63 posts tagged with snowden.
Displaying 1 through 50 of 63. Subscribe:

A Fiction About a Petition as a Poem, and Poets and Prizes and Pensées

Pardon Edward Snowden is not about Edward Snowden. A short story by Joseph O’Neill, in this week's New Yorker [more inside]
posted by Stanczyk on Dec 17, 2016 - 9 comments

The UK is watching you

While we have all been diverted by other things, Edward Snowden tweeted last week that "The UK has just legalized the most extreme surveillance in the history of western democracy. It goes farther than many autocracies."
He is referring to the Investigatory Powers Bill, also known as the Snooper's Charter, which has passed Parliament and is now set to become law in the UK. Here's a Wired overview.
ZDNet: "civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does".
Guardian: Extreme surveillance' becomes UK law with barely a whimper [more inside]
posted by vacapinta on Nov 23, 2016 - 51 comments

Yahoo secretly monitored email for US government

Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency (NSA) or FBI, said two former employees and a third person who knew about the programme. [more inside]
posted by Bella Donna on Oct 4, 2016 - 52 comments

A newspaper fit for burning.

Washington Post Makes History: First Paper to Call for Prosecution of its own Source (After Accepting Pulitzer).
posted by adamvasco on Sep 18, 2016 - 202 comments

Stone making _Snowden_

He didn’t recall pretending to strangle Poitras. How Oliver Stone's Edward Snowden movie came about, a shambling story of egos, deception, and geopolitics. (SLNYT) [more inside]
posted by doctornemo on Sep 5, 2016 - 14 comments

NSA malware released by "The Shadow Brokers"

Was the N.S.A. Hacked? A group calling itself The Shadow Brokers [Google cache], widely supposed to actually be Russian state-backed hackers, released an archive of purported NSA Tailored Access Operations/'Equation Group' malware, including zero-day exploits on commercial routers. NSA insiders confirm likely legitimacy. The archive dates to mid-2013, shortly after the Snowden revelations, leading him and others to ponder whether the resulting cleanup operation shut out the hackers. Schneier guesses the timing was meant to signal the Obama administration against sanctions for the DNC hack.
posted by p3on on Aug 17, 2016 - 51 comments

How the Pentagon punished NSA whistleblowers

Long before Edward Snowden went public, John Crane was a top Pentagon official fighting to protect NSA whistleblowers. Instead their lives were ruined – and so was his. [more inside]
posted by cosmic.osmo on May 22, 2016 - 16 comments

Citizen Journalists start your engines.

The Intercept is broadening access to the Snowden documents. Here´s why.
We encourage other journalists, researchers, and interested parties to comb through these documents, along with future published batches, to find additional material of interest. Others may well find stories, or clues that lead to stories, that we did not. A primary objective of these batch releases is to make that kind of exploration possible.
The Intercept’s first SIDtoday release.
posted by adamvasco on May 16, 2016 - 26 comments

I've been waiting 40 years for someone like you.

Edward Snowden: Whistleblowing Is Not Just Leaking — It’s an Act of Political Resistance
Whistleblowers are outliers of probability, and if they are to be effective as a political force, it’s critical that they maximize the amount of public good produced from scarce seed. [more inside]
posted by wonton endangerment on May 6, 2016 - 5 comments

No cutesy adversaries

“I think the post-war turn towards social responsibility in science and engineering was less a turn than a sideways glance. .. If researchers like us were actually supposed to know or care about this stuff in any operationally significant way, well, I think we didn't get the memo.   So let me retransmit it. - Phillip Rogaway. The Moral Character of Cryptographic Work. [more inside]
posted by jeffburdges on Dec 6, 2015 - 19 comments

Tweeting from a protest subjects you to enrollment in a police database

Your Social Media Posts Are Fueling the Future of Police Surveillance - Any posts on Facebook, Twitter, Instagram, or any other location-tagged social media uploaded in [an] area will appear on a display at police headquarters. An uploaded Vine from one block away could show someone running away, and give the cops a starting point for their investigation. How long until that hypothetical situation is a reality? “We’re 100 percent there,” says Lee Guthman, head of business development at Geofeedia, a location-based social media monitoring site.
posted by nevercalm on Nov 22, 2015 - 46 comments

The Drone Papers, from the Intercept

The Drone Papers-The Intercept has obtained a cache of secret documents detailing the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen, and Somalia. The documents, provided by a whistleblower, offer an unprecedented glimpse into Obama’s drone wars. [more inside]
posted by nevercalm on Oct 15, 2015 - 52 comments

I really did believe we were talking about Edward Scissorhands

Jon Hendren spent an entire segment talking about Edward Scissorhands instead of Edward Snowden. No one noticed.
posted by Windigo on Oct 2, 2015 - 59 comments

Of course I'd like to sit around and chat... but someone's listening in

Fresh from The Intercept (that fearless vanguard of journalism helmed by Glenn Greenwald and Laura Poitras): disturbing documents exposing the unfathomable reach of the United Kingdom's GCHQ in its quest for total awareness of global internet traffic. A hundred billion user actions logged per day. A "Black Hole" database of 1.1 trillion logs. Frightening programs like KARMA POLICE, MEMORY HOLE, and MUTANT BROTH that correlate the kilo-crore corpus -- IP addresses, cookies, forum posts, search histories, emails, and passwords all compiled and cross-referenced into a real-time "diary" that gives penetrating insight into the relationships, beliefs, and desires of every web user on the planet. Internal documents suggest only widespread encryption can threaten the regime -- a movement the UK is determined to subdue (previously). [more inside]
posted by Rhaomi on Sep 26, 2015 - 105 comments

This is the power of an informed public.

Edward Snowden believes there is reason to be hopeful about mass surveillance (SLNYT).
posted by andrewpcone on Jun 4, 2015 - 84 comments

whistleblowers and whistle in bronze, on tour

"Italian artist immortalizes Snowden, Assange and Manning with a statue honoring their courage in Berlin's Alexanderplatz." Anything to Say is now on tour. More pictures in this Berliner Zeitung article.
posted by wonton endangerment on May 1, 2015 - 28 comments

"I would want the dickpic program changed."

John Oliver explores the topic of government surveillance in the context of the June 1st deadline to reauthorize the Patriot Act and the ongoing Edward Snowden case.
posted by Kattullus on Apr 6, 2015 - 108 comments

The grim nightmare of successfully banning booze

Edward Snowden, Laura Poitras and Glenn Greenwald recently did an AMA on Citizenfour, their Oscar winning documentary about Snowden and the NSA scandal. Among the highlights is Snowden discussing the relationship between people and their governments and how enforcing the law too well actually can have severe drawbacks.
posted by Drinky Die on Feb 24, 2015 - 24 comments

Retired NSA Technical Director Explains Snowden Docs

"I had an opportunity to attend a presentation by retired NSA technical director, William Binney, which provided context for some of the published documents released by former NSA contractor, Edward Snowden. Because of the public value of Binney's expertise on the subject, I decided to publish his presentation and comments on my website." Via Bruce Schneier. (Previously: We Are Watching; Not My Department.)
posted by MonkeyToes on Oct 4, 2014 - 21 comments

The most wanted man in the world

Edward Snowden - The Untold Story, from Wired's Threat Level.
posted by nevercalm on Aug 13, 2014 - 103 comments

Snowden granted 3-year stay in Russia.

After several days in legal limbo, the world's most notorious whistleblower, Edward Snowden, has been granted a three-year stay in Russia. This is amid breaking news of Russia's issuing of a menu of its own sanctions against U.S./E.U. countries, et al. The former NSA employee has been stranded in Russia for more than a year. Recently, new leaks by other, as yet unknown whistle-blower(s) other than Snowden have surfaced, according to U.S. authorities. The leaks detail certain "rules" for targeting of people for surveillance (including merely searching for privacy software), as well as details on the kind of activity or relationships which may put innocent people on terrorist watch lists.
posted by fantodstic on Aug 7, 2014 - 54 comments

