search results matching tag: The Intercept

» channel: nordic

go advanced with your query
Search took 0.000 seconds

    Videos (81)     Sift Talk (4)     Blogs (4)     Comments (138)   

German engineers being told they've been targeted by GCHQ

radx says...

Last week, The Intercept published the Quadrennial Intelligence Community Review of 2009 which outlined industrial espionage.

Let's look at the list of German companies in question today: DTAG, NetCologne, Stellar, CETel and IABG. Two internet providers, two operators of satellite communications and a service provider with close ties to Airbus, ESA and EPCIP. All prime targets for industrial espionage, IABG and DTAG in particular.

A penetration of DTAG alone should be quite enough to convince our Attorney General to start an investigation, and the records about the penetration into Stellar's server centre are even more detailed.

So it's not just another violation of Article 10 of our Basic Law, it's industrial espionage. But I know very well that fuck all is going to come out of it, given how subservient our government is.

By the way, Firstlook Media and DER SPIEGEL does not equal Germany.

---------------
Edit:

Sorry for being cranky, anyway. I suppose for people outside Germany the interesting parts are that a) NSA/GCHQ own global communications and b) security for satellite net access is appaling.

The second, in particular, is rather frustrating, given that a great number of users of these are bound to be persons of interest otherwise unreachable through HUMINT. Quite the low hanging fruit, isn't it...

mxxcon said:

Bleh. This is hype and scaremongering by Germany.
(...)
If Germany is trying to stir public outrage, they should do better than this.

enoch (Member Profile)

Munk Debate on State Surveillance

chingalera says...

Freedoms are what we say they are and what we are willing to claim for ourselves. Laws are for morons and apes...domesticated primates.

Here's one I heard second-hand about the other day as reported early today by:
http://austriantribune.com/informationen/143636-nsa-allegedly-planted-beacons-servers-routers-and-other-network-gear-prior

Intercepting orders for servers, taking them to the Grinch-warehouse and outfitting them with virtually undetectable routing hardware, restoring the packaging material as it was and then sending them on to their 'customers.'

As the general here alludes to in his opener, the shit Snowden blew his whistle about resides in iceberg tips-If they reveal anything regarding the technology in place to keep track of ALL of humanity, military capabilities, breakthroughs in science or medicine etc., chances are good once the information gets to the masses the shits been around for quite some time.

What you think you know about their capabilities and the information hidden from the masses is old fucking news. The only meaningful question left is who are, "THEY?"

Trancecoach said:

"our freedoms"
Well, when you put it that way...
They should have a debate about, what are "our freedoms" anyway?

Lucy TRAILER 1 (2014) - Luc Besson, Scarlett Johansson Movie

SDGundamX says...

This is the worst kind of sci-fi to me. In fact, I don't even consider movies like this science fiction--they're science fantasy since they're not based on science at all.

Using our brain's capacity more efficiently will allow us to intercept wireless transmissions and read them NSA-style in our heads, grow and change our hair at will, and break every other known law of physics?

Give me a break. I'll pass on this one. Even if it is Sucker Punch redux.

How fast will the Russian Hackers takedown the tourists?

schlub says...

#1) It's called fear-mongering and the media loves it
#2) There are various exploits available to intercept wireless communications.
#3) New computers are set up for the lay-person who doesn't know the first thing about security and thus has many security features turned off.
#4) It's EASY to spoof 802.11 WiFi access points and act as a man-in-the-middle
#5) 3G/4G are not very secure protocols and are similar to 802.11/802.16
#6) I really doubt there are legions of hackers standing at the ready to take all UR DATAZ. These are most certainly automated attacks.
#7) Apple computers suck bloated donkey balls.

eric3579 (Member Profile)

bareboards2 says...

I don't have a TV so I've been watching the score on-line, which is not 100% current.

So I didn't know we had won until your message popped up in my inbox. Not that I thought we weren't going to.

Trying to see Richard Sherman's effect on the game, whether he intercepted anything. All I could find was a reference to Manning never throwing anywhere near him.

As I keep saying, I'm not a football fan. Not really. But people around here were going nuts, so I wandered over. Not even a fair weather fan!

And. I am so proud of this team. Learning about Sherman, and Lynch, and Coleman (that is the name of the deaf guy, right?) What an amazing crew.

eric3579 said:

Amazing victory! Congrats!!!!

TED | M. Hypponen - How the NSA betrayed the world's trust

CreamK says...

Very good speech from Hyppönen, once again. It's funny that thru the years, his english pronunciation hasn't improved a lot.. For those that don't know, he's F-Secure spokesperson (and i guess innovator too, he's been there from the start, too bad their products are crap but with out them we would have no security at all..) They made some important inventions in the mid-90s.Some of them CIA fought with tooth and nails like 128bit encryptions claiming it's a security risk if USA can not intercept every signal they get (yes, this problem is OLD...) but F-Secure and other companies, ISPs, everyone were united in this issue and those security measures are now a commonplace...

Why didn't OWS transform into a political movement?

billpayer says...

IMHO It would have become everything it needed to be...
Quite obviously it was destroyed because the Feds had access to everyone's phones and email. They incarcerated the leaders whenever they arose. They intercepted and locked down any meetings, they infiltrated important groups. The gov, the nsa and Bloomberg actively destroyed the movement with surveillance that no one could have foreseen or circumvented.

eric3579 (Member Profile)

speechless says...

Wow. This is like seeing a man in a cape with NSA on his chest!



"FEAR NOT CITIZEN! I have intercepted your message to your husband and we have dispatched the groceries you require to your home!

(thanks!)

eric3579 said:

intercepted your message to dag and fixed the video with the embed you provided

speechless (Member Profile)

eric3579 says...

intercepted your message to dag and fixed the video with the embed you provided

speechless said:

Hi,

Can you please allow msnbc as a "known" host?

I'm trying to fix my dead video here:

http://videosift.com/video/Rachel-Maddow-Hammers-Home-Why-Fox-News-Is-Bulls

with this embed:

<embed name="msnbc8bba9" src="http://www.msnbc.msn.com/id/32545640" width="640" height="280" FlashVars="launch=51283068&width=640&height=280" allowscriptaccess="always" allowFullScreen="true" wmode="transparent" type="application/x-shockwave-flash" pluginspage="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"></embed>

but siftbot tells me:

"Sorry, that video host is not supported, and you are not yet privileged to submit from unknown hosts. :-("

Thanks!

Glenn Greenwald Speaks Out

radx says...

And another one. So now that we have it in print, can we drop the pretence and call it what it is: the world's most sophisticated system of industrial espionage.

I'd complain about being spied upon by supposed friends and allies, but as recently declassified documents showed, the Allied Control Council reserved the right to spy on any and all communications in Germany, even beyond the reunification in 1990. So it's not like we had any privacy to begin with, only the illusion of privacy, lasting a whopping 61 years. And it's all legal. Unconstitutional, but legal.

Snowden's material included surveillance statistics, showing that the NSA is intercepting, on average, 20 million phone calls a day in this beautiful country of mine. Most of it will be plain old industrial espionage, just like the bugs they planted at the EU offices.
So I'm rather surprised at the lack of outrage coming from my government. I know they don't give a rat's ass about the privacy of us plebs, but industrial espionage on a massive scale? I'd assumed they wouldn't like that one bit. Not a peep though, only silent obedience.

Anyway, everything's presented as shocking news in the media, so I thought I'd just link a certain document, aptly named AN APPRAISAL OF THE TECHNOLOGIES OF POLITICAL CONTROL. As you can see, it is a report that was presented to the European Parliament in 1998.

Skip to 7.4.1:

The Interim report said that within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London then by Satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK.

And that was just Echelon, the 20th century cousin of PRISM, Stellar Wind, Tempora, whatever you want to call it. Much less sophisticated, much less capable.

I know, I know... paranoia. *shrug

Clever Document Encoding System That The NSA Can't Decipher.

Obama's reasonable response to the NSA controversy

dystopianfuturetoday says...

From the blog of David Simon (creator of the Wire)

07
JUN
Is it just me or does the entire news media — as well as all the agitators and self-righteous bloviators on both sides of the aisle — not understand even the rudiments of electronic intercepts and the manner in which law enforcement actually uses such intercepts? It would seem so.

Because the national eruption over the rather inevitable and understandable collection of all raw data involving telephonic and internet traffic by Americans would suggest that much of our political commentariat, many of our news gatherers and a lot of average folk are entirely without a clue.

You would think that the government was listening in to the secrets of 200 million Americans from the reaction and the hyperbole being tossed about. And you would think that rather than a legal court order which is an inevitable consequence of legislation that we drafted and passed, something illegal had been discovered to the government’s shame.

Nope. Nothing of the kind. Though apparently, the U.K.’s Guardian, which broke this faux-scandal, is unrelenting in its desire to scale the heights of self-congratulatory hyperbole. Consider this from Glenn Greenwald, the author of the piece: “What this court order does that makes it so striking is that it’s not directed at any individual…it’s collecting the phone records of every single customer of Verizon business and finding out every single call they’ve made…it’s indiscriminate and it’s sweeping.”

Having labored as a police reporter in the days before the Patriot Act, I can assure all there has always been a stage before the wiretap, a preliminary process involving the capture, retention and analysis of raw data. It has been so for decades now in this country. The only thing new here, from a legal standpoint, is the scale on which the FBI and NSA are apparently attempting to cull anti-terrorism leads from that data. But the legal and moral principles? Same old stuff.

http://davidsimon.com/we-are-shocked-shocked/

Democracy Now! - "A Massive Surveillance State" Exposed

dystopianfuturetoday says...

I read some interesting commentary from Divid Simon. (creator of the show The Wire and a fairly knowledgable guy on the subject of wiretaps.)

"Is it just me or does the entire news media — as well as all the agitators and self-righteous bloviators on both sides of the aisle — not understand even the rudiments of electronic intercepts and the manner in which law enforcement actually uses such intercepts? It would seem so.

Because the national eruption over the rather inevitable and understandable collection of all raw data involving telephonic and internet traffic by Americans would suggest that much of our political commentariat, many of our news gatherers and a lot of average folk are entirely without a clue.

You would think that the government was listening in to the secrets of 200 million Americans from the reaction and the hyperbole being tossed about. And you would think that rather than a legal court order which is an inevitable consequence of legislation that we drafted and passed, something illegal had been discovered to the government’s shame.

Nope. Nothing of the kind. Though apparently, the U.K.’s Guardian, which broke this faux-scandal, is unrelenting in its desire to scale the heights of self-congratulatory hyperbole. Consider this from Glenn Greenwald, the author of the piece: “What this court order does that makes it so striking is that it’s not directed at any individual…it’s collecting the phone records of every single customer of Verizon business and finding out every single call they’ve made…it’s indiscriminate and it’s sweeping.”

Having labored as a police reporter in the days before the Patriot Act, I can assure all there has always been a stage before the wiretap, a preliminary process involving the capture, retention and analysis of raw data. It has been so for decades now in this country. The only thing new here, from a legal standpoint, is the scale on which the FBI and NSA are apparently attempting to cull anti-terrorism leads from that data. But the legal and moral principles? Same old stuff."

The rest is here: http://davidsimon.com/we-are-shocked-shocked/

Democracy Now! - "A Massive Surveillance State" Exposed

MrFisk says...

"Transcript

This is a rush transcript. Copy may not be in its final form.

AMY GOODMAN: We begin with news that the National Security Agency has obtained access to the central servers of nine major Internet companies, including Google, Microsoft, Apple, Yahoo! and Facebook. The Guardian and The Washington Post revealed the top secret program on Thursday, codenamed PRISM, after they obtained several slides from a 41-page training presentation for senior intelligence analysts. It explains how PRISM allows them to access emails, documents, audio and video chats, photographs, documents and connection logs that allow them to track a person or trace their connections to others. One slide lists the companies by name and the date when each provider began participating over the past six years. But an Apple spokesperson said it had "never heard" of PRISM and added, quote, "We do not provide any government agency with direct access to our servers and any agency requesting customer data must get a court order," they said. Other companies had similar responses.

Well, for more, we’re joined by Glenn Greenwald, columnist, attorney, and blogger for The Guardian, where he broke his story in—that was headlined "NSA Taps in to Internet Giants’ Systems to Mine User Data, Secret Files Reveal." This comes after he revealed Wednesday in another exclusive story that the "NSA has been collecting the phone records of millions of Verizon customers." According to a new report in The Wall Street Journal, the scope of the NSA phone monitoring includes customers of all three major phone networks—Verizon, AT&T and Sprint—as well as records from Internet service providers and purchase information from credit card providers. Glenn Greenwald is also author of With Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful. He’s joining us now via Democracy—video stream.

Glenn, welcome back to Democracy Now! Lay out this latest exclusive that you have just reported in The Guardian.

GLENN GREENWALD: There are top-secret NSA documents that very excitingly describe—excitedly describe, boast about even, how they have created this new program called the PRISM program that actually has been in existence since 2007, that enables them direct access into the servers of all of the major Internet companies which people around the world, hundreds of millions, use to communicate with one another. You mentioned all of those—all those names. And what makes it so extraordinary is that in 2008 the Congress enacted a new law that essentially said that except for conversations involving American citizens talking to one another on U.S. soil, the NSA no longer needs a warrant to grab, eavesdrop on, intercept whatever communications they want. And at the time, when those of us who said that the NSA would be able to obtain whatever they want and abuse that power, the argument was made, "Oh, no, don’t worry. There’s a great check on this. They have to go to the phone companies and go to the Internet companies and ask for whatever it is they want. And that will be a check." And what this program allows is for them, either because the companies have given over access to their servers, as the NSA claims, or apparently the NSA has simply seized it, as the companies now claim—the NSA is able to go in—anyone at a monitor in an NSA facility can go in at any time and either read messages that are stored in Facebook or in real time surveil conversations and chats that take place on Skype and Gmail and all other forms of communication. It’s an incredibly invasive system of surveillance worldwide that has zero checks of any kind.

