Glenn Greenwald, the Guardian columnist who has broken a series of stories about the National Security Agency's surveillance powers, said Sunday that even low-level NSA analysts have the ability to search through private communications.
Greenwald's comments defended bombshell revelations from former NSA contractor Edward Snowden at the time, which have since come under scrutiny by intelligence analysts. Greenwald is set to testify before Congress on Wednesday, along with other NSA surveillance critics and analysts. Greenwald dared NSA officials to dispute the claims when testifying this week.Read more
National security agency intercepted the messages that came from the German Government. The documents that were published by Edward Snowden were marked with a special code SI. This code indicates that the information in these documents is based on wiretapping materials. Part of the documents belongs to the Government of Germany. This brings us to the conclusion.
The German Federal Government may spy on by NSA. The sources in the defense circles in the U.S. have confirmed the information about surveillance the government by the representatives of the U.S. intelligence services to German edition.Read more
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.
The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed. If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user.Read more
Edward Snowden was wanted after he had exposed the information about surveillance programs made by U.S. secretive agencies all over the world. His exposure opened the question about privacy. In U.S. where PRISM is used overall anonymity becomes a rarity. Someone accepted it, someone is angry, but everybody agrees that there is no easy way to avoid NSA curious eye.
“5 years ago, I would say that mobile phone is a small informer in your pocket and that you should get rid of it and should not carry. It doesn't matter now. There are automatic license plate readers which allow watching you.Read more
Deutsche Telecom Company staff cooperates with American secret services for more than 10 years. According to Focus the representatives of the company provided information to FBI from 2000. There occurred a document in edition of Focus magazine that points the German company representatives cooperate with FBI very close from 2000.
This cooperation began when German company had bought American company Voice Stream Wireless (now known as T-Mobile). After purchasing American company Germans had to sign a special agreement with American secret services that requires the disclosure of information.Read more
It is possible with the help of "Back up my data" in a mobile operating system. The co-worker of the “Elecontric Frontier Foundation” Micah Lee announced that the function "Back up my data" in OS Android sends passwords from Wi-Fi and private information in plaintext to Google.
"Since backup and restore is such a useful feature, and since it's turned on by default, it's likely that the vast majority of Android users are syncing this data with their Google accounts. Because Android is so popular, it's likely that Google has plaintext Wi-Fi passwords for the majority of users,” Lee pointed out.Read more
Katherine Losse claims social network's customer support could access any user's account with a master password. Facebook employees at one time had access to a “master password” that granted them access to every one of the accounts on the social network, according to a former employee.
And while “more secure forms of logging in to repair accounts” were later put into operation, Katherine Losse, who joined Facebook in 2005 as its 51st employee, told The Guardian Wednesday that members of the site should avoid sharing personal information, especially now that the scope of surveillance by the U.S. government has come to light.Read more
Microsoft worked hand-in-hand with the United States government in order to allow federal investigators to bypass encryption mechanisms meant to protect the privacy of millions of users, Edward Snowden.
According to an article published on Thursday by the British newspaper, internal National Security Agency memos show that Microsoft actually helped the federal government find a way to decrypt messages sent over select platforms, including Outlook.com Web chat, Hotmail email service, and Skype. Snowden, the 30-year-old former systems administrator for NSA contractor Booz Allen Hamilton, provided the paper with files detailing.Read more
About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense.
The Chief Security Officer at a tech company is primarily concerned with keeping its information inside the company. Now working for an agency that tries to gather as much information as it can, Kelly's new job is sort of a complete reversal. Facebook, among other tech companies, has distanced itself from the government, claiming it only cooperates when it is legally required to.Read more
According to the documents, leaked by Edward Snowden to the Guardian, the UK’s Government Communications Headquarters (GCHQ) collects vast amounts of data from fibre-optic systems. The scale of the operation is massive, and the use of the data, also shared with the NSA is a big concern.
The project called Tempora aims to attach probes on 90% of the cables running through the UK. In the last 5 heart Tempora is half way - it has access to 200 fibre-optic cables (including the transatlantic traffic), collecting and analysing data from 46 of them. This adds up to 600 million “communication events” daily when full content of transmissions is preserved for 3 days and metadata for 30.Read more