EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.16.13

NSA Roundup: Latest News in a Nutshell

Posted in News Roundup at 5:06 pm by Dr. Roy Schestowitz

Summary: December news about the NSA and its international partners

Tracking Devices (Also Known as Mobile Phones)

Embassies

  • NSA spies on Italians from roof of US Embassy in Rome, magazine reports

    The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country’s consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L’Espresso claimed Friday.

Obama

Canada

Drugs

  • The inept mind-control experiment that led to 20 years of CIA funding
  • If the NSA Could Hack Into Human Brains, Should It?

    Technology has changed the surveillance state in ways that the American public doesn’t yet understand, according to Joel F. Brenner, a former senior counsel at the NSA.

    “During the Cold War our enemies were few and we knew who they were. The technologies used by Soviet military and intelligence agencies were invented by those agencies,” he writes. “Today our adversaries are less awesomely powerful than the Soviet Union, but they are many and often hidden. That means we must find them before we can listen to them. Equally important, virtually every government on Earth, including our own, has abandoned the practice of relying on government-developed technologies. Instead they rely on commercial off-the-shelf, or COTS, technologies. They do it because no government can compete with the head-spinning advances emerging from the private sector, and no government can afford to try.”

Antivirus

Analysis/Overview

  • Looking back at NSA revelations since the Snowden leaks
  • Investigating the 9/11 Attacks. The NSA’s “Lone Wolf Terrorists” Justification for Mass Spying Is Nonsense

    But we want to focus on another angle: the unspoken assumption by the NSA that we need mass surveillance because “lone wolf” terrorists don’t leave as many red flags as governments, so the NSA has to spy on everyone to find the needle in the haystack.

    But this is nonsense. The 9/11 hijackers were not lone wolves.

  • Read This If You Want To Understand Just How Far The NSA Has Gone, And The Political Mess Behind It
  • The NSA is out of control and must be stopped

    The National Security Agency is breaking trust in democracy by breaking trust in the internet. Every day, the NSA records the lives of millions of Americans and countless foreigners, collecting staggering amounts of information about who they know, where they’ve been, and what they’ve done. Its surveillance programs have been kept secret from the public they allegedly serve and protect. The agency operates the most sophisticated, effective, and secretive surveillance apparatus in history.

  • Reform corporate surveillance

    The FSF issued the following statement in response to the recent open letter on government surveillance published by AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo.

  • Spying has its limits
  • We cannot afford to be indifferent to internet spying

    We’ve seen less than 1% of the NSA documents Edward Snowden took with him from his employer, Booz Allen. The whistleblower had been employed to consolidate training documents used to brief NSA agents and contractors on the full range of NSA programmes and sources, which gave him access to the intimate (and sometimes boastful) details of the NSA’s capabilities.

    The disclosures will keep coming, and they will be worse. The journalists handling the Snowden trove have taken extraordinary care to redact them in order to preserve the legitimate law-enforcement capabilities of western spy agencies, and there are certainly programmes of even grander sweep and more sensitive details that will take more time-consuming verification and caution before they can be disclosed.

  • Six months after NSA story broke, Snowden looks even more patriotic

    Six months ago this week, the Guardian and Washington Post published the first stories based on leaks from Edward Snowden. Since then, in what has become a steady drumbeat of revelations about the about the US National Security Agency other nations’ spy agencies, we’ve learned how utterly hostile our governments have become to our most fundamental rights in the post 9/11 world – but we’ve also seen the first genuine push-back by some of the people who have the power to make a near-term difference.

  • State surveillance of personal data: what is the society we wish to protect?

    What in principle would justify the scope of the surveillance revealed by the Snowden leak? Would it be enough, for example, if it could be shown that a specific potential act of terrorism had been prevented by, and could only have been prevented by, the full breadth and depth of what we now have learned is the playing field of the security services?

  • The year the NSA hacked the world: A 2013 PRISM timeline (Part I)

    On 20 May 2013, a diminutive and bespectacled computer specialist employed as a contractor by the American National Security Agency (NSA) boarded a plane to Hong Kong. He’d taken a leave of absence from work on the pretext of receiving treatment for his newly-diagnosed epilepsy, and bought a last-minute plane ticket at the airport, with no advance booking.

  • State of Deception

    Wyden told me, “The answer was obviously misleading, false.” Feinstein said, “I was startled by the answer.” In Washington, Snowden’s subsequent leaks created the most intense debate about the tradeoffs between national security and individual liberty since the attacks of September 11th. The debate will likely continue. According to Feinstein, Snowden took “millions of pages” of documents. Only a small fraction have become public. Under directions that the White House issued in June, Clapper declassified hundreds of pages of additional N.S.A. documents about the domestic-surveillance programs, and these have only begun to be examined by the press. They present a portrait of an intelligence agency that has struggled but often failed to comply with court-imposed rules established to monitor its most sensitive activities. The N.S.A. is generally authorized to collect any foreign intelligence it wants—including conversations from the cell phone of Germany’s Chancellor, Angela Merkel—but domestic surveillance is governed by strict laws.

  • Snowden Leaks Notwithstanding, It’s Business as Usual at the NSA Museum
  • Edward Snowden, the NSA, and the Never-Ending End of Privacy
  • Orwellian Obama

    Apologists for National Security Agency (NSA) espionage argue “national security!” But leaked NSA files show Washington spying to gain an advantage in economic negotiations and to keep a close eye not so much on terrorists as on political opponents and rivals.

  • NSA Whistleblower

    When the U.S. government figured that out, prosecutors came down hard, indicting him on multiple national security charges, including espionage, which, if convicted, could have earned him as much as 35 years in prison.

    But Thomas Drake stood his ground. The U.S. government’s case collapsed on the eve of his trial.

    In the process, he inspired Edward Snowden to follow his conscience, even if it meant breaking the law.

    Today, Thomas Drake is quick to point out that over-reaching government surveillance isn’t a U.S. problem alone. That countries such as Canada … with its Communications Security Establishment Canada (CSEC), is following Washington’s lead.

    Mr. Snowden’s leaks have revealed that Canada allowed the U.S. to conduct widespread surveillance in Canada during the G8 and G20 summits in 2010 … spying that was closely coordinated with CSEC. And there are allegations that CSEC conducted industrial espionage in Brazil by targeting the country’s Ministry of Mines and Energy last year.

Petitions/Actions

Sympathy

Sweden

  • It’s Becoming Clear That The NSA’s Nightmare Has Just Begun

    Second, on Thursday Swedish television reported that Sweden’s signals intelligence agency, the FRA, has been a key partner for the United States in spying on Russia and its leadership. A previous report said that Sweden is also a key partner of the GCHQ.

  • Swedes Shame the NSA With Gingerbread Data Center Spy Movie

    It’s probably the single most enjoyable comment on the year’s NSA spying scandal. And it’s certainly the strangest.

  • The UK government is working in a Snowden-free bubble

    Anyone who took the time to read the UK government’s latest update on its cybersecurity strategy could be forgiven for thinking that a man called Edward Snowden never existed.

    Most people who are even slightly plugged in to the world around them would agree, however, that we live in decidedly more interesting times for internet security and privacy than the document would have us believe. Not a day seems to have gone by since the summer without a new revelation of activities by the NSA or GCHQ that have gone just a little further than what most people find acceptable.

  • Who is behind the “people’s Intelligence apparatus”? On the Swedish collaboration with US spying

    I believe that there are some alternative answers to Sundberg’s quest, and that those are found 1) partly in main political parties of the Swedish establishment, and 2) partly in the economic-military establishment; 3) also the assisting role played by the Swedish state-owned media and MSM monopolies is paramount.

  • The Snowden Documents and Sweden with English subtitles

    After six months reporters Fredrik Laurin, Sven Bergman and Joachim Dyfvermark made contact with Glenn Greenwald who holds the documents that Edward Snowden leaked from American signal intelligence organization NSA. They made this report.

  • Sweden aids NSA-led hacking ops: report

Hungary

Bitcoin

Change

  • IETF Group Proposes Making Tor Anonymity an Internet Standard

    There continue to be many people around the globe who want to be able to use the web and messaging systems anonymously, despite the fact that some people want to end Internet anonymity altogether. Typically, the anonymous crowd turns to common tools that can keep their tracks private, and one of the most common tools of all is Tor, an open source tool used all around the world.

  • Edward Snowden to give evidence to EU parliament, says MEP

    British Conservatives oppose video appearance by NSA whistleblower, which Green MEP says could happen this year

  • EU parliament votes to invite Snowden to testify over NSA spying

    The European Parliament has voted to formally invite former NSA contractor and whistleblower Edward Snowden to provide official court testimony on NSA spying, in the face of overwhelming concern from conservative MEPs.

    European conservatives seemed reluctant to pay full attention to the possibility of the hearing on Wednesday. The European People’s Party (EPP), which is a conglomerate of center-right parties, had displayed a great deal of concern over the possibility of inviting Snowden for a hearing, suggesting that he could potentially throw the transatlantic trade agreement with the US into disarra

  • Who is monitoring the covert operations of the world’s spy agencies?

    Mission drift: our intelligence agencies are in danger of straying from their core purpose.

Australia

  • More whistleblowers emerge in Australia’s Timor spying scandal

    The Australian government’s moves to suppress further exposures of its surveillance operations suffered a blow yesterday when it was revealed that three more whistleblowers have given statements to the East Timorese government about the illegal installation of bugging devices in the walls of Dili’s cabinet offices. The bugging involved Australian Secret Intelligence Service (ASIS) agents posing as aid workers helping renovate Timorese government buildings.

  • Australian police to roll out ‘NSA-type’ surveillance tech by next year

    The Deep Packet Inspection technology is expected to go for a trial in February followed by a complete roll out in April

France

Legality

  • Op-Ed: Enough debate — Is NSA spying constitutional or not?

    Privacy is not negotiable. What I am sending and who I am sending it to is not the government’s business unless they have evidence that I am doing something illegal. The debate is over. The government’s lies have been exposed and the people have found that they do not like what it is doing. We’ve talked long enough. Now we need action.

Misc.

Virtual Worlds

Awards and Recognition

  • Pell Center names NSA spying program as 2013 Story of the Year

    The Pell Center for International Relations and Public Policy at Salve Regina University has named the unfolding saga of digital spying by the National Security Agency (NSA) as the 2013 “Story of the Year.”

  • Edward Snowden voted Guardian person of the year 2013
  • Shooting the Messenger

    There is a deeply misguided attempt to sacrifice Julian Assange, WikiLeaks, Chelsea Manning and Jeremy Hammond on the altar of the security and surveillance state to justify the leaks made by Edward Snowden. It is argued that Snowden, in exposing the National Security Agency’s global spying operation, judiciously and carefully leaked his information through the media, whereas WikiLeaks, Assange, Manning and Hammond provided troves of raw material to the public with no editing and little redaction and assessment. Thus, Snowden is somehow legitimate while WikiLeaks, Assange, Manning and Hammond are not.

    “I have never understood it,” said Michael Ratner, who is the U.S. lawyer for WikiLeaks and Assange and who I spoke with Saturday in New York City. “Why is Snowden looked at by some as the white hat while Manning, Hammond, WikiLeaks and Julian Assange as black hats? One explanation is that much of the mainstream media has tried to pin a dumping charge on the latter group, as if somehow giving the public and journalists open access to the raw documents is irresponsible and not journalism. It sounds to me like the so-called Fourth Estate protecting its jobs and ‘legitimacy.’ There is a need for both. All of us should see the raw documents. We also need journalists to write about them. Raw documents open to the world give journalists in other countries the chance to examine them in their own context and write from their perspectives. We are still seeing many stories based on the WikiLeaks documents. We should not have it any other way. Perhaps another factor may be that Snowden’s revelations concern the surveillance of us. The WikiLeaks/Assange/Manning disclosures tell us more about our war crimes against others. And many Americans do not seem to care about that.”

  • Hacktivists on Trial

    Prosecutors are warping the law to throw activist hackers like Aaron Swartz behind bars for years.

Branding

  • New US spy satellite features world-devouring octopus

    President Obama is out to put the public’s mind at ease about new revelations on intelligence-gathering, but the Office for the Director of National Intelligence can’t quite seem to get with the program of calming everyone down.

    Over the weekend, the ODNI was pumping up the launch of a new surveillance satellite launched by the National Reconnaissance Office. The satellite was launched late Thursday night, and ODNI’s Twitter feed posted photos and video of the launch over the following days.

