much more interesting issue is the recent development in the legal case. Lavabit has filed its latest brief, and there are some interesting discussions about the details of the case. From my reading, Lavabit makes a very strong argument that the government has no right to demand the production of Lavabit’s private SSL keys, as it’s an overreach way beyond what traditional wiretapping laws allow. Lawyer Orin Kerr’s analysis argues that Lavabit’s case is weak, mainly arguing that the federal government can subpoena whatever the hell they want, and just because it conflicts with your business model: too bad. Lavabit argues that complying with the government’s order is oppressive because it would effectively mean it would be committing fraud on all its customers…

  25. Interview on London Real TV
  26. The Empire Strikes Back

    Sir Andrew Parker, the recently elev­ated Dir­ector Gen­eral of the UK’s domestic secur­ity Ser­vice (MI5) yes­ter­day made both his first pub­lic speech and a super­fi­cially robust defence of the work of the intel­li­gence agen­cies. Read­ing from the out­side, it sounds all pat­ri­otic and noble.

  27. Snowden leaks: David Cameron urges committee to investigate Guardian

    David Cameron speaks during prime minister’s questions, where he said: ‘The plain fact is that what has happened has damaged national security.’ Photograph: PA

  28. Parliamentarians warn of ‘deliberate failiure’ to conceal GCHQ capability

    Shortly after Lord Macdonald, the former director of public prosecutions, condemned the way the new head of MI5 had dismissed calls for greater scrutiny several senior figures involved in the scrutiny of the draft communications data bill have said that Britain’s spy agencies may be operating outside the law in the mass internet surveillance programmes uncovered by Edward Snowden.

  29. Conservatives Set To Kill Growing VPN Industry
  30. Windows Becomes Freeware, Adobe Cracked & More…

    This week we were treated to the surprising news (not) that the NSA has been going after users of TOR. We also learned that the opening of the huge data center the agency is building in the Utah desert has been again delayed, this time due to power surges that have been burning out about $100,000 in equipment with each incident. Meanwhile, as more items revealed by Edward Snowdon are released, companies offering online anonymity find their business booming.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 25/1/2022: GPL Settlement With Patrick McHardy, Godot 4.0 Alpha 1, and DXVK 1.9.4 Released

    Links for the day



  2. Proprietary Software is Pollution

    "My daughter asked me about why are we throwing away some bits of technology," Dr. Andy Farnell says. "This is my attempt to put into words for "ordinary" people what I tried to explain to a 6 year old."



  3. Microsoft GitHub Exposé — Part XV — Cover-Up and Defamation

    Defamation of one’s victims might be another offence to add to the long list of offences committed by Microsoft’s Chief Architect of GitHub Copilot, Balabhadra (Alex) Graveley; attempting to discredit the police report is a new low and can get Mr. Graveley even deeper in trouble (Microsoft protecting him only makes matters worse)



  4. [Meme] Alexander Ramsay and Team UPC Inciting Politicians to Break the Law and Violate Constitutions, Based on Misinformation, Fake News, and Deliberate Lies Wrapped up as 'Studies'

    The EPO‘s law-breaking leadership (Benoît Battistelli, António Campinos and their corrupt cronies), helped by liars who don't enjoy diplomatic immunity, are cooperating to undermine courts across the EU, in effect replacing them with EPO puppets who are patent maximalists (Europe’s equivalents of James Rodney Gilstrap and Alan D Albright, a Donald Trump appointee, in the Eastern and Western Districts of Texas, respectively)



  5. Has the Administrative Council Belatedly Realised What Its Job in the European Patent Organisation Really Is?

    The "Mafia" which took over the EPO (the EPO's own workers call it "Mafia") isn't getting its way with a proposal, so it's preventing the states from even voting on it!



  6. [Meme] Team UPC is Celebrating a Pyrrhic Victory

    Pyrrhic victory best describes what's happening at the moment (it’s a lobbying tactic, faking/staging things to help false prophecies be fulfilled, based on hopes and wishes alone), for faking something without bothering to explain the legal basis is going to lead to further escalations and complaints (already impending)



  7. Links 24/1/2022: Scribus 1.5.8 and LXLE Reviewed

    Links for the day



  8. IRC Proceedings: Sunday, January 23, 2022

    IRC logs for Sunday, January 23, 2022



  9. [Meme] Team UPC Congratulating Itself

    The barrage of fake news and misinformation about the UPC deliberately leaves out all the obvious and very important facts; even the EPO‘s António Campinos and Breton (Benoît Battistelli‘s buddy) participated in the lying



  10. Links 24/1/2022: pgBadger 11.7 Released, Catch-up With Patents

    Links for the day



  11. The Demonisation and Stereotyping of Coders Not Working for Big Corporations (or 'The System')

    The war on encrypted communication (or secure communications) carries on despite a lack of evidence that encryption stands in the way of crime investigations (most criminals use none of it)



  12. On the 'Peak Hacker' Series

    Hacker culture, unlike Ludditism, is ultimately a movement for justice, for equality, and for human rights through personal and collective emancipation; Dr. Farnell has done a good job explaining where we stand and his splendid series has come to a close



  13. Links 23/1/2022: First RC of Linux 5.17 and Sway 1.7 Released

    Links for the day



  14. Peak Code — Part III: After Code

    "Surveillance perimeters, smart TVs (Telescreens built to Orwell's original blueprint) watched over our living rooms. Mandatory smart everything kept us 'trustless'. Safe search, safe thoughts. We withdrew. Inside, we went quietly mad."



  15. IRC Proceedings: Saturday, January 22, 2022

    IRC logs for Saturday, January 22, 2022



  16. Links 23/1/2022: MongoDB 5.2, BuddyPress 10.0.0, and GNU Parallel 20220122

    Links for the day



  17. A Parade of Fake News About the UPC Does Not Change the General Consensus or the Simple Facts

    European Patents (EPs) from the EPO are granted in violation of the EPC; Courts are now targeted by António Campinos and the minions he associates with (mostly parasitic litigation firms and monopolists), for they want puppets for “judges” and for invalid patents to be magically rendered “valid” and “enforceable”



  18. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  19. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  20. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  21. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  22. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  23. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  24. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  25. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  26. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  27. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  28. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  29. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  30. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts