National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.
The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.
Read moreThe NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by redirecting users to a copycat site which relays all the data entered to NSA data banks.
Brazilian television network Globo News released a report based on classified data divulged by former CIA worker Edward Snowden on Sunday. The report itself blew the whistle on US government spying on Brazilian oil giant Petrobras, but hidden in amongst the data was information the NSA had impersonated Google to get its hands on user data.
Read moreThe NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe from the leading security expert and cryptographer Bruce Schneier.
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden.
Read moreUS and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.
The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.
Read moreGuardian editors on Tuesday revealed why and how the newspaper destroyed computer hard drives containing copies of some of the secret files leaked by Edward Snowden. The decision was taken after a threat of legal action by the government that could have stopped reporting on the extent of American and British government surveillance revealed by the documents.
It resulted in one of the stranger episodes in the history of digital-age journalism. On Saturday 20 July, in a deserted basement of the Guardian's King's Cross offices, a senior editor and a Guardian computer expert used angle grinders and other tools to pulverise the hard drives and memory chips on which the encrypted files had been stored.
Read moreThe email service reportedly used by surveillance whistleblower Edward Snowden abruptly shut down on Thursday after its owner cryptically announced his refusal to become "complicit in crimes against the American people."
Lavabit, an email service that boasted of its security features and claimed 350,000 customers, is no more, apparently after rejecting a court order for cooperation with the US government to participate in surveillance on its customers. It is the first such company known to have shuttered rather than comply with government surveillance. Silent Circle, another provider of secure online service.
Read moreGermany’s BND intelligence service sends “massive amounts” of intercepts to the NSA daily, according to a report based on Edward Snowden’s leaks. It suggests a tight relationship has been developed between the two agencies – which the BND claims is legal.
Documents leaked by former NSA contractor Snowden and obtained by Der Spiegel revealed that the 500 million pieces of phone and email communications metadata collected by the NSA in Germany last December were “apparently” provided with the BND’s approval. The data was allegedly handed over at two collection sites as part of the operation titled “Germany – Last 30 days.”
Read moreMajor telecom companies have been assisting the UK intelligence agency GCHQ by granting access to all the traffic passing through their fiber-optic cables – and by developing Trojan software, leaked papers obtained by German media reveal.
The classified slides obtained by German news agencies Süddeutsche Zeitung (SZ) and NDR list global telecommunication operators among the collaborators of the UK’s Government Communications Headquarters. The documents are said to have been leaked by former NSA contractor Edward Snowden. The 2009-dated GCHQ slides reportedly provide the names of the following companies.
Read moreThe US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain's intelligence gathering programmes. The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands.
"GCHQ must pull its weight and be seen to pull its weight," a GCHQ strategy briefing said. The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency.
Read moreA top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.
The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland