Skip to main content

Home/ Indie Nation/ Group items tagged surveillance

Rss Feed Group items tagged

John Lemke

New Zealand Launched Mass Surveillance Project While Publicly Denying It - The Intercept - 0 views

  • Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders.
  • Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key (pictured above), who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”
  • Snowden explained that “at the NSA, I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called ‘X KEYSCORE.”" He further detailed that “the GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB facility in Waihopai, and the Prime Minister is personally aware of this fact.”
  • ...4 more annotations...
  • Top secret documents provided by the whistleblower demonstrate that the GCSB, with ongoing NSA cooperation, implemented Phase I of the mass surveillance program code-named “Speargun” at some point in 2012
  • Over the weekend, in anticipation of this report, Key admitted for the first time that the GCSB did plan a program of mass surveillance aimed at his own citizens, but claimed that he ultimately rejected the program before implementation. Yesterday, after The Intercept sought comment from the NSA, the Prime Minister told reporters in Auckland that this reporting was referring merely to “a proposed widespread cyber protection programme that never got off the ground.” He vowed to declassify documents confirming his decision.
  • That legislation arose after it was revealed in 2012 that the GCSB illegally surveilled the communications of Megaupload founder Kim Dotcom, a legal resident of New Zealand. New Zealand law at the time forbade the GCSB from using its surveillance apparatus against citizens or legal residents. That illegal GCSB surveillance of Dotcom was followed by a massive military-style police raid by New Zealand authorities on his home in connection with Dotcom’s criminal prosecution in the United States for copyright violations. A subsequent government investigation found that the GCSB not only illegally spied on Dotcom but also dozens of other citizens and legal residents. The deputy director of GCSB resigned. The government’s response to these revelations was to refuse to prosecute those who ordered the illegal spying and, instead, to propose a new law that would allow domestic electronic surveillance.
    • John Lemke
       
      The Dotcom raid was ruled illegal.  Yet the Dotcom spying was exactly the type of activity of this plan.
  • n high-level discussions between the Key government and the NSA, the new law was clearly viewed as the crucial means to empower the GCSB to engage in metadata surveillance. On more than one occasion, the NSA noted internally that Project Speargun, in the process of being implemented, could not and would not be completed until the new law was enacted.
John Lemke

Report: NSA among worst offenders of mass surveillance, Snowden says - CNN.com - 0 views

  • "The world has learned a lot in a short amount of time about irresponsibly operated security agencies and, at times, criminal surveillance programs. Sometimes the agencies try to avoid controls," Snowden wrote, according to the news magazine. "While the NSA and GCHQ (the British national security agency) appear to be the worst offenders -- at least according to the documents that are currently public -- we cannot forget that mass surveillance is a global problem and needs a global solution."
  • A recent report by Der Spiegel, citing documents provided by Snowden, alleged the NSA monitored German Chancellor Angela Merkel's cell phone. Some reports also suggest the United States carried out surveillance on French and Spanish citizens.
  • "If he wants to come back and open up to the responsibility of the fact that he took and stole information, he violated his oath, he disclosed classified information -- that by the way has allowed three different terrorist organizations, affiliates of al Qaeda to change the way they communicate -- I'd be happy to have that discussion with him," Rogers said on "Face the Nation."
John Lemke

NSA reportedly 'piggybacking' on Google advertising cookies to home in on surveillance ... - 0 views

  • US surveillance agency may be using Google's advertising cookies to track and "pinpoint" targets for government hacking and location-tracking. According to Snowden's leaked presentation slides, both the NSA and the British equivalent, the GCHQ, are using a Google-specific ad cookie (know as "PREF") as a way of homing in on specific surveillance targets. While Google's cookie doesn't contain personal information like a name or email address, it does contain numeric codes that uniquely identify a user's browser.
  • The report notes that the NSA doesn't use this technique to find suspicious activity amidst the massive flood of internet communication that takes place every day — instead, it uses it to home in on targets already under suspicion.
John Lemke

