Posts Tagged ‘government’
Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using DROPOUT JEEP:
“DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”
The flowchart of how the NSA makes your iPhone its iPhone is presented below:
- NSA ROC operator
- Load specified module
- Send data request
- iPhone accepts request
- Retrieves required SIGINT data
- Encrypt and send exfil data
- Rinse repeat
Big Victory: Judge Pushes Jewel v. NSA Forward
We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.
This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.
This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.
In this, our fifth annual Who Has Your Back report, we took the main principles of the prior reports and rolled them into a single category: Industry-Accepted Best Practices. We’ve also refined our expectations around providing users notice and added new categories to highlight other important transparency and user rights issues.
We designed this report to take the basic principles of Who Has Your Back up a notch and see which companies were still leading the pack. Already, our newest report has had a similar effect on the industry as a whole, encouraging companies large and small to strive for more when it comes to standing by their users. In the months since we first told the companies what this year’s criteria would be, we’ve seen significant improvement in company practices. And we hope—and expect—that over the next year, we’ll see even more.
Download the complete Who Has Your Back? 2015: Protecting Your Data From Government Requests report as a PDF.
In the NSA’s own words, EO 12333 is "the primary source of the NSA’s foreign intelligence-gathering authority."
Surveillance conducted under EO 12333 is implemented almost entirely by the executive branch, without review by Congress or the courts. EO 12333 lacks even the plainly inadequate legislative and judicial checks on the two more well-known surveillance authorities — Section 215 of the Patriot Act and the FISA Amendments Act.
- Legal Fact Sheet: Executive Order 12333; dated 19 June 2013
- Full Story w Links to Documents: New NSA Documents Shine More Light into Black Box of Executive Order 12333 | American Civil Liberties Union
Sen. Patrick Leahy says the American people are at risk of being controlled by their government due to the expansive surveillance powers of the National Security Agency.
Speaking on “Fox News Sunday,” the Vermont Democrat and chairman of the Senate Judiciary Committee told host Chris Wallace that the nation’s lawmakers must act to return control of the government to the people.
“I think that we are going to maintain our ability to protect the United States,” Leahy began. “That’s extremely important.”
“The concern everybody has is allowing our government to have such a reach into your private life, my private life, and everybody else’s, that we are, we have the government controlling us instead of us controlling the government.”
“And that’s what both Republicans and Democrats are joined together on the Hill to try to change,” Leahy concluded.
Earlier in the program, Leahy suggested that viewers consider history when deciding whether the government should have so much access to the private communications of American citizens.
“I just think that there should be oversight,” Leahy said. “Think back in the history of this county, in J. Edgar Hoover’s day and all — if he had had the power when he was spying on protesters and those against the Vietnam War and Martin Luther King — if he had had the power that’s in here, think what might have happened. We Americans believe in our safety. We also believe in our ability to be private.”
“You still have to have some checks and balances before you have a government that can run amok,” Leahy said
(Reuters) – Activist hackers linked to the collective known as Anonymous have secretly accessed U.S. government computers in multiple agencies and stolen sensitive information in a campaign that began almost a year ago, the FBI warned this week.
The hackers exploited a flaw in Adobe Systems Inc’s software to launch a rash of electronic break-ins that began last December, then left "back doors" to return to many of the machines as recently as last month, the Federal Bureau of Investigation said in a memo seen by Reuters.
The memo, distributed on Thursday, described the attacks as "a widespread problem that should be addressed." It said the breach affected the U.S. Army, Department of Energy, Department of Health and Human Services, and perhaps many more agencies.
Investigators are still gathering information on the scope of the cyber campaign, which the authorities believe is continuing. The FBI document tells system administrators what to look for to determine if their systems are compromised.
An FBI spokeswoman declined to elaborate.
Excerpt from Million Mask March speech
November 5, 2013
We declare our Independence from the Enlightened Few who seek to Subjugate and Rule.
We declare our Freedom from an All powerful Beaurocracy.
Power belongs to the Governed and is better managed locally.
We declare our intention as the Children of Love and Freedom, to fill this Earth with lives full of LOVE, RESPECT, & THANKSGIVING, not servitude to the ever more Heartless Iron Fist.
We are now Awakened and United, and as people with hopes and feelings, deserving of the bounty this Planet can provide.
Let Us contemplate these words. Meditate on their Meaning, and Let Us return a year from now, on November 5, 2014 a Stronger, Wiser, Infinitely Loving People ready to Give more than we Take.
Humanity will either Transcend its baser impulses or we shall allow ourselves to be Destroyed.
If there is to be a New World Order, let the People decide what it is to be. We have seen enough war, pestilence, famine, and death. A new age of Freedom, Charity, Peace, and Love has begun so that all the Peoples of America & the World may Thrive.
The change that is going to happen and is happening right here right now needs to start with you. Their power is the peoples ignorance.
To all of the soldiers around the world of every nation, right now I ask you to stand down and return home to your families.
To the Powers that Be, We the People stand here united upon this common ground of fairness, justice and freedom, We have come here not only with anger in our eyes but with love in our hearts. We the People will bestow upon you the mercy you have denied others.
We will not stop. We will not give up.
You should have expected us.