Fashion Solutions for Hiding from SkyNet

In Anti-Surveillance Camouflage for Your Face, technology reporter Robinson Meyer details an experiment in which he tried actually going about his day to day life in downtown Washington DC while wearing CV Dazzle, (previously on MeFi) makeup and hairstyles to confuse facial recognition software. The technique is inspired by the old naval technique of dazzle camouflage, which sought not to conceal a ship, but to confuse viewers as to its size and heading. Similarly, CV Dazzle aims to confuse software by making your face look less like a face and more like a confusing collection of shapes. This proves to have unanticipated effects on how Robinson is perceived by humans as well, leading to insights about how our appearance signals our privilege and place in the social hierarchy, and how that can overlap or conflict with the digital wakes we leave.
posted by Naberius on Jul 24, 2014 - 78 comments

NSA spies on mainstream muslim US citizens

In one of the most damning Snowden leaks yet revealed, Glenn Greenwald and Murtaza Hussain show that the NSA targets prominent Muslim-Americans under the FISA secret court program. The Office of the Director of National Intelligence has in response issued a denial that any Americans were targeted for exercising their constitutional rights via its tumblr.
posted by p3on on Jul 9, 2014 - 93 comments

NSA gathers more data from non-targeted people than we thought.

In Snowden’s view, the PRISM and Upstream programs have “crossed the line of proportionality.” [SLWAPO] [more inside]
posted by feckless fecal fear mongering on Jul 6, 2014 - 58 comments

spiegel has opened fire on the NSA

New NSA Revelations: Inside Snowden's Germany File [more inside]
posted by bukvich on Jun 19, 2014 - 48 comments

The Adventures of Snowdenbot

Inside Edward Snowden’s Life as a Robot. "Since he first became a household name a year ago, Edward Snowden has been a modern Max Headroom, appearing only as a face on a screen broadcast from exile in Hong Kong or Russia. But in the age of the telepresence robot, being a face on a screen isn’t as restrictive as it used to be." Indeed: Snowdenbot performs tele-diagnosis and offers aid to reporter who had first epileptic seizure. [more inside]
posted by homunculus on Jun 13, 2014 - 20 comments

``Wherever you are, you are equally within of the power of conqueror´´.

At the end of 2013 Eben Moglen (Metafilter Previously) gave a lecture in four parts ``Snowden and the Future´´ presented here in Audio, Video and Text:
Part I: Westward the Course of Empire.
Part II: Oh, Freedom.
Part III: The Union, May it Be Preserved.
Part IV: Freedom's Future.
From Al-Jazeera - A Timeline of the leaks.
From The Tow Centre - Journalism after Snowden. (scroll down for further links ).
From Foreign Affairs - How to Spy after Snowden.
posted by adamvasco on May 28, 2014 - 37 comments

NSA's SOMALGET recording every phone call in the Bahamas

The NSA is recording the audio of every phone call in the Bahamas and in another country which the article does not name "in response to specific, credible concerns that doing so could lead to increased violence." Previously
posted by Noisy Pink Bubbles on May 19, 2014 - 86 comments

Be it resolved state surveillance is a legitimate defence of our freedom

Alan Dershowitz and Michael Hayden (for); Glenn Greenwald and Alexis Ohanian against. Tonight. “I consider him and Alan Dershowitz” – the two men Mr. Greenwald, 47, will face at Friday’s Munk Debates – “two of the most pernicious human beings on the planet. I find them morally offensive. There’s an element of hypocrisy to being in the same room with them, treating them as if I have outward respect, because I don’t.” [more inside]
posted by whyareyouatriangle on May 2, 2014 - 282 comments

Codename: TURBINE. Your computer may already be owned.

Top-secret documents reveal that an elite unit at the National Security Agency has developed technology allowing it to automatically install malware on millions of computers worldwide in what it calls 'industrial-scale exploitation'. TURBINE, developed by the NSA's Tailored Access Operations unit (mentioned previusly here), is a command-and-control suite automating tasks that previously had to be performed manually: Using 'internet chokepoints' and a capability called SECONDDATE, the NSA can perform man-in-the-middle attacks to quietly redirect web browsers to FOXACID malware servers en masse.
posted by anemone of the state on Mar 12, 2014 - 115 comments

Snowden To Address Audience in First Live Q&A, Days After EU Testimony

The good news is that there are solutions. The weakness of mass surveillance is that it can very easily be made much more expensive through changes in technical standards: pervasive end-to-end encryption can quickly make indiscriminate surveillance impossible on a cost-effective basis. The result is that governments are likely to fall back to traditional, targeted surveillance founded upon an individualized suspicion. Governments cannot risk the discovery of their exploits by simply throwing attacks at every “endpoint,” or computer processor on the end of a network connection, in the world. Mass surveillance, passive surveillance, relies upon unencrypted or weakly encrypted communications at the global network level.

Edward Snowden submits written testimony to an EU committee investigating mass surveillance, and answers questions. The testimony takes place 3 days ahead of his highly anticipated SXSW appearance, to take place later today. Snowden is expected to speak about privacy, security, mass surveillance programs, free speech and whistle-blowing in a rare remote video appearance before a live audience.
Kansas Congressman Mike Pompeo finds this “deeply troubling” in a letter he's sent to the organizers of the conference.

Meanwhile, people who wish to #asksnowden questions can use the hashtag on Twitter. The talk is to take place at 12pm PT, today.
posted by fantodstic on Mar 10, 2014 - 89 comments

"Yahoo webcam images from millions of users intercepted"

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. "We were not aware of nor would we condone this reported activity," a Yahoo spokesperson says in a statement to The Verge. But...what about all the webcam sex?
posted by josher71 on Feb 27, 2014 - 39 comments

Psychology: A New Kind of SIGDEV

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.
posted by the young rope-rider on Feb 25, 2014 - 137 comments

Codename: ANTICRISIS GIRL

Top-secret documents published by The Intercept reveal how GCHQ and the National Security Agency have targeted Wikileaks and "the human network that supports Wikileaks", with tactics ranging from covert surveillance to prosecution, targeting The Pirate Bay and Anonymous, urging countries to file criminal charges against Julian Assange, and secretly logging visitors to the Wikileaks website. [more inside]
posted by anemone of the state on Feb 18, 2014 - 178 comments

Geo Cell: ‘We Track ’Em, You Whack ’Em.’

"The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people." - Scahill and Greenwald @ The Intercept [more inside]
posted by jeffburdges on Feb 10, 2014 - 77 comments

Liberalism, Libertarianism, and the Illiberal Security State

The defense of the illiberal activities of the actually-existing state cuts across superficial partisan lines, and the dominant political philosophy of both American parties is a venerable ideology of realpolitik imperial supremacy that deploys the rhetoric of liberalism as pacifying propaganda and recasts the completely mundane application of basic liberal-democratic principles–the kind at work in the activities of Wikileaks and Snowden–as irresponsibly adolescent, anarchical, and even libertarian (eww!) challenges to the very idea of the liberal state. “Liberal” apologists for the actually-existing criminal state spook actual liberals from the practice of actual liberalism by insinuating darkly that any doubts about the liberal legitimacy of the security state probably makes you a loathsome, possibly racist Paultard. Wil Wilkinson on why liberal critics of the "liberal" state seem "libertarian." [more inside]
posted by grobstein on Jan 21, 2014 - 49 comments

Plus ca change?

President Obama unveils new policy directives for the NSA. Full text of the speech. And for lols, here are some photos also from Slate.
posted by feckless fecal fear mongering on Jan 17, 2014 - 142 comments

The science-fiction part of the show is that the Machine is accurate

“Person Of Interest”: The TV Show That Predicted Edward Snowden
posted by Rustic Etruscan on Jan 14, 2014 - 57 comments

Digital Black-Bag Ops:

Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting. Jacob Appelbaum [AKA ioerror] reports on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers. While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.

