bothernews

Posts Tagged ‘government

Ex-spy says NSA did mass surveillance during Utah Olympics

leave a comment »

 


June 2, 2017

SALT LAKE CITY (AP) — A former top spy agency official who was the target of a government leak investigation says the National Security Agency conducted blanket surveillance in Salt Lake City during the 2002 Winter Olympics in Utah, according to court documents.

Ex-NSA official Thomas Drake wrote in a declaration released Friday that the NSA collected and stored virtually all electronic communications going into or out of the Salt Lake City area, including the contents of emails and text messages.

“Officials in the NSA and FBI viewed the Salt Lake Olympics Field Op as a golden opportunity to bring together resources from both agencies to experiment with and fine tune a new scale of mass surveillance,” Drake wrote.

It comes as part of a lawsuit filed by attorney Rocky Anderson, who was the mayor of Salt Lake City during the games held a few months after the Sept. 11, 2001, attacks. Anderson said the document was disclosed to the U.S. Department of Justice on Wednesday.

Full Story:  http://hosted.ap.org/dynamic/stories/U/US_OLYMPICS_NSA_LAWSUIT?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-06-02-20-04-38

Advertisements

Lest We Forget: The NSA already has backdoor access to your iPhone

leave a comment »

Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using  DROPOUT JEEP:

From 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

 

Jewel v NSA: EFF Allowed to Conduct Discovery Against Unwarranted NSA Surveillance Programs

leave a comment »

From:  https://www.eff.org/deeplinks/2016/02/big-victory-judge-pushes-jewel-v-nsa-forward

February 19, 2016 | By David Greene

Big Victory: Judge Pushes Jewel v. NSA Forward

We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.

This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.

This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

leave a comment »

 

From EFF:

In this, our fifth annual Who Has Your Back report, we took the main principles of the prior reports and rolled them into a single category: Industry-Accepted Best Practices. We’ve also refined our expectations around providing users notice and added new categories to highlight other important transparency and user rights issues.

We designed this report to take the basic principles of Who Has Your Back up a notch and see which companies were still leading the pack. Already, our newest report has had a similar effect on the industry as a whole, encouraging companies large and small to strive for more when it comes to standing by their users. In the months since we first told the companies what this year’s criteria would be, we’ve seen significant improvement in company practices. And we hope—and expect—that over the next year, we’ll see even more.

 

Download Report

Download the complete Who Has Your Back? 2015: Protecting Your Data From Government Requests report as a PDF.

 

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Written by bothernews

July 22, 2015 at 1:59 am

New NSA Documents Shine More Light into Black Box of Executive Order 12333

leave a comment »

 

In the NSA’s own words, EO 12333 is "the primary source of the NSA’s foreign intelligence-gathering authority."

Surveillance conducted under EO 12333 is implemented almost entirely by the executive branch, without review by Congress or the courts. EO 12333 lacks even the plainly inadequate legislative and judicial checks on the two more well-known surveillance authorities — Section 215 of the Patriot Act and the FISA Amendments Act.

 

 

Sen. Leahy: Stop government from controlling American people

with one comment

 

Sen. Patrick Leahy says the American people are at risk of being controlled by their government due to the expansive surveillance powers of the National Security Agency.

Speaking on “Fox News Sunday,” the Vermont Democrat and chairman of the Senate Judiciary Committee told host Chris Wallace that the nation’s lawmakers must act to return control of the government to the people.

Video

“I think that we are going to maintain our ability to protect the United States,” Leahy began. “That’s extremely important.”

“The concern everybody has is allowing our government to have such a reach into your private life, my private life, and everybody else’s, that we are, we have the government controlling us instead of us controlling the government.”

“And that’s what both Republicans and Democrats are joined together on the Hill to try to change,” Leahy concluded.

Earlier in the program, Leahy suggested that viewers consider history when deciding whether the government should have so much access to the private communications of American citizens.

“I just think that there should be oversight,” Leahy said. “Think back in the history of this county, in J. Edgar Hoover’s day and all — if he had had the power when he was spying on protesters and those against the Vietnam War and Martin Luther King — if he had had the power that’s in here, think what might have happened. We Americans believe in our safety. We also believe in our ability to be private.”

“You still have to have some checks and balances before you have a government that can run amok,” Leahy said

Sen. Leahy: Stop government from controlling American people | The Daily Caller