It's Not Whether NSA Surveillance Helped Stop Any Plots, But Whether Or Not It Needed T... - 0 views

  • But, the bigger issue is that without presenting any actual evidence on these situations, it's impossible to know whether or not the NSA really needed this massive data collection to stop those "potential" plots. As we've already seen, in the one case where the NSA has said the programs were useful, it quickly became clear that they were not necessary, and traditional policework actually did the bulk of the effort in identifying the plot.
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • On Monday, Prime Minister John Key announced that he had requested an inquiry by the Inspector-General of Intelligence and Security after it was revealed that the Government Communications Security Bureau (GSCB) illegally intercepted the communications of individuals in the Megaupload case.
  • GCSB is an intelligence agency of the New Zealand government responsible for spying on external entities. It is forbidden by law from conducting surveillance on its own citizens or permanent residents in the country. Now it has been revealed that incorrect information supplied by the police’s Organized and Financial Crime Agency (OFCANZ) led the GCSB to spy on Kim Dotcom and Bram van der Kolk.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

Cambodia Wants Mandatory Surveillance Cameras In Internet Cafes | Techdirt - 0 views

  • All telecommunications operators, sales outlets and distributors are obliged to register their business at local authorities. Meanwhile, all locations serving telephone services and Internet shall be equipped with closed circuit television camera and shall store footage data of users for at least 03 months. Telephone service corporation owners along public roads shall record National Identity Cards of any subscriber.
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
John Lemke

Lawsuit Claims Accidental Google Search Led To Years Of Government Investigation And Ha... - 0 views

  • Jeffrey Kantor, who was fired by Appian Corporation, sued a host of government officials, including Attorney General Eric Holder, Director of National Intelligence James Clapper, CIA Director John Brennan, Defense Secretary Chuck Hagel and Secretary of State John Kerry in Federal Court, alleging civil rights violations, disclosure of private information and retaliation… He also sued Secretary of Energy Ernest Moniz, Acting Secretary of Homeland Security Rand Beers, Treasury Secretary Jacob Lew, EPA Administrator Regina McCarthy and U.S. Office of Personnel Management Director Katherine Archuleta.
  • "In October of 2009, Kantor used the search engine Google to try to find, 'How do I build a radio-controlled airplane,'" he states in his complaint. "He ran this search a couple weeks before the birthday of his son with the thought of building one together as a birthday present. After typing, 'how do I build a radio controlled', Google auto-completed his search to, 'how do I build a radio controlled bomb.'" From that point on, Kantor alleges coworkers, supervisors and government investigators all began "group stalking" him. Investigators used the good cop/bad cop approach, with the "bad cop" allegedly deploying anti-Semitic remarks frequently. In addition, his coworkers at Appian (a government contractor) would make remarks about regular people committing murder-suicides (whenever Kantor expressed anger) or how normal people just dropped dead of hypertension (whenever Kantor remained calm while being harassed)
  • Kantor also claims he was intensely surveilled by the government from that point forward.
    • John Lemke
       
      Our story begins with auto-complete and, once suspected, always monitored. has an interesting loophole. 
  • ...2 more annotations...
  • the law says that the timeline is based on when the citizen had a reasonable chance to discover the violation. Since the PRISM program was only declassified in July of 2013, these earlier violations should not be time-barred.
  • All in all, the filing doesn't build a very credible case and comes across more as a paranoiac narrative than a coherent detailing of possible government harassment and surveillance. Here are just a few of the highlights.
  •  
    Wait till you see how many and who are involved.
John Lemke

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
John Lemke

FBI pushes for surveillance backdoors in Web 2.0 tools - 0 views

  •  
    The FBI pushed Thursday for more built-in backdoors for online communication, but beat a hasty retreat from its earlier proposal to require providers of encrypted communications services to include a backdoor for law enforcement wiretaps. LUMPY HAS NOTES BELOW ties in with securirty and cyber attack.. use it as excuse
John Lemke

NSA reportedly targeted as many as 122 world leaders for surveillance | The Verge - 0 views

  • The documents, leaked to the publications by Edward Snowden, contain a list of 11 world leaders that have been targeted by a system known as Nymrod — however the document implies the actual number targeted was 122. Nymrod is reportedly a system designed to automatically extract citations ("cites") out of a multiplicity of sources, including voice and computer communications. German Chancellor Angela Merkel is listed by name, as are more obvious targets like Syrian president Bashar Asad and former Ukranian prime minister Yulia Tymoshenko. Various leaders apparently have "cites" automatically added to to a "Target Knowledge Database."
John Lemke

Boston Police Used Facial Recognition Software To Grab Photos Of Every Person Attending... - 0 views

  • Ultimately, taking several thousand photos with dozens of surveillance cameras is no greater a violation of privacy than a single photographer taking shots of crowd members. The problem here is the cover-up and the carelessness with which the gathered data was (and is) handled.
  • law enforcement automatically assumes a maximum of secrecy in order to "protect" its investigative techniques
  • The city claims it's not interested in pursuing this sort of surveillance at the moment, finding it to be lacking in "practical value." But it definitely is interested in all the aspects listed above, just not this particular iteration. It also claims it has no policies on hand governing the use of "situational awareness software," but only because it's not currently using any. Anyone want to take bets that the eventual roll out of situational awareness software will be far in advance of any guidance or policies?
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • Court documents have revealed how information supplied by New Zealand’s Organised and Financial Crime Agency led to Kim Dotcom and his associates being illegally monitored by GCSB, the Kiwi spy agency comparable to the United States’ CIA. Today a High Court judge expressed concern at the situation, with Dotcom’ legal team calling for an independent inquiry into the fiasco. Meanwhile, pressure continues to mount on Prime Minister John Key as it’s revealed the government issued an information suppression order.
  • According to court documents, GCSB checked with OFCANZ that both Dotcom and der Kolk were indeed foreign nationals. OFCANZ said they were, but in fact neither should have been spied on by GCSB. The monitoring went ahead anyway. In the High Court today, Justice Helen Winkelmann asked lawyers how it could be possible that GCSB hadn’t known about Dotcom’s New Zealand residency.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

Cutting the cord: Brazil's bold plan to combat the NSA | The Verge - 0 views

  • "The real danger [from] the publicity about [NSA surveillance] is that other countries will begin to put very serious encryption – we use the term 'Balkanization' in general – to essentially split the internet and that the internet's going to be much more country specific," Google executive chairman Eric Schmidt said at an event in New York this month. "That would be a very bad thing, it would really break the way the internet works, and I think that's what I worry about."
John Lemke

Why The Copyright Industry Is Doomed, In One Single Sentence | TorrentFreak - 0 views

  • In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
  • Therefore, as a society, we are at a crossroads where we can make a choice between privacy and the ability to communicate in private, with all the other things that depend on that ability (like whistleblower protections and freedom of the press), or a distribution monopoly for a particular entertainment industry. These two have become mutually exclusive and cannot coexist, which is also why you see the copyright industry lobbying so hard for more surveillance, wiretapping, tracking, and data retention (they understand this perfectly).
  • Any digital, private communications channel can be used for private protected correspondence, or to transfer works that are under copyright monopoly. In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
John Lemke

Snowden hints at new revelations of industrial espionage by the NSA | The Verge - 0 views

  • "I don't want to pre-empt the work of journalists," he said, "but there's no question the US is engaged in economic spying. If there's information at Siemens that they think would be beneficial to the national interests (not the national security) of the United States, they'll go after that information."
  • While evidence shows the NSA has spied on Brazil's Petrobras oil company, the US government has never been conclusively linked to the surveillance or theft of trade secrets on an international stage. If true, the revelations would have a grave diplomatic impact, particularly the government attempts to regain the trust of allied nations.
  •  
    Honestly, should we be shocked?
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
1 - 20 of 37 Next ›
Showing 20 items per page