At the 30c3 conference in Hamburg, Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation. Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted by such operations, as have his family members.
posted by anemone of the state on Dec 30, 2013 - 201 comments

For everyone out there listening

Edward Snowden has delivered the UK Channel 4's Alternative Christmas Message (alternative links, transcript):
Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.
This address follows Monday's interview with the Washington Post in which he explains his motives for releasing information he collected while working for the NSA.
posted by Joe in Australia on Dec 24, 2013 - 93 comments

RSA Paid by the NSA to screw the USA

"Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show." Previous
posted by stoneweaver on Dec 20, 2013 - 74 comments

Historic ruling: NSA Mass Phone Surveillance Likely Unconstitutional

A federal judge in Washington, DC ruled today that the mass phone records surveillance revealed by whistleblower Edward Snowden is likely unconstitutional. [previously on Metafilter] Judge Leon wrote: “The question before me is not the same question that the Supreme Court confronted in Smith” and is “a far cry from the issue in this case.” [annotated by Spencer Ackerman, original PDF here.]
Journalist Glenn Greenwald, who broke the story, responds on MSNBC.
posted by anemone of the state on Dec 16, 2013 - 87 comments

"People in power ... will routinely lie to their population,"

The Men Who Leaked The Secrets
To the likes of Brooks, Snowden was a disconcerting mystery; Glenn Greenwald, though, got him right away. "He had no power, no prestige, he grew up in a lower-middle-class family, totally obscure, totally ordinary," Greenwald says. "He didn't even have a high school diploma. But he was going to change the world – and I knew that." And, Greenwald also believed, so would he. "In all kinds of ways, my whole life has been in preparation for this moment," he says.
[more inside] posted by the man of twists and turns on Dec 10, 2013 - 46 comments

Games are an opportunity!

CIA, FBI and Pentagon spies have infiltrated online games including World of Warcraft, Second Life and Xbox Live games.
posted by xowie on Dec 9, 2013 - 67 comments

Cell Phones: Tracking Devices That Make Phone Calls

The NSA is gathering nearly 5 billion cell phone location records a day, allowing the agency to track the movement of individuals and map their relationships in ways that would have been previously unimaginable. The bulk collection feeds CO-TRAVELER, an analytic tool that lets analysts identify relationships by tracking people whose movements intersect, and look back in time to see where people have been. TL:DR? The WaPo has a quick video explaining CO-TRAVELER here. [more inside]
posted by anemone of the state on Dec 4, 2013 - 134 comments

NSA SEXINT

NSA SEXINT is the Abuse You’ve All Been Waiting For. According to documents revealed by whistleblower Edward Snowden, the NSA has been gathering records of online sexual activity and logging visits to pornographic websites as part of a proposed plan to blackmail and silence those advocating "radical" beliefs.
posted by anemone of the state on Nov 29, 2013 - 156 comments

EU plans new laws to limit transfer of data to the US

The Guardian reports on new rules designed to curb the transfer of data to the US, with fines running into billions. [more inside]
posted by Just this guy, y'know on Oct 17, 2013 - 31 comments

“No other institution would have hired Glenn Greenwald.”

Freedom of Information. The New Yorker looks behind the scenes at The Guardian under current editor Alan Rusbridger, including the investigation of the News of the World phone hacking scandal (previously), overseeing the release of US diplomatic cables obtained by Wikileaks (previously), and the continuing reporting on NSA material obtained by Edward Snowden (previously).
posted by figurant on Oct 10, 2013 - 47 comments

Snowden documents shed light on Shiban, Akbar, and Trojanov cases

New documents released by Glenn Greenwald from trove leaked by Edward Snowden show that the agency officially viewed arguments about 'due process' to be an 'adversary propaganda theme', listed alongside military threats to drones. [more inside]
posted by jeffburdges on Oct 1, 2013 - 80 comments

"He did away with the propaganda machine and did it for all of us"

(MeFi's own) Jacob Appelbaum receives Transparency International's (DE) 2013 Whistleblower Prize on behalf of Edward Snowden (statement from Snowden starts here) joined remotely by Glenn Greenwald.
posted by anemone of the state on Aug 31, 2013 - 24 comments

Page: 1 2