AMY GOODMAN: Glenn Greenwald, there is a chart prepared by the NSA in the top-secret document you obtained that shows the breadth of the data it’s able to obtain—email, video and voice chat, videos, photos, Skype chats, file transfers, social networking details. Talk about what this chart reveals.

GLENN GREENWALD: I think the crucial thing to realize is that hundreds of millions of Americans and hundreds of millions—in fact, billions of people around the world essentially rely on the Internet exclusively to communicate with one another. Very few people use landline phones for much of anything. So when you talk about things like online chats and social media messages and emails, what you’re really talking about is the full extent of human communication. And what the objective of the National Security Agency is, as the stories that we’ve revealed thus far demonstrate and as the stories we’re about to reveal into the future will continue to demonstrate—the objective of the NSA and the U.S. government is nothing less than destroying all remnants of privacy. They want to make sure that every single time human beings interact with one another, things that we say to one another, things we do with one another, places we go, the behavior in which we engage, that they know about it, that they can watch it, and they can store it, and they can access it at any time. And that’s what this program is about. And they’re very explicit about the fact that since most communications are now coming through these Internet companies, it is vital, in their eyes, for them to have full and unfettered access to it. And they do.

AMY GOODMAN: Glenn Greenwald, as you reported, the PRISM program—not to be confused with prison, the PRISM program—is run with the assistance of the companies that participate, including Facebook and Apple, but all of those who responded to a Guardian request for comment denied knowledge of any of the program. This is what Google said, quote: "We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege [that] we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data."

GLENN GREENWALD: Right. Well, first of all, after our story was published, and The Washington Post published more or less simultaneously a similar story, several news outlets, including NBC News, confirmed with government officials that they in fact have exactly the access to the data that we describe. The director of national intelligence confirmed to The New York Times, by name, that the program we identify and the capabilities that we described actually exist. So, you have a situation where somebody seems to be lying. The NSA claims that these companies voluntarily allow them the access; the companies say that they never did.

This is exactly the kind of debate that we ought to have out in the open. What exactly is the government doing in how it spies on us and how it reads our emails and how it intercepts our chats? Let’s have that discussion out in the open. To the extent that these companies and the NSA have a conflict and can’t get their story straight, let them have that conflict resolved in front of us. And then we, as citizens, instead of having this massive surveillance apparatus built completely secretly and in the dark without us knowing anything that’s going on, we can then be informed about what kinds of surveillance the government is engaged in and have a reasoned debate about whether that’s the kind of world in which we want to live.

AMY GOODMAN: Glenn Greenwald, on Thursday, Senate Intelligence Committee Chair Dianne Feinstein told reporters in the Senate gallery that the government’s top-secret court order to obtain phone records on millions of Americans is, quote, "lawful."

SEN. DIANNE FEINSTEIN: As far as I know, this is the exact three-month renewal of what has been the case for the past seven years. This renewal is carried out by the FISA court under the business record section of the PATRIOT Act, therefore it is lawful.

AMY GOODMAN: That was Senator Dianne Feinstein. Glenn Greenwald?

GLENN GREENWALD: Well, first of all, the fact that something is lawful doesn’t mean that it isn’t dangerous or tyrannical or wrong. You can enact laws that endorse tyrannical behavior. And there’s no question, if you look at what the government has done, from the PATRIOT Act, the Protect America Act, the Military Commissions Act and the FISA Amendments Act, that’s exactly what the war on terror has been about.

But I would just defer to two senators who are her colleagues, who are named Ron Wyden and Mark Udall. They have—are good Democrats. They have spent two years now running around trying to get people to listen to them as they’ve been saying, "Look, what the Obama administration is doing in interpreting the PATRIOT Act is so radical and so distorted and warped that Americans will be stunned to learn" — that’s their words — "what is being done in the name of these legal theories, these secret legal theories, in terms of the powers the Obama administration has claimed for itself in how it can spy on Americans."