Arizona

Cookies

Nigeria

Recruitment

  • NSA wooing students to work for US intelligence
  • The NSA Is Recruiting Teens

    The National Security Agency is hiring its spies early and recruiting teens as young as 15 for internships.

    Students who answer ads seeking aspiring journalists have the chance to work as paid interns for the NSA in Fort Meade, Md.

    The agency currently employs 500 young interns on staff, and according to an NSA spokeswoman in Newser, up to 95% of interns who want to stay on with the agency after their internships are able to do so.

Journalism

China/Distractions/Deflections

UK

Android/Gmail

New Zealand

IBM

Reform

Amnesty Claims/CBS

Very Recent

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email
  • Slashdot

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. IRC Proceedings: Wednesday, August 05, 2020

    IRC logs for Wednesday, August 05, 2020



  2. Release: Search Warrant and Reports on Findings When Bill Gates' Engineer Arrested for Pedophilia

    Readers can finally see all the details about what was taken (portable drives, laptop, desktop etc.) and what was found when a search was executed at the home of Bill Gates' engineer while he was at Bill's house (where he worked regularly); as far as we are aware, the police never searched Bill's house and computers



  3. Links 6/8/2020: FSF Has New Chief, LibreOffice 7.0, Linux App Summit Goes Online

    Links for the day



  4. Links 5/8/2020: Wayfire 0.5 and Plasma Browser Integration

    Links for the day



  5. IRC Proceedings: Tuesday, August 04, 2020

    IRC logs for Tuesday, August 04, 2020



  6. SUSE is Still Pushing Microsoft Proprietary Software and Bragging About the Novell Patent Collusion With Microsoft

    SUSE seems to have learned no lessons after the aftermath of its (or Novell’s) Microsoft patent scam, which had been negotiated partly by Miguel de Icaza (now working directly for Microsoft) before causing Novell to collapse and offload its patents to Microsoft (‘TikTok operandi’ or asset stripping); the past cannot be left behind if SUSE — like Novell — celebrates and perpetuates that past



  7. Release: 29 Pages of Internet Access Report About Pedophile Working for Bill Gates at His Home

    As we’ve found nothing too sensitive in the document, today we’re finally disclosing and publishing the second release (first one published yesterday); this includes network addresses used on the devices of the engineer of Bill Gates, who had a laptop and external hard drives (portable) with plenty of child pornography (imagery and videos)



  8. Links 4/8/2020: Kodachi 7.2, Collabora Office 6.4

    Links for the day



  9. [Meme] Nadella is Doing With Donald Trump What Ballmer Did With Elop and Icahn to Steal Other Companies (Nokia and Yahoo, Respectively)

    The illegal (attempted) confiscation of a Chinese company to distract from or compensate for Microsoft's collapse reminds us that Microsoft is only getting worse and more malicious under Nadella, who is happy to liaise with a hugely corrupt and racist regime



  10. We Don't Really Know How Many People Died With (or From) COVID-19 and How Many Will Die After Home Recovery or Release From Hospital

    The coronavirus pandemic that began last year as an epidemic (COVID-19) is still a very serious problem, even half a year after its widespread arrival in Europe; it's important to emphasise the importance of not down-playing this problem (which is far from solved) because social control media is full of junk



  11. IRC Proceedings: Monday, August 03, 2020

    IRC logs for Monday, August 03, 2020



  12. Release: Police Report About Arrest of Bill Gates Engineer for Pedophilia (Detained at Residence of Bill Gates)

    Today we release 15 pages (amongst almost 3,000 pages we have) about the Jones arrest; this includes details about what happened when the detectives came to the home of Bill Gates



  13. Bill Gates' Personal Engineer Rick Jones is Connected to Other Child Pornographers. One Key Contact Works (or Worked) Indirectly for Microsoft.

    MagicHour listed Microsoft among their clients, as we noted before, and the full (redacted for child porn reasons) name is Brett Paine. We had reached out to the employer (several of us, separately), but we never received any reply.



  14. Links 3/8/2020: Linux 5.8, GNU Linux-libre 5.8, Libinput 1.16, Rust 1.45.2, Julia 1.5

    Links for the day



  15. IRC Proceedings: Sunday, August 02, 2020

    IRC logs for Sunday, August 02, 2020



  16. [Meme] Is It Not a Layoffs Round When You Rebrand It?

