Category Archives: Surveillance

Snowden Warns of Coronavirus Surveillance

I sense that this is going to get out of hand in a myriad of ways.  It is like throwing all the cards up in the air.  Perhaps the joker is the only one face up…

https://nypost.com/2020/03/30/snowden-coronavirus-pandemic-could-lead-to-extended-government-surveillance/

Snowden: Coronavirus pandemic could lead to extended government surveillance

NSA whistleblower Edward Snowden warned that the use of surveillance to track coronavirus cases during the pandemic could continue once the crisis subsides, according to a report.

“When we see emergency measures passed, particularly today, they tend to be sticky,” Snowden said in an interview with the Copenhagen International Documentary Film Festival, CNET reported. “The emergency tends to be expanded. Then the authorities become comfortable with some new power. They start to like it.”

Snowden, who released highly classified information from the National Security Agency, said governments could extend the access they have to monitor people’s personal information during a crisis.

During the coronavirus outbreak, governments could raise concerns about public health and send orders to smartphones and fitness trackers for information about pulse and heart rate.

Once the pandemic ends, they could raise other fears, like terrorism, and continue to gather the data.

“They already know what you’re looking at on the internet,” Snowden said. “They already know where your phone is moving. Now they know what your heart rate is, what your pulse is. What happens when they start to intermix these and apply artificial intelligence to it?”

The report said the US government is working with Facebook and Google to use location data to keep track of where coronavirus cases are concentrated.

Snowden fled to Russia after the Justice Department unsealed espionage charges against him in 2013.

Government Accessing Citizens Bank, Health and Phone Records

In the public interest.

https://www.dailymail.co.uk/news/article-5668983/amp/Shocking-government-plan-spy-citizens.html

‘They could turn on us’: Shocking government plan to access citizens’ bank statements, health data and phone records revealed by bombshell leaked letter

  • AFP and agencies need warrants from Attorney-General to spy on citizens
  • New proposal plans to let ministers give orders without top lawyer knowing
  • Government could collect data such as phone records and health information 
  • Plan was revealed by a leaked letter from Home Affairs Secretary Mike Pezzullo

Ministers are planning to make it easier for the government to spy on its own citizens, a leaked document has revealed.

As it stands, the Australian Federal Police and Australian Security Intelligence Organisation need a warrant from The Attorney-General to access Australians’ emails, bank records and text messages.

But ministers are reportedly planning to amend the Intelligence Services Act of 2001 to allow Home Affairs Minister Peter Dutton and Defence Minister Marise Payne to give the orders without the country’s top lawyer knowing.

Ministers are reportedly planning to amend the Intelligence Services Act of 2001 to allow Home Affairs Minister Peter Dutton (pictured) and Defence Minister Marise Payne to give spying orders without the country’s top lawyer knowing
Minister for Defence Marise Payne speaks to the media during a press conference at the Commonwealth Parliamentary Offices

The intelligence – which could include financial transactions, health data and phone records – would be collected by a government spy agency called the Australian Signals Directorate.

The plan was revealed by a leaked letter from Home Affairs Secretary Mike Pezzullo to Defence Secretary Greg Moriarty.

The top secret letter, written in February and seen by The Sunday Telegraph, details a plan to ‘hack into critical infrastructure’ to ‘proactively disrupt and covertly remove’ cyber-enabled criminals including child exploitation and terror networks.

Government Surveillance: 6 Things You Need To Know

In the public interest.

PRISM, Snowden and Government Surveillance: 6 Things You Need To Know

https://www.namecheap.com/blog/snowden-prism-surveillance/

By Lavanya Rathnam
— Last Updated: 19 Apr’17
2017-04-19T14:22:13+00:00

Edward Snowden, one of the most famous whistleblowers of our times, brought to light the many surveillance programs and other snooping activities of the U.S. government. This former intelligence officer revealed top secret documents to Glenn Greenwald of The Guardian and Laura Poitras, a freelance journalist, in May 2013 at a hotel in Hong Kong.

The many documents that he gathered from U.S. intelligence agencies like the NSA show the depth and breadth of surveillance programs that have been in place since 2007. It also showed the role of corporations, governments of other countries and lawmakers in furthering and legitimizing these surveillance programs.

Privacy enthusiasts, including us at Cloudwards.net, were shocked by some of these programs. Here’s a quick look into some of the surveillance schemes that Edward Snowden blew the whistle on back in 2013.

PRISM

Probably Snowden’s biggest revelation was concerning a program called PRISM, under which the National Security Agency (NSA) accesses emails, documents, photographs and other sensitive users’ data stored in major companies.

Documents leaked by Snowden show that Facebook, Google, Microsoft, Yahoo, PalTalk, AOL, Skype, YouTube and Apple give the NSA direct access to its users’ information. According to the documents, Dropbox also joined this list (one of the many reasons we recommend our readers stick with secure alternatives to this service).

PRISM was launched from the ashes of President George W. Bush’s domestic surveillance programs, which were abandoned due to lawsuits, disclosures in the media and widespread protest.

Due to past controversies, this program was given the legal go-ahead by the U.S. Congress when it passed the Protect America Act in 2007. Also, the FISA Amendments Act of 2008 gave legal immunity to private companies that cooperated voluntarily with U.S Intelligence agencies.

Microsoft became PRISM’s first partner in 2007 and the NSA began collecting vast amounts of data from its servers. Other companies joined the program in due course. In 2008, Congress gave the Justice Department authority to compel a reluctant company to “comply” with the needs of PRISM. This means that even companies that were not willing to join the program voluntarily had to do so at the behest of a court order.

This gave the NSA access to even more information. Soon, PRISM became a leading source of raw material for the NSA, as it accounted for one in every seven intelligence reports. PalTalk, for example, is much smaller when compared to the other companies on the list, but it provided substantial intelligence during the Arab Spring and the ongoing Syrian civil war.

Wiretapping

A court order shows that Verizon was ordered to provide the details of all calls, on a daily basis, to the NSA. This included calls that were made within the U.S. as well as between the U.S. and other countries.

This order was granted by the secret Foreign Intelligence Surveillance Court to the FBI on April 25, 2013. Under this order, Verizon has to provide the numbers of both parties on a call, location data, call duration, time of the call, International Mobile Subscriber Identity (IMSI) number and any other unique identifiers.

In addition, the court order explicitly forbids Verizon from disclosing to the public the existence of FISA order or this request from the FBI. The terms of this order complies with the “business records” provision of the Patriot Act.

A report in The Wall Street Journal shows that this court order was sent to AT&T and Sprint Nextel too. This arrangement with the country’s three largest phone companies means that the NSA gets a record of almost every call that is made.

To top it, some documents show that the NSA can crack cellphone encryption, so it can easily decode the content of intercepted calls and messages.

The report also states that the NSA made a similar arrangement with Internet service providers to obtain data about emails and browsing history of all individuals. A recent decision by the U.S. Senate will compound this breach of privacy by ISPs, as they will not just be working with the NSA but also with commercial third parties to sell customer data.

Besides wiretapping and ISP spying, credit card transactions are also cataloged and stored in NSA’s servers for analysis.

Tempora

The British intelligence agency, the Government Communications Headquarters (GCHQ) works closely with the NSA in a program called Tempora.

Under this program, GCHQ monitors the world’s phone and Internet traffic to gather information on emails, calls, facebook messages and browsing history by tapping directly into the transatlantic fiber optic cables that land on the shores of the UK. All this data and intelligence is shared with the NSA. In fact, more than 850,000 NSA employees and private contractors like Snowden had access to the GCHQ database.

A report shows that in 2012 alone, the GCHQ handled 600 million phone calls a day by tapping into 200 cables. Since each cable can carry 10GB of data per second, this agency had access to about 21 petabytes of data every day.

This collection is legal, as the Regulation of Investigatory Powers Act (RIPA) allows the GCHQ to collect information without a warrant. As a result, Tempora gives the British spying agency the “biggest Internet access” among a coalition called “Five Eyes,” which comprises Australia, Canada and New Zealand, besides the UK and the U.S.

Tailored Access Operations (TAO)

When the NSA is unable to break encryption codes, it uses an elite hacker team called Tailored Access Operations, or TAO for short. This team hacks into computers worldwide and infects them with malware to access the computer’s stored content.

The NSA is believed to use this tactic when it needs detailed information on a specific target or when it’s unable to break an encryption code.

Dishfire

Another surveillance program called Dishfire collects almost 200 million text messages from across the world and uses them to extract data such as location, contact networks and credit card details.

Using this information, the NSA could extract people’s travel plans, financial transactions and more. In addition, another program called “Prefer” conducts an automated analysis of these text messages on all individuals, even those who were not under the suspicion of any illegal activity.

For example, on an average, the NSA was able to extract information related to 1.6 million border crossings and over 800,000 financial transactions through text-to-text payments using “Prefer.”

SOMALGET

The NSA is intercepting, recording and storing all calls made in the Bahamas under a program called SOMALGET, a top-secret program that is implemented without the knowledge or consent of the Bahamian government.

A report by The Intercept showed that the U.S. Drug Enforcement Administration opened a backdoor to the country’s cellular network, thereby giving the NSA covert access to all mobile calls. In fact, SOMALGET is a cutting-edge tool that allows the NSA to store the actual content of every conversation, not just the metadata.

This program is a part of a larger program called MYSTIC, under which the U.S is secretly monitoring the telecommunication systems of other countries like Mexico, the Philippines and Kenya.

The NSA is using MYSTIC to gather personal data on mobile calls placed in countries that have a population of more than 250 million people. It is gaining access to these networks through the interception mechanism covertly installed by American companies that operate in these countries. According to some classified documents, the agency is seeking more funding to expand its surveillance program to other countries.

Final Thoughts

From the above facts it’s clear that the NSA is keeping a constant watch over your activities. With the help of large corporations and lawmakers, the government knows every little thing you do. Even information you access, store and use is recorded in NSA’s facilities, thereby giving you little to no privacy in your everyday life.

Such programs show how surveillance practices have shifted from individual suspicion in favor of a large and systematic practice of collecting mass data. Given this, the onus is on you to protect your privacy in a methodical way.

Sign up for our newsletter
to get the latest on new releases and more.

Thankfully, people who take their privacy seriously have a host of ways to protect it: from VPN services (we’d recommend reading our ExpressVPN review in that case) to secure providers of cloud storage and online backup. Some privacy tools are free, making keeping your data safe something anyone can do regardless of financial situation.

What do you think about the government and corporations spying on us? Let us know in the comments below, thank you for reading.

Is Domestic Surveillance Legal? What do YOU Think?

Surveillance and visibility is in the public interest.

The same discussion applies to Australians under surveillance. The question would be – is Pine Gap (US facility) and other intel operators surveilling Australians?

Snowden, PRISM, and Surveillance: an Aftermath

In the wake of Edward Snowden’s leaked information about government surveillance activities, Congress passed a law restricting some of the actions of US intelligence agencies. This law, known as the USA Freedom Act, was a valiant attempt to rein in excesses of the National Security Agency (NSA).
As part of Internet Privacy week, Namecheap is exploring different topics relating to online privacy. Below we’ll examine the USA Freedom Act and what it accomplished, as well as what still needs to be done to protect American privacy rights.

What is the USA Freedom Act?

The USA Freedom Act was signed into law by President Barack Obama on June 2, 2015.
It is a modified reauthorization of the USA Patriot Act and was passed in response to the leak of classified documents by Edward Snowden exposing details of various government surveillance programs.

Domestic Surveillance and PRISM

As we explored in the article Why Edward Snowden Matters, we now know a great deal more about US surveillance efforts thanks to the actions of a young NSA contractor.

In 2013, Edward Snowden’s concerns over US surveillance activities led him to release thousands of documents exposing the United States’ and several of its allies’ efforts to spy on their own citizens. In particular, Snowden’s leaks revealed that the National Security Agency and other intelligence agencies were monitoring domestic communications using a program known as PRISM.
Isolated monitoring cameras
PRISM enables the NSA to obtain data from multiple private Internet companies, including the content of emails and instant messages, photographs, and videos. Furthermore, the NSA created a system for cataloguing the surveillance data it has collected, ominously known as Boundless Informant, and used data mining procedures to analyze all of the records.
PRISM and Boundless Informant are able to track and record nearly every aspect of people’s online activity without obtaining a warrant. The NSA has reportedly been able to collect contact lists from private email accounts all over the world, search the content of email messages sent into and out of the U.S., and track the location of cell phones anywhere in the world.

The NSA Bulk Collection Program

These surveillance programs were created to collect information on people outside the United States, but the Snowden leaks also revealed that many of the NSA’s activities are directed at U.S citizens. For example, a “bulk collection program” by the NSA involved the collection of massive amounts of telecommunication metadata for telephone calls within the U.S.
This metadata does not include the actual content of a call, like a wiretap might provide. Instead, it includes information like phone numbers and the time and duration of calls.
Even without the substance of the call, the sheer volume of information collected by the NSA through this program gives it an unprecedented ability to track people’s interactions and movements.

Is Domestic Surveillance Legal?

Yes and no.

icons relating to surveillance
.

The NSA claimed the authority to collect telecommunication metadata in bulk through Section 215 of the Patriot Act, the sweeping national security law passed by Congress shortly after the September 11, 2001 terrorist attacks. This clause gave the federal government broad authority to obtain a wide range of information, including “books, records, papers, documents, and other items,” with very little oversight.
However, the law states that the law may not be used against U.S. citizens who are exercising their First Amendment rights. This led to numerous critics arguing that the NSA routinely exceeded its authority, such as by:
  • Collecting records of nearly every telephone call made within the United States during periods lasting weeks or longer; and
  • Using the PRISM program to obtain massive amounts of information about email, text, and other communications from internet and telecommunications companies, all without search warrants

What Does the USA Freedom Act Do?

The success of the USA Freedom Act gave privacy advocates reason to cheer, but they remain wary.
While the law effectively eliminated the statutory provision used by the NSA to justify its bulk metadata collection program, ending one type of domestic surveillance, there are other laws that still allow for domestic surveillance.

woman on smartphone
.

For example, the Reagan-era Executive Order 12333 authorizes the collection of telephone and electronic communications in other countries by U.S. intelligence agencies. Domestic surveillance was never the intent of this order. Still, it reportedly allows the NSA to capture information about communications that take place within the U.S., once again without a warrant, if the communication is stored on servers in other countries.
In a recent positive development, a federal court sided with Microsoft in its refusal to comply with an FBI subpoena for communications records stored on servers in Ireland.
Several other federal laws could still allow the NSA to resume surveillance on American citizens. For example, Section 702 of the Foreign Intelligence Surveillance Act (FISA) potentially allows mass surveillance of domestic communications. FISA is up for reauthorization in 2017.

Protect Your Privacy

Despite efforts across the globe, Internet privacy remains elusive. Because so much of the NSA’s activities happen outside of public (or even Congressional) scrutiny, Americans and people all around the world must continue to push for transparency and fairness, and to demand a balance between privacy and security.
It requires, in the words of Thomas Jefferson, “eternal vigilance.”

Remain Vigilant

Join Namecheap in the call to strengthen laws and policy dealing with Internet privacy.  
With Internet Privacy Week (Oct. 18-24), we will offer more information about government surveillance as well as how private companies track your data.
By signing our Internet Privacy Bill of Rights we encourage you to take a stand for Internet privacy for all.
Follow Namecheap on Twitter and Facebook and sign up for our newsletter (in the sidebar) to learn more about Internet Privacy Week and how you help hold companies accountable for privacy.


David C. Wells is an Austin, Texas-based writer and blogger. He was a lawyer for nine years, and while he no longer practices law, the experience helped make him a better writer. Also, he still sometimes gets to play a lawyer on the Internet. David is also a dog caretaker, an improviser and actor, an avid comic book reader, and a proud husband.

Julian Assange Speaks about Edward Snowden

In the public interest. 

The public have the right to know as criminality is occurring at the highest levels and civilians are being murdered. Those in the highest positions are unaccountable as privatisation is expanding control over public assets and removing the right to know.  The public/private nexus is blurred.  The public are very concerned at the lack of accountability, the pedophile rings, the human trafficking, the drug trade and the buying of access to politicans by private interests.  At the highest levels surveillance technologies are being given the ‘green light’ to enable the collection of data to profile people so that they can be targeted if they do not comply.  We live in a democracy and We The People do not want surveillance, corruption or control by unaccountable shadow figures.

Disclosure is essential and will save lives.  It will enable the world to redirect resources into solving the climate challenges and to evolve our civilisation in ways that promote peace.   The corrupt practices have to stop and be held to account by the International Criminal Court.

Whistleblowers are incredibly courageous as the can lose their lives, there is no money involved, it is about the public interest and this gives credibility to their actions.  The public interest is central as all governments are supposed to be acting in respect of what the people want.

Julian Assange is not in good shape, he has been jailed without trial when habeus corpus is a right (to be placed before a judge, and to be informed about charges) and his incarceration in the Embassy through legal means is against international law. He has not been protected by his own government which raises questions of allegiances and foreign interference. 

Unlawful interception of communications is against the law.  Freedom of speech and privacy is the secret war. 

Julian Assange Interview 2013 On Edward Snowden on ‘This Week’: “Asylum is a Right We All Have”