When the PATRIOT Act was enacted—and you can go back and look at the debates, as I’ve done this week—nobody thought, even opponents of the PATRIOT Act, that it would ever be used to enable the government to gather up everybody’s telephone records and communication records without regard to whether they’ve done anything wrong. The idea of the PATRIOT Act was that when the government suspects somebody of being involved in terrorism or serious crimes, the standard of proof is lowered for them to be able to get these documents. But the idea that the PATRIOT Act enables bulk collection, mass collection of the records of hundreds of millions of Americans, so that the government can store that and know what it is that we’re doing at all times, even when there’s no reason to believe that we’ve done anything wrong, that is ludicrous, and Democratic senators are the ones saying that it has nothing to do with that law.

AMY GOODMAN: On Thursday, Glenn, Director of National Intelligence James Clapper said he stood by what he told Democratic Senator Ron Wyden of Oregon in March, when he said that the National Security Agency does "not wittingly" collect data on millions of Americans. Let’s go to that exchange.

SEN. RON WYDEN: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

JAMES CLAPPER: No, sir.

SEN. RON WYDEN: It does not?

JAMES CLAPPER: Not wittingly. There are cases where they could inadvertently, perhaps, collect, but not wittingly.

AMY GOODMAN: That’s the questioning of the head of the national intelligence, James Clapper, by Democratic Senator Ron Wyden. Glenn Greenwald?

GLENN GREENWALD: OK. So, we know that to be a lie, not a misleading statement, not something that was sort of parsed in a way that really was a little bit deceitful, but an outright lie. They collect—they collect data and records about the communications activities and other behavioral activities of millions of Americans all the time. That’s what that program is that we exposed on Wednesday. They go to the FISA court every three months, and they get an order compelling telephone companies to turn over the records, that he just denied they collect, with regard to the conversations of every single American who uses these companies to communicate with one another. The same is true for what they’re doing on the Internet with the PRISM program. The same is true for what the NSA does in all sorts of ways.

We are going to do a story, coming up very shortly, about the scope of the NSA’s spying activities domestically, and I think it’s going to shock a lot of people, because the NSA likes to portray itself as interested only in foreign intelligence gathering and only in targeting people who they believe are guilty of terrorism, and yet the opposite is true. It is a massive surveillance state of exactly the kind that the Church Committee warned was being constructed 35 years ago. And we intend to make all those facts available so people can see just how vast it is and how false those kind of statements are.

AMY GOODMAN: Let’s go back to Senate Intelligence Committee Chair Dianne Feinstein. Speaking on MSNBC, she said the leak should be investigated and that the U.S. has a, quote, "culture of leaks."

SEN. DIANNE FEINSTEIN: There is nothing new in this program. The fact of the matter is that this was a routine three-month approval, under seal, that was leaked.

ANDREA MITCHELL: Should it be—should the leak be investigated?

SEN. DIANNE FEINSTEIN: I think so. I mean, I think we have become a culture of leaks now.

AMY GOODMAN: That was the Senate Intelligence Committee chair, Dianne Feinstein, being questioned by MSNBC’s Andrea Mitchell. Glenn Greenwald, your final response to this? And sum up your findings. They’re talking about you, Glenn.

GLENN GREENWALD: I think Dianne Feinstein may be the most Orwellian political official in Washington. It is hard to imagine having a government more secretive than the United States. Virtually everything that government does, of any significance, is conducted behind an extreme wall of secrecy. The very few leaks that we’ve had over the last decade are basically the only ways that we’ve had to learn what our government is doing.

But look, what she’s doing is simply channeling the way that Washington likes to threaten the people over whom they exercise power, which is, if you expose what it is that we’re doing, if you inform your fellow citizens about all the things that we’re doing in the dark, we will destroy you. This is what their spate of prosecutions of whistleblowers have been about. It’s what trying to threaten journalists, to criminalize what they do, is about. It’s to create a climate of fear so that nobody will bring accountability to them.

It’s not going to work. I think it’s starting to backfire, because it shows their true character and exactly why they can’t be trusted to operate with power in secret. And we’re certainly not going to be deterred by it in any way. The people who are going to be investigated are not the people reporting on this, but are people like Dianne Feinstein and her friends in the National Security Agency, who need investigation and transparency for all the things that they’ve been doing.

AMY GOODMAN: Glenn Greenwald, we want to thank you for being with us. Is this threat of you being investigated going to deter you in any way, as you continue to do these exclusives, these exposés?

GLENN GREENWALD: No, it’s actually going to embolden me to pursue these stories even more aggressively.

AMY GOODMAN: Glenn Greenwald, I want to thank you for being with us, columnist and blogger for The Guardian newspaper. We’ll link to your exposés on our website, "NSA Taps in to Internet Giants’ Systems to Mine User Data, Secret Files Reveal", as well as "NSA Collecting Phone Records of Millions of Verizon Customers Daily"." - Democracy Now!



Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists

Beggar's Canyon