In one of the most damning Snowden leaks yet revealed, Glenn Greenwald and Murtaza Hussain show that the NSA targets prominent Muslim-Americans
under the FISA secret court program. The Office of the Director of National Intelligence has in response issued a denial
that any Americans were targeted for exercising their constitutional rights via its tumblr.
posted by p3on
on Jul 9, 2014 -
Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting.
Jacob Appelbaum [AKA ioerror] reports
on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers.
While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.
At the 30c3 conference in Hamburg,
Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities
and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation.
Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted
by such operations, as have his family members.
posted by anemone of the state
on Dec 30, 2013 -
Facebook, Google, Yahoo, Microsoft, Apple, LinkedIn and Aol have all teamed up to oppose
widespread government surveillance. In an open letter to the US president and members of congress, the companies urge
the government to reform
its digital spy apparatus.
reactions at the Guardian.
posted by brina
on Dec 9, 2013 -
How would you, as a junior analyst in S2C41, the branch of the Signals Intelligence Directorate, navigate the millions of records logged daily, in order to find the nugget to get you noticed?
“EVILOLIVE, MADCAPOCELOT, ORANGECRUSH, COBALTFALCON, DARKTHUNDER: the names are beguiling. But they don’t always tell us much, which is their reason for existing: covernames aren’t classified, and many of them – including the names of the NSA’s main databases for intercepted communications data, MAINWAY, MARINA, PINWALE and NUCLEON – have been seen in public before, in job ads and resumés posted online.” Daniel Soar sorts through the possibilities in the London Review of Books
, 24 Oct 2013. (See also William Arkin's blog on codenames) [more inside]
posted by zbsachs
on Nov 4, 2013 -
During my service in the Korean military, I worked for two years as special intelligence personnel for the NSA, learning first-hand how to extract information from defense targets. Now, as a designer, I am influenced by these experiences and I have become dedicated to researching ways to “articulate our unfreedom” and to continue the evolution of my own thinking about censorship, surveillance, and a free society.
ZXX is a disruptive typeface
designed by an ex-Korean intelligence officer to prevent automated text processing. ZXX Type Specimen Video
. Project site
offers a free download (.zip, 77 KB)
posted by Foci for Analysis
on Jun 22, 2013 -
Russell Tice, former NSA security analyst, just came on the Keith Olbermann show
revealing that the NSA's domestic surveillance programs were not only far greater in scope than formerly thought, but also were specifically targeted at journalists.
posted by dunkadunc
on Jan 22, 2009 -
to gather information about Americans' phone records
--... the NSA had approached the company (Qwest) about participating in a warrantless surveillance program to gather information about Americans' phone records.
...Nacchio's account, which places the NSA proposal at a meeting on Feb. 27, 2001, suggests that the Bush administration was seeking to enlist telecommunications firms in programs without court oversight before the terrorist attacks on New York and the Pentagon. The Sept. 11 attacks have been cited by the government as the main impetus for its warrantless surveillance efforts. ...
-- The Administration's crimes and illegal spying on all of us and Quest's punishment for not going along with their plans.
posted by amberglow
on Oct 13, 2007 -
Cheney Pushed U.S. to Widen Eavesdropping
In the weeks after the Sept. 11 attacks, Vice President Dick Cheney and his top legal adviser argued that the National Security Agency should intercept purely domestic telephone calls and e-mail messages without warrants in the hunt for terrorists, according to two senior intelligence officials.
posted by Postroad
on May 13, 2006 -
Bush administration signals intent
to invoke the obscure state secrets privilege
in order to stop the EFF
lawsuit against AT&T
, (previously discussed here
) for providing the NSA direct access all 312 terabytes
of its customers' telephone and internet traffic since 2001, (including those Good Vibrations charges you racked up).
In a nutshell, according to legal experts, invoking the privilege kills the judicial process dead: the courthouse doors are closed, and there's nothing but grownup stuff to see here; move along, kids.
posted by squirrel
on May 2, 2006 -
Was Gonzales truthful? Shortly after the warrantless eavesdropping program began, then-NSA Director Michael V. Hayden and Ashcroft made clear in private meetings that the president wanted to detect possible terrorist activity before another attack. They also made clear that, in such a broad hunt for suspicious patterns and activities, the government could never meet the FISA court's probable-cause requirement, government officials said.
So it confused the FISA court judges when, in their recent public defense of the program, Hayden and Attorney General Alberto R. Gonzales insisted that NSA analysts do not listen to calls unless they have a reasonable belief that someone with a known link to terrorism is on one end of the call. At a hearing Monday, Gonzales told the Senate Judiciary Committee that the "reasonable belief" standard is merely the "probable cause" standard by another name.
posted by caddis
on Feb 8, 2006 -
Evidence of a slippery slope continued: Newsweek
reports that White House counsel Steve Bradbury believes President Bush can order killings on US soil
as part of the Terrorist-Surveillance ProgramTM
. Meanwhile, while Attorney General Gonzales "lashes out" at the media and insists
that the TSPTM
is "not a dragnet that sucks in all conversation and uses computer searches to pick out calls of interest," the Washington Post reports
it's precisely that -- "computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, e-mails and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears" -- and has led to very few leads. (See also discussion of Arlen Specter and the legality of the TSPTM here
posted by digaman
on Feb 6, 2006 -
Hey Kids! Want to learn about how to spy on your friends? Do you like to snitch on your siblings? Here's a fun site
for you where the U.S. Government can start to let you know about the fun world of cryptography and violating the Fourth Amendment rights of your fellow citizens.
For you parents, check out the NSA's Responsible Citizen
page! Note the funny ellipses after the references to the Fourth Amendment and Government Oversight. Your tax dollars at work.
posted by Ironmouth
on Dec 24, 2005 -
"I learned this week
that on December 6, Bush summoned Times publisher Arthur Sulzberger and executive editor Bill Keller to the Oval Office in a futile attempt to talk them out of running the story
..." President Bush really
did not want journalists to reveal his NSA spying program against Americans [discussed here
.] And in yesterday's rare press conference
, the President said: "An open debate about law would say to the enemy, 'Here's what we're going to do.' And this is an enemy which adjusts... Any public hearings on programs will say to the enemy, 'Here's what they do. Adjust.' This is a war." Neocon guru William Kristol argues
that talk of Bush being an "imperial" president" is "demagogic" and "irresponsible" since "Congress has the right and the ability to judge whether President Bush has in fact used his executive discretion soundly." What is the role of "open debate" in a war against terror that may last for decades?
posted by digaman
on Dec 20, 2005 -
The New Hows and Whys of Global Eavesdropping
[book review: for access: "legion" "legion"
] Remember chatter? After 9/11, it was all over the news. For months, snatches of cellphone conversations in Karachi or Tora Bora routinely made the front page. Television newscasters could chill the blood instantly by reporting on "increased levels of chatter" somewhere in the ether. But what exactly was it? Who was picking it up, and how were they making sense of it?
Patrick Radden Keefe does his best to answer these questions and demystify a very mysterious subject in "Chatter," a beginner's guide to the world of electronic espionage and the work of the National Security Agency, responsible for communications security and signals intelligence, or "sigint." In a series of semiautonomous chapters, he describes Echelon, the vast electronic intelligence-gathering system operated by the United States and its English-speaking allies; surveys the current technology of global eavesdropping; and tries to sort out the vexed issue of privacy rights versus security demands in a world at war with terrorism.
posted by Postroad
on Mar 2, 2005 -