    More and more Microsoft layoffs; but the media is hardly interested in reporting those and/or analysing the growing scale of the layoffs (about half a dozen rounds of layoffs this summer alone)



  17. IBM is Already Gutting Red Hat and Firing Employees Without Warning, Jim Whitehurst Isn't Even Using GNU/Linux

    The situation at Red Hat isn’t good, employee morale is very low, and yet — perhaps unsurprisingly — nobody seems to be talking about it (at least not in the mainstream media)



  18. Microsoft Lays Off Many More Workers in the Advertising Division/s and Terminates Products While the Press is Distracted by TikTok Rumours

    Microsoft is laying off a huge number of workers without properly reporting these and whilst exploring ways to divert attention away from those layoffs



  19. Links 2/8/2020: Wine-Staging 5.14, VokoscreenNG 3.0.5

    Links for the day



  20. IBM and the Bomb - Part VI: Diplomacy Replaced With 'Trade' (Money Over Politics), or How Watson Jr. Was Sold to the Public, in the Same Way His Father (IBM Co-founder) Sold His Business Relationship With Dictators Like Hitler

    Sometimes people are led to believe that corporations directly and indirectly run their country; judging by the events of 4 decades ago (IBM chief becoming the American representative in Russia/Soviet Union), this is hardly a new thing and it's not a myth, either



  21. IBM and the Bomb - Part V: Arms Control by Company That Profits From Nuclear Arms? World War II Mistakes Repeated?

    A decade after the end of the deadliest war his father died and two decades later he repeated the same mistake — the error of conflating business with politics, as if maximising revenue would miraculously achieve the best outcome for nations as well



  22. IRC Proceedings: Saturday, August 01, 2020

    IRC logs for Saturday, August 01, 2020



  23. Links 2/8/2020: Nitrux 1.3.1, Debian GNU/Linux 10.5 “Buster” and Wine 5.14 Released

    Links for the day



  24. [Meme] Privilege: When They're Born Into Money That Means They Know Everything About Anything

    Tens of thousands of nuclear weapons were in 'safe hands' because rich kid Tom was representing the United States in Russia (USSR at the time), having proven his skills by being born to the man who had met Hitler and made lots of money in the Third Reich



  25. IBM and the Bomb - Part IV: IBM's Watson Came Under Fire for Representing the U.S. in U.S.S.R./Russia With No Qualifications or Any Relevant Experience

    There was certainly resistance to "Mr. rich man" Watson Jr. becoming a US diplomat owing to privilege (born into the 'right' family) rather than experience and/or political track record, symbolising a sort of "revolving doors" phenomenon -- namely overlap between business and politics, or money and power, respectively



  26. IBM Loves Power (and Nuclear POWER, or Expensive OpenPOWER) More Than It Loves GNU/Linux

    As we noted last week, IBM is very close to Modi because it is moving a lot of its workforce to India and this can become a future liability to IBM’s reputation (or lack thereof) as a tolerant firm



  27. IBM and the Bomb - Part III: IBM's Watson Jr. Rose From Business V.I.P. to U.S. Ambassador in the Soviet Union During the Cold War (Which IBM Profited From)

    Like his father, who was IBM‘s co-founder and later president of the International Chamber of Commerce (ICC), which helped the Nazis, Watson Jr. entered US and international politics in his later days; recently-declassified documents show us his political legacy



  28. Donald Trump's Trash Against China Helps Prop up Microsoft Monopoly and Distract From All the Microsoft Layoffs

    Microsoft as a surveillance giant of the United States government isn’t a myth; it was first in the PRISM programme of the NSA (Bill Gates is a loud proponent of NSA surveillance), it took over European Skype under mysterious circumstances, and now it might be getting TikTok as a ‘gift’ from Donald Trump’s friends and the imperialists, in effect confiscating Chinese assets for full-spectrum dominance



  29. [Meme] Testosterone Patent Office

    When you're running an office that's barely diverse at all and you paint a misleading picture of it expect backlash



  30. The Criminals Who Run the EPO Are Exploiting Lesbian, Gay, Bisexual and Transgender People to Distract From Their Corruption and Crimes

    The misuse of social justice causes by corporate interests has become grotesque; more people ought to speak about the ramifications and object/work against this misuse, which mostly serves to obscure or distract from the biggest issues


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts