collapse

Author Topic: they know what you are doing  (Read 273773 times)

sky otter

  • Guest
Re: they know what you are doing
« Reply #225 on: July 17, 2013, 08:23:02 am »
 :D


looks like Snowden has been snowed in .. ;D
 I want to know what he is doing for money over there..they aren’t going to keep him for nothing
even though putin calls him an unwanted christmas present..




http://www.huffingtonpost.com/2013/07/17/edward-snowden-russia_n_3609672.html


Edward Snowden Has No Plans To Leave Russia: Lawyer
Reuters  |  Posted: 07/17/2013 7:15 am EDT  |  Updated: 07/17/2013 9:44 am EDT



MOSCOW, July 17 (Reuters) - Former U.S. spy agency contractor Edward Snowden has no plans to leave Russia soon and does not rule out eventually applying for citizenship, a lawyer helping the American with his bid for temporary asylum in Russia said on Wednesday.

Russian lawyer Anatoly Kucherena said Snowden believed it would be unsafe to try to travel to Latin America soon because of U.S. efforts to return him to the United States to face espionage charges. (Reporting by Alexei Anishchuk; Writing by Steve Gutterman, editing by Elizabeth Piper)

sky otter

  • Guest
Re: they know what you are doing
« Reply #226 on: July 20, 2013, 08:32:53 pm »
http://investigations.nbcnews.com/_news/2013/07/20/19585366-report-germany-used-key-nsa-surveillance-program?lite

Report: Germany used key NSA surveillance program
Michael Dalder / REUTERS

A former monitoring base of the U.S. National Security Agency in Bad Aibling south of Munich, Germany, is seen in a July 10 photo. Chancellor Angela Merkel has defended Germany's cooperation with U.S. intelligence, dismissing comparisons of its techniques to those used in communist East Germany.
By Andrew Rafferty, Staff Writer, NBC News

German intelligence agencies have used a secret National Security Agency program as part of a U.S. effort to detect possible terrorist activities across the globe, the German magazine Der Spiegel reported Saturday.


 Germany’s foreign intelligence service and its domestic intelligence agency were equipped with a program called XKeyScore that, according to documents seen by Der Spiegel reporters, was meant to “expand their ability to support NSA as we jointly prosecute CT [counter-terrorism] targets.”

The German news outlet reported that a 2008 NSA presentation described the program as an effective espionage tool that gathers metadata and can retroactively reveal any terms a target has typed into an online search engine.

The program is also capable of receiving all unfiltered data that a target has accessed over several days, including, in part, the content of communications, the magazine said.


--------------------------------------------------------------------------------

Der Spiegel reported that documents reviewed by its writers said Germany has shown an “eagerness and desire” to aid in U.S. global intelligence gathering efforts.

Another document describes Germany's foreign intelligence service as the NSA’s “most prolific partner” in its intelligence gathering efforts.

The German intelligence agencies and NSA declined to comment to Der Spiegel when asked about the newly reported revelations.

German Chancellor Angela Merkel has said the country is not a "surveillance state" and has pushed back on questions on whether Germany engages in the broad sweeping intelligence gathering programs that alleged NSA leaker Edward Snowden has revealed to the media.


Offline zorgon

  • Administrator
  • Hero Member
  • *****
  • Posts: 21309
  • Gold 903
Re: they know what you are doing
« Reply #227 on: July 20, 2013, 08:41:47 pm »
Bad Aibling DE Echelon Station - NSA - Supposedly Closed but Google shows it active 2008



Bad Aibling DE Echelon Station NSA
Bavaria, Germany
+47° 52' 49.46", +11° 58' 44.03"

In 1804, Bad Aibling was mentioned for the first time as "Epininga". In mediaeval times it was an administrative centre in the lordship of the Counts of Falkenstein. After the obliteration of the Neuburg-Falkenstein dynasty it became part of the realm of the Wittelsbach family. In 1845 the first treatments with peat pulp were offered by the physician Desiderius Beck. Bad Aibling received the title "Bad" (spa or springs) in 1895. In the year 1933 Bad Aibling became a city. After the second World War Bad Aibling evolved into a major centre for intelligence organizations and secret services.

In 2004 the American Bad Aibling ECHELON station closed after several decades of operation.

Bad Aibling DE Echelon Station
Closed in 2004?
Not according to Google Earth 2008




Main Antenna Array


Bad Aibling DE Echelon Station - Main Complex


Echelon Field Station 81: Bad Aibling [RSOC] - BAS

http://www.thelivingmoon.com/45jack_files/03files/ECHELON_Bad_Aibling.html

sky otter

  • Guest
Re: they know what you are doing
« Reply #228 on: July 21, 2013, 06:42:44 am »


https://www.wsws.org/en/articles/2013/07/18/aclu-j18.html

US government using license plates to track movements of millions
By Eric London
18 July 2013

A report issued by the American Civil Liberties Union (ACLU) on Wednesday [ http://www.aclu.org/alpr ] details an immense operation through which nearly 1 billion license plate records of hundreds of millions of drivers are tracked and huge databases are amassed, providing the American government with access to the history and recent whereabouts of the majority of the US population.

For years, a network of federal security agencies, local police departments and private companies have been using automatic license plate readers on police cruisers, in parking lots, at traffic intersections—even through smartphone apps—to photograph cars and their drivers and to record license plate numbers with the matching time, date and location.

“More and more cameras, longer retention periods, and widespread sharing allow law enforcement agents to assemble the individual puzzle pieces of where we have been over time into a single, high-resolution image of our lives,” the report says.

“The systems can also plot all vehicles at a particular location, such as the location where a crime—or a political protest—took place” through a procedure called “geofencing,” whereby “law enforcement or private companies can construct a virtual fence around a designated geographical area, to identify each vehicle entering that space.”

The use of this technology for such authoritarian procedures gives the lie to the claims of the government and security apparatus that the purpose of the license-tracking program is to stop crime.

In Maryland, for example, where license plate trackers stored over 85 million license plate reads in 2012 alone, only 0.2 percent of those license plates were matched to any suspected unlawful activity. Of the 0.2 percent, 97 percent of those were for violation of state registration or smog check programs.

However, the data on the whereabouts of all 85 million plates in Maryland is stored in a state fusion center, the Maryland Coordination and Analysis Center (MCAC), which is then shared with a regional database called the National Capital Region License Plate Reader Project (NCR). According to the NCR, “any law enforcement agency” can take license plate data and “retain it indefinitely.”

Regional databases similar to the NCR exist across the country to help circumvent individual state limitations on the length of time for which license plate and travel data can be held. Though not referenced in the ACLU report, the aggregated license plate data from all state and regional databases are likely compiled and stored indefinitely by the National Security Agency alongside the DNA and ID photograph records and Internet and phone communications of the vast majority of people in the US.

The depth of the involvement of the national security apparatus is evidenced by the “billions of dollars in grants” that the Department of Homeland Security (DHS) has provided through the DHS Security Grant Program and the Infrastructure Protection Program. Remarkably, license plate tracker manufacturers claim that the DHS is outdone by the Justice Department, which is the “lead Federal funding agency” for the license-tracking program.

License plate readers are also increasingly used to militarize the US-Mexico and US-Canada borders.

According to DHS reports, license plate readers are also used by the Customs and Border Protection agency to scan “nearly 100 percent of land border traffic.” In addition, Immigration and Customs Enforcement has admitted to routinely using license plate readers, as has the Drug Enforcement Agency.

In collaboration with the national security apparatus, local police departments are being mobilized to build massive databases at the grassroots level.

In 2011, the license plate tracking program was used by 75 percent of police agencies, with an additional 10 percent stating they planned to increase use of license plate readers in the near future.

And the program is not limited to use in the US. Two license plate reader manufacturers, ELSAG and PIPS Technology, claim they have sold readers to thousands of agencies abroad as well as to police agencies in all 50 states.

In addition to use by local and federal security agencies, the ACLU reports that private companies have created “numerous privately owned databases containing the location information of vast numbers of Americans” by “scan[ning] thousands of plates each day and stor[ing] information indefinitely, creating huge databases of Americans’ movements.”

The ACLU writes that “MVTrac, one of the biggest companies in this industry, claims to have photographs and location data on ‘a large majority’ of registered vehicles in the United States, while the Digital Recognition Network (DRN) boasts of ‘a national network of more than 550 affiliates’ ” that are “located in every major metropolitan area of the United States.”

“DRN affiliates,” the ACLU report continues, “feed location data on up to 50 million vehicles each month…into DRN’s national database. This database now contains over 700 million datapoints on where American drivers have been.”

Data collected from law enforcement, at parking lots, and by other private access control monitoring systems have been aggregated into the National Vehicle Location Service (NVLS), run by Vigilant Solutions, a partner of DRN. According to Vigilant Solutions, the NVLS “is the largest [license plate] data sharing initiative in the United States.”

The amassing of such an immense database is a blatant violation of the Fourth Amendment of the US Constitution, which states:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.…”

In its 2012 ruling in United States v. Jones, a five-justice majority of the Supreme Court agreed that a police department’s warrantless, month-long monitoring of the defendant’s whereabouts through a GPS monitoring device constituted an unconstitutional search because “[f]or such offenses, society’s [reasonable] expectation [of privacy] has been that law enforcement agents and others would not—and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual’s car, for a very long period.”

But local law enforcement agencies use plate readers without limitation and in blatant violation of the US constitution. The ACLU report describes the practice of the Pittsburg Police Department in California as “typical.” Pittsburg police claim that “[r]easonable suspicion or probable cause is not required,” for use of license plate readers, which can be operated during “any routine patrol operation.”

In setting up these vast databases, the US government has mobilized the private sector and local law enforcement to set up a police-state mechanism whereby it is possible to track the whereabouts of a majority of people in close to real time and to monitor political dissidents by tracking attendance at meetings and rallies.

sky otter

  • Guest
Re: they know what you are doing
« Reply #229 on: July 21, 2013, 10:11:54 am »



http://www.huffingtonpost.com/2013/07/19/fisa-court-approves-surveillance_n_3625610.html


FISA Court Approves Continued U.S. Phone Surveillance

By LARA JAKES 07/19/13 06:13 PM ET EDT 

WASHINGTON — A secret U.S. intelligence court renewed an order Friday to continue forcing Verizon Communications to turn over hundreds of millions of telephone records to the government each day in its search for foreign terror or espionage suspects.

The order by the Foreign Intelligence Surveillance Court has been in place for years but must be renewed every three months. It was exposed in June after former National Security Agency systems analyst Edward Snowden leaked details of two top secret U.S. surveillance programs that critics say violate privacy rights.

The order was set to expire Friday, and its renewal shows that the Obama administration and the court of 11 federal judges stand behind its legality.

In a statement, the office of National Intelligence Director James Clapper said it was confirming the Verizon renewal as part of an ongoing effort to make more information about the recently declassified programs as public as possible.

Clapper "has decided to declassify and disclose publicly that the government filed an application with the Foreign Intelligence Surveillance Court seeking renewal of the authority to collect telephony metadata in bulk, and that the court renewed that authority," the statement said.

The two programs, both run by the NSA, pick up millions of telephone and Internet records that are routed through American networks each day. Intelligence officials say they have helped disrupt dozens of terrorist attacks, and target only foreign suspects outside the United States while taking close care not to look at the content of conversations or messages by American citizens.

But they have raised sharp concerns about whether the U.S. is improperly – or even illegally – snooping on people at home and abroad.

Other major U.S. telephone carriers are similarly ordered to give records of their customers' calls to the NSA, which also is able to reach into the data streams of U.S. companies such as Yahoo, Facebook Inc., Microsoft Corp., Google Inc. and others, and grab emails, video chats, pictures and more. The technology companies say they turn over information only if required by court order.

Snowden has been charged with espionage and is seeking asylum from several countries, including Russia. He has been holed up for three weeks in a transit zone at Moscow's international airport since arriving from Hong Kong, and Russian customs inspectors say they do not have jurisdiction to seize him.

At a discussion earlier Friday touching on privacy and security, DNI counsel Robert Litt maintained that "these programs are legal" because they are authorized by Congress, the courts and the White House. He said their exposure could curb the government's ability to detect threats against the U.S.

"Only time will tell the full extent of the damage caused by the unlawful disclosures of these lawful programs," Litt said.

Offline A51Watcher

  • Administrator
  • Hero Member
  • *****
  • Posts: 4429
  • Gold 593
Re: they know what you are doing
« Reply #230 on: July 21, 2013, 10:43:01 am »

WASHINGTON — A secret U.S. intelligence court renewed an order Friday to continue forcing Verizon Communications to turn over hundreds of millions of telephone records to the government each day in its search for foreign terror or espionage suspects.

AND of course the domestic ones as well.

Espionage suspects huh, you mean like ones who take cameras to secret military bases and film what they see going on, and then share it with the public.


Maybe it's time I come out of hiding.




Quote
"Only time will tell the full extent of the damage caused by the unlawful disclosures of these lawful programs," Litt said.

Yeah the terrestrial ones may be lawful, but the ET ones?, no way, sorry you don't own that.



sky otter

  • Guest
Re: they know what you are doing
« Reply #231 on: July 21, 2013, 02:37:26 pm »



http://www.bbc.co.uk/news/technology-23374867


Apple, Google and other tech giants demand spying openness


19 July 2013 Last updated at 07:13 ET

Apple, Google and dozens of other technology companies have urged US authorities to let them divulge more details about security requests.
The companies want to be able to report regular statistics about the nature and scope of what data is being asked for.

Whistle-blower Edward Snowden's revelations about US spying capabilities has left the tech firms keen to assert their independence.
Authorities are said to be considering the companies' request.
"We just want to make sure we do it right," said Gen Keith Alexander, director of the National Security Agency.

"We don't impact anything ongoing with the FBI. I think that's the reasonable approach."

Limited scope
 
The companies sent a letter outlining their request on Thursday to Gen Alexander, as well as President Obama and Congress.
It was co-signed by some of the most influential companies in the tech world, including Facebook, Twitter and LinkedIn.

Campaign groups such as the Electronic Frontier Foundation and Human Rights Watch are also backing the action.

Companies are currently allowed to release limited data regarding security requests and their nature.
But as it stands those disclosures must be limited in scope, and in many cases require that the firms ask the courts for permission to make the information public.

Many users of popular services, particularly social networks, reacted angrily to the news that companies regularly make available information about users when requested to do so.

"They don't have a choice. Court order, they have to do this," Mr Alexander from the NSA said, suggesting that security authorities could be open to the idea.

"What they want is the rest of the world to know that we're not reading all of that email, so they want to give out the numbers.

"I think there's some logic in doing that."





Related Stories
Microsoft calls for NSA transparency
Microsoft's work with NSA 'revealed'
Why for the NSA every call matters

sky otter

  • Guest
Re: they know what you are doing
« Reply #232 on: July 23, 2013, 07:58:20 am »



ah now this could get interesting


huffingtonpost.com/2013/07/23/keith-alexander-justin-amash_n_3639329.html

NSA's Keith Alexander Calls Emergency Private Briefing To Lobby Against Justin Amash Amendment Curtailing Its Power

Ryan Grim


Posted: 07/23/2013 10:00 am EDT  |  Updated: 07/23/2013 10:10 am EDT

WASHINGTON -- The National Security Agency kicked its lobbying into high gear after an amendment from Rep. Justin Amash, a libertarian Republican from Michigan, was ruled in order and will get a vote sometime this week.

NSA head Gen. Keith Alexander scheduled a last-minute, members-only briefing in response to the amendment, according to an invitation distributed to members of Congress this morning and forwarded to HuffPost. "In advance of anticipated action on amendments to the DoD Appropriations bill, Ranking Member C.A. Dutch Ruppersberger of the House Intelligence Committee invites your Member to attend a question and answer session with General Keith B. Alexander of the National Security Agency," reads the invitation.

The Amash amendment would put the House on record when it comes to NSA snooping. The language of the measure, which would be attached to the Pentagon's spending bill "Ends authority for the blanket collection of records under the Patriot Act. Bars the NSA and other agencies from using Section 215 of the Patriot Act to collect records, including telephone call records, that pertain to persons who are not subject to an investigation under Section 215."

The amendment could draw support from both Democrats and Republicans.

sky otter

  • Guest
Re: they know what you are doing
« Reply #233 on: July 23, 2013, 08:54:30 pm »

oh yeah.. interesting..let's see if the peoples really have anything to say

http://www.huffingtonpost.com/2013/07/23/justin-amash-nsa-amendment_n_3642228.html

Justin Amash NSA Amendment Earns White House Condemnation
Posted: 07/23/2013 10:06 pm EDT

Matt Sledge


WASHINGTON -- In a sign of growing concern over Congress's reaction to the revelations of National Security Agency leaker Edward Snowden, the White House publicly announced its opposition to a House push to block the spy agency's bulk collection of ordinary Americans' phone records on Tuesday.

Reacting to a defense appropriations amendment sponsored by Rep. Justin Amash (R-Mich.) to curb the NSA's vast program of collecting and storing phone records, White House press secretary Jay Carney said, "We oppose the current effort in the House to hastily dismantle one of our Intelligence Community’s counterterrorism tools.

"This blunt approach is not the product of an informed, open, or deliberative process," Carney continued in a statement.

The White House rarely comments on an amendment before it reaches the floor of even one chamber of Congress. That, coupled with an emergency briefing NSA Director Keith Alexander held for members of Congress on Tuesday, appears to show that senior administration officials are seriously worried about the possibility of congressional action to stop the mass domestic surveillance.

Amash's amendment has attracted bipartisan supporters, including Rep. John Conyers (D-Mich.). Debate on his measure is likely to begin on Wednesday, with a vote on Wednesday or Thursday.

Taking to Twitter, Amash suggested it was ironic for the Obama administration to call the debate over his amendment insufficiently "informed" or "open." After Snowden's revelations, members of Congress said they were astonished at the breadth of the NSA's collection of data on ordinary, law-abiding Americans.

David Segal, the executive director of the online advocacy group Demand Progress, which supports Amash's amendment, said the White House statement shows the administration is scared it may pass. The House floor vote this week will be Congress's first chance to weigh in directly on NSA surveillance since Snowden's leaks began.

"It's been an extraordinary day on Capitol Hill, as insiders scramble to block the growing chorus of support for the Amash anti-surveillance amendment," Segal said in an email. "Just as the NSA's domestic spying apparatus is evidence of some of our leaders' fear of the American people, these extraordinary actions by the White House and the NSA evidence their fear that the will of Americans will be codified in the law tomorrow."

sky otter

  • Guest
Re: they know what you are doing
« Reply #234 on: July 24, 2013, 07:00:17 pm »


it figures..sigh :(


http://www.huffingtonpost.com/2013/07/24/justin-amash-amendment_n_3647893.html?utm_hp_ref=politics

Matt Sledge


  Justin Amash Amendment To Stop NSA Data Collection Voted Down In House (UPDATE)
Posted: 07/24/2013 7:05 pm EDT  |  Updated: 07/24/2013 8:47 pm EDT

WASHINGTON -- The House of Representatives on Wednesday evening narrowly defeated an amendment from Rep. Justin Amash (R-Mich.) meant to halt the National Security Agency's bulk collection of phone record data.

"We're here today for a very simple reason: to defend the Fourth Amendment, to defend the privacy of each and every American," Amash said as he introduced his measure. Lawmakers' votes, he said, would answer one simple question, "Do we oppose the suspicionless collection of every American's phone records?"

On Wednesday, at least, the answer was no. The House voted 217-205 to defeat the amendment after intense last-minute lobbying from the White House and the NSA.

Democrats voted for the amendment by a 111-to-83 margin. Republicans, meanwhile, split 134 to 93 against it.

The closeness of the vote, the first on the surveillance programs since the revelations of NSA leaker Edward Snowden, gave civil liberties groups like the American Civil Liberties Union, which has been a vigorous critic of that surveillance, some reason for optimism that future reforms will be possible.

Amash's measure, offered as an amendment to the Department of Defense appropriations bill, would have prevented the government from invoking Section 215 of the Patriot Act to scoop up phone call metadata -- information about whom people are calling and when, but not the content of the calls -- unless the government had a reasonable suspicion that a specific target was involved in terrorism.

While the bill was co-sponsored by liberals, including Rep. John Conyers (D-Mich.), Amash warned that "opponents of this amendment will use the same tactic that every government throughout history has used to justify its violation of rights: fear." And the measure's foes -- even those within his own party -- did not disappoint.

Arguing that phone records collection helps protect a "nation under siege," Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee, said, "Passing this amendment takes us back to September 10."

Pointing to a Wall Street Journal editorial that came out Wednesday, Rep. Mac Thornberry (R-Texas) contended that passing the amendment would reward Snowden.

"The only people who have benefited from the revelation of classified information ... the only result is that those who are engaged in Islamic jihad will have been benefited," said Rep. Michele Bachmann (R-Minn.). "Those that we seek to protect have not."

Bachmann's position on the bill, identical to that of the Obama administration, showed the strange bedfellows that Snowden's bombshell leaks have created.

Although Amash's amendment was defeated, civil liberties advocates found something to cheer in the closeness of the vote. Just two years ago, the House voted by a comfortable 250-153 margin to reauthorize the Patriot Act, which the administration uses to justify its phone metadata collection. On Wednesday, by contrast, a swing of just seven votes would have put Amash's amendment over the top.

Back then, said Conyers, "we didn't know about it."

Conyers also noted that this time, on the Democratic side, members up to and including House Minority Leader Nancy Pelosi (D-Calif.) pressured members to vote against the Amash amendment.

In 2005, Pelosi was stridently opposed to the section of the Patriot Act under debate now. She called the provisions being reauthorized a "massive invasion of privacy." But on Wednesday, she voted against reining in the Patriot Act.

A sign of how dimly the Democratic leadership viewed Amash's amendment could be seen in an email from the office of House Minority Whip Steny Hoyer (D-Md.). The email described the sweeping NSA program approvingly as merely collecting phone records "that pertain to persons who may be in communication with terrorist groups but are not already subject to an investigation."

Conyers said the lobbying "was heavy. They were very worried about it."

But, he added, "the fact that they won this narrowly means they still are worried -- because this thing isn't over yet. This is just the beginning."

This story has been updated with reaction after the House vote.

sky otter

  • Guest
Re: they know what you are doing
« Reply #235 on: July 24, 2013, 08:18:31 pm »

whoa..he's just now getting a change of clothes..yikes..bet he has had some second thoughts


http://www.reuters.com/article/2013/07/24/us-russia-snowden-idUSBRE96N0KH20130724

[size=14pt]Fugitive Snowden's hopes of leaving Moscow airport dashed[/size]
By Lidia Kelly

MOSCOW | Wed Jul 24, 2013 7:45pm EDT

MOSCOW (Reuters) - Fugitive U.S. spy agency contractor Edward Snowden's hopes of leaving Moscow's Sheremetyevo Airport for the first time in a month on Wednesday were dashed when he failed to secure permission from Russia to leave.

An airport source said Snowden, who is wanted by the United States on espionage charges for revealing details of government intelligence programs, was handed documents by his lawyer that were expected to include a pass to leave the transit area.

But Snowden did not go through passport control, and lawyer Anatoly Kucherena, who is helping him with his request for temporary asylum in Russia until he can reach a country that will shelter him, said the American did not have the pass he needed.

It was not clear whether there had been last-minute political intervention or a hitch, or whether the pass had never been in his possession.

Kucherena said he hoped Snowden's status would be resolved soon. "I must say he is of course anxious about it and I hope that this situation will be resolved in the nearest future," Kucherena said at Sheremetyevo.

"This is the first time Russia is facing such a situation, and this issue of course requires time for the immigration workers."

In Washington, the White House said it was seeking clarification of Snowden's status, the State Department made clear that allowing him to leave the airport would be "deeply disappointing" and Secretary of State John Kerry telephoned Russian Foreign Minister Sergei Lavrov about the situation.

"The secretary spoke with Foreign Minister Lavrov this morning," said State Department spokeswoman Jen Psaki. "He reiterated our belief ... that Mr. Snowden needs to be returned to the United States where he will have a fair trial."

Bolivia, Nicaragua and Venezuela have said they could offer sanctuary to Snowden, who arrived on June 23 from Hong Kong, where he had fled to escape capture and trial in the United States on espionage charges.

None of the three Latin American countries can be reached by a direct commercial flight from Moscow, so Snowden has requested temporary asylum in Russia until he believes he can safely reach one of them.

The United States wants him extradited to face prosecution and has revoked his passport.

Russia has refused to send him home and risks damage to its relations with the United States if it grants him temporary asylum - a process that could take three months.

Kucherena confirmed Snowden was staying somewhere in the many corridors and rooms of the transit area between the runway and passport control - an area Russia considers neutral territory - and that he had learned the Russian for "Hi", "Bye-bye" and "I'll ring you."

The 30-year-old had received calls from across Russia, with offers to give him money and a place to stay, and even a suggestion by one woman to adopt him. He said he had enough money to get by for now.

Kucherena said he had brought him fresh underwear and shirts and added that he had given him the novel "Crime and Punishment" by 19th-century writer Fyodor Dostoevsky and short stories by Anton Chekhov.

President Vladimir Putin signaled last week that he did not want the dispute to derail Russia's relations with the United States, and the decision on temporary asylum could be delayed until after U.S. President Barack Obama visits Moscow for a summit in early September.

It will be Putin's first summit with Obama since the former KGB spy started a new term last year,

and precedes a subsequent G20 summit in St. Petersburg.

DIPLOMATIC FALLOUT FROM LEAKS

Both Russia and the United States have signaled they want to improve ties, strained by issues ranging from the Syrian conflict to Putin's treatment of opponents and Western-funded non-governmental organizations since he started a third term in 2012.

Putin has said Snowden must stop anti-U.S. activities. Snowden has said he does not regard his activities as hostile to the United States, but Kucherena said last week that he had agreed to halt such actions.

Snowden, who has been assisted by the WikiLeaks anti-secrecy group, has not been seen in public since June 23, although he had a meeting at the airport with human rights groups on July 13.

He fears the United States will persuade its allies to prevent him using their airspace, or that his plane might be forced down so that he can be taken into custody and extradited.

Kucherena said earlier this week that he did not rule out Snowden seeking Russian citizenship.

There has already been diplomatic fallout from Snowden's leaks, which included information that the U.S. National Security Agency bugged European Union offices and gained access to EU internal computer networks, although the EU is an ally.

China, Brazil and France have also voiced concern over the spying program.

U.S. relations with Latin American states have been clouded by the refusal of four U.S. allies in Europe to let a plane carrying Bolivia's president home from Moscow use their airspace because of suspicion that Snowden might be on the plane.

U.S. lawmakers were also clashing over the case as the House of Representatives debated the 2014 defense spending bill.

The House on Wednesday rejected a proposed amendment from Michigan Republican Justin Amash that would bar the NSA from collecting telephone call records and other data from people in the United States not specifically under investigation.

Obama opposed Amash's amendment, saying it would "hastily dismantle one of our intelligence community's counterterrorism tools."

(Additional reporting by Alexei Anishchuk, Arshad Mohammed and Gabriel Debenedetti in Washington, Writing by Timothy Heritage; Editing by Angus MacSwan and Peter Cooney)

Offline burntheships

  • Administrator
  • Hero Member
  • *****
  • Posts: 2782
  • Gold 277
Re: they know what you are doing
« Reply #236 on: July 25, 2013, 09:09:10 pm »
So now they want passwords too?

Feds tell Web firms to turn over user account passwords
 
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.


http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/

 ::)
"This is the Documentary Channel"
- Zorgon

deuem

  • Guest
Re: they know what you are doing
« Reply #237 on: July 26, 2013, 01:51:47 am »
Great, people will now need to change their password every log in. That will keep the world busy.
 
Is there no end to this madness?

sky otter

  • Guest
Re: they know what you are doing
« Reply #238 on: July 31, 2013, 08:34:47 am »
 >:(



On the Lookout: New Hacker Threats

By Jason Glassberg, co-founder of Casaba

Published July 31, 2013


Read more: http://www.foxbusiness.com/personal-finance/2013/07/31/7-new-hacker-threats-to-watch-out-for/#ixzz2adaVUCgx

What happens in Vegas, stays in Vegas...except when it comes to Black Hat, arguably the world’s most important annual hacking conference. This renowned - and sometimes infamous - hacker con is scheduled to kick off July 31- and it’s an event that every consumer should pay attention to.

So why should you care about a hacker con? This event is where the top new threats to our smartphones and other devices are often first revealed. In many ways, Black Hat sets the course for what hackers around the world will be doing for the next 12 months.

This year’s Black Hat is especially interesting, because it marks an important shift in the hacker community as more attention is being paid to electronic devices not typically thought of as hackable. As manufacturers add Internet connectivity into more ‘things’ - from cars to appliances, TVs, pacemakers, etc. - these objects become vulnerable to cyber attacks.



Here are the top seven hacks coming out at Black Hat that consumers need to know about - some of them can be prevented, but others can’t:



1. HTTPS is in Trouble. If we were to rank the most important things that ever happened to the web, SSL/TLS would certainly be in the top three. What is it? It’s an online security feature - the ‘s’ in HTTPS - that makes it possible to safely log into a bank account, make a purchase or just travel the web without letting other people spy on you.

The problem, however, is that flaws have been discovered in SSL/TLS that could allow a hacker to circumvent this security setting - and steal your information. At this year’s Black Hat, hackers will be showing how to steal a user’s login credentials from a ‘protected‘ HTTPS site - and another talk will show how to retrieve this information from a device. 



What can you do?: Don’t rely solely on HTTPS to keep you safe. Avoid logging into bank accounts or entering credit/debit card information when using a public WiFi network. Also, make sure to thoroughly wipe any device that’s ever used your login credentials (computer, laptop, phone, tablet) before you discard it.



2. Cell Tower Spoofing. Can you hear me now? Actually, the real question should be, who’s doing the listening? Hackers at Black Hat will reveal a frightening attack on cell phones - by using a modified CDMA femtocell (which anyone can buy, by the way), hackers can trick your phone into connecting to them instead of the cell phone tower, eavesdrop on everything (phone calls, text messages, web sites visited, etc.) and even clone your phone! This is similar to what hackers now do with a WiFi network, where they trick you into thinking their WiFi hotspot is a legitimate one.

This is an alarming vulnerability that should concern anyone who owns a CDMA smartphone (Verizon, Sprint, US Cellular, Alltel, etc.).



What can you do?: If you own a CDMA phone, you should really think about adding a VPN (virtual private network) that will encrypt everything you do on the phone.



3. When Your TV Watches You. Smart TVs are the latest trend in entertainment - with new models available from Samsung, Sony and LG, plus upcoming models from Apple and Google. However, connecting TVs to the Internet and giving them an operating system, plus features like webcams and mics, also comes with new risks.

Hackers at Black Hat will be showing how to break into smart TVs to spy on users through the webcam, monitor what you’re doing, even scam you through a TVshing attack (TV phishing).



What can you do?: Right now this is a low-risk threat, but as more homes add smart TVs to the living room it may be something to plan for. Unplugging the TV when not in use, or covering the camera, are some basic precautions that could help.



4. Hijacking Appliances. Another gadget that’s getting ‘smarter’ is the home appliance. WiFi-connected refrigerators, dishwashers, washers/dryers or thermostats will become more common over the years. But they’re also more vulnerable.

Researchers at Black Hat are showing off new ways to remotely eavesdrop and interfere with smart appliances and networked home electronics - which could have serious implications for home security.



What can you do?: Nothing.



5 Remote Controlling Cars. Manufacturers are increasingly adding new features to automotive computers (ECUs) to expand entertainment offerings and safety controls. But the ECU could also let a hacker gain control of certain automotive functions.

A well-known security researcher will be showing how to hack the ECU to affect a car’s breaking and steering at Black Hat’s sister conference, DefCon.



What can you do?: Nothing.



6. SpyPhone. Security pros have long worried about the danger of mobile apps - specifically, their ability to sneak viruses and malware onto your phone.

A researcher at Black Hat this year will be showing how infected apps can turn your phone into a full-blown surveillance tool - monitoring you via video and mic, as well as intercepting all of your calls, texts, emails and other activity.



What can you do?: Don’t download apps from third-party websites. Stick to well-known apps that have been around for a while. Limit the total number of apps you download. Check the permissions before approving them (i.e., why does a game need to access my contacts?).



7. Hacking the Human Body. Implantable medical devices - including pacemakers, defibrillitors, insulin pumps, etc. - now come with wireless connections but only rudimentary security.

Hackers say the devices can be remotely controlled to harm or kill the patient



What can you do?: Nothing.

 

Jason Glassberg, co-founder of Casaba, LLC provides cybersecurity consulting to Fortune 50s, banks, energy firms and government agencies.  The company’s areas of expertise include penetration testing, threat modeling, reverse engineering, malware analysis and software security. Casaba is part of Microsoft’s SDL Pro Network.



Read more: http://www.foxbusiness.com/personal-finance/2013/07/31/7-new-hacker-threats-to-watch-out-for/#ixzz2adacamUP

sky otter

  • Guest
Re: they know what you are doing
« Reply #239 on: July 31, 2013, 04:05:29 pm »

very long and detailed article with diagrams
.. only posted a small part here
go to the link


http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
Series: Glenn Greenwald on security and liberty
Previous | Index
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
• NSA's XKeyscore program – read one of the presentations

Glenn Greenwald
theguardian.com, Wednesday 31 July 2013 08.56 EDT
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10.

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.



The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled "plug-ins" in a December 2012 document describes the various fields of information that can be searched. It includes "every email address seen in a session by both username and domain", "every phone number seen in a session (eg address book entries or signature block)" and user activity – "the webmail and chat activity to include username, buddylist, machine specific cookies etc".





Email monitoring
In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual's email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".

To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.



The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, "communications that transit the United States and communications that terminate in the United States".

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications




 


Wal-Mart.com USA, LLC
affiliate_link
Free Click Tracking
Wal-Mart.com USA, LLC

* Recent Posts

Re: kits to feed your family for a year by Shasta56
[March 17, 2024, 12:40:48 pm]


Re: kits to feed your family for a year by space otter
[March 16, 2024, 08:45:27 pm]


Re: kits to feed your family for a year by Shasta56
[March 16, 2024, 07:24:38 pm]


Re: kits to feed your family for a year by space otter
[March 16, 2024, 10:41:21 am]


Re: Full Interview - Lance Corporal Jonathan Weygandt (1997) by RUSSO
[March 12, 2024, 07:22:56 pm]


Re: Full Interview - Lance Corporal Jonathan Weygandt (1997) by RUSSO
[March 09, 2024, 03:25:56 am]


Re: Full Interview - Lance Corporal Jonathan Weygandt (1997) by RUSSO
[March 09, 2024, 02:33:38 am]


Re: Music You Love by RUSSO
[March 09, 2024, 01:10:22 am]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by RUSSO
[March 09, 2024, 12:14:14 am]


Re: Full Interview - Lance Corporal Jonathan Weygandt (1997) by RUSSO
[March 09, 2024, 12:08:46 am]


Re: A peculiar stone in DeForest by Canine
[March 03, 2024, 11:54:22 am]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by kevin
[March 03, 2024, 11:30:06 am]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by kevin
[March 03, 2024, 11:21:15 am]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by kevin
[March 03, 2024, 11:16:05 am]


Re: Music You Love by RUSSO
[March 02, 2024, 07:58:09 pm]


Re: Full Interview - Lance Corporal Jonathan Weygandt (1997) by RUSSO
[March 02, 2024, 07:50:59 pm]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by RUSSO
[March 02, 2024, 07:43:03 pm]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by RUSSO
[March 02, 2024, 07:41:30 pm]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by kevin
[March 01, 2024, 11:54:23 am]


Re: The Man Who Built UFOs For The CIA (Not Bob Lazar!) by kevin
[March 01, 2024, 11:34:15 am]