bothernews

Posts Tagged ‘NSA

Ex-spy says NSA did mass surveillance during Utah Olympics

leave a comment »

 


June 2, 2017

SALT LAKE CITY (AP) — A former top spy agency official who was the target of a government leak investigation says the National Security Agency conducted blanket surveillance in Salt Lake City during the 2002 Winter Olympics in Utah, according to court documents.

Ex-NSA official Thomas Drake wrote in a declaration released Friday that the NSA collected and stored virtually all electronic communications going into or out of the Salt Lake City area, including the contents of emails and text messages.

“Officials in the NSA and FBI viewed the Salt Lake Olympics Field Op as a golden opportunity to bring together resources from both agencies to experiment with and fine tune a new scale of mass surveillance,” Drake wrote.

It comes as part of a lawsuit filed by attorney Rocky Anderson, who was the mayor of Salt Lake City during the games held a few months after the Sept. 11, 2001, attacks. Anderson said the document was disclosed to the U.S. Department of Justice on Wednesday.

Full Story:  http://hosted.ap.org/dynamic/stories/U/US_OLYMPICS_NSA_LAWSUIT?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-06-02-20-04-38

Advertisements

Lest We Forget: The NSA already has backdoor access to your iPhone

leave a comment »

Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using  DROPOUT JEEP:

From 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

 

Jewel v NSA: EFF Allowed to Conduct Discovery Against Unwarranted NSA Surveillance Programs

leave a comment »

From:  https://www.eff.org/deeplinks/2016/02/big-victory-judge-pushes-jewel-v-nsa-forward

February 19, 2016 | By David Greene

Big Victory: Judge Pushes Jewel v. NSA Forward

We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.

This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.

This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.

New NSA Documents Shine More Light into Black Box of Executive Order 12333

leave a comment »

 

In the NSA’s own words, EO 12333 is "the primary source of the NSA’s foreign intelligence-gathering authority."

Surveillance conducted under EO 12333 is implemented almost entirely by the executive branch, without review by Congress or the courts. EO 12333 lacks even the plainly inadequate legislative and judicial checks on the two more well-known surveillance authorities — Section 215 of the Patriot Act and the FISA Amendments Act.

 

 

Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA | Electronic Frontier Foundation

leave a comment »

 

October 24, 2014

Today EFF filed our latest brief in Jewel v. NSA, our longstanding case on behalf of AT&T customers aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans’ communications. The brief specifically argues that the Fourth Amendment is violated when the government taps into the Internet backbone at places like the AT&T facility on Folsom Street in San Francisco.

Full Story:  Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA | Electronic Frontier Foundation

 

[NOTE:]

Fourth Amendment to the Constitution of the United States of America:

The right of the people to be secure in their persons, houses, papers, and effects,

against unreasonable searches and seizures, shall not be violated,

and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation,

and particularly describing the place to be searched, and the persons or things to be seized

Written by bothernews

October 26, 2014 at 5:27 pm