WASHINGTON: Federal prosecutors to charge former #NSA contractor Harold T. Martin with violating Espionage Act; memo shows expanded allegations ahead of Friday court appearance – WP – @AceNewsServices

#AceNewsReport – Oct.20: This is a follow up report on this case today the Contractor arrested on suspicion of having stolen #NSA ‘source code’ designed to hack into foreign computer systems – NY Times – @AceNewsServices // Ace News Services that the #NSA will throw the book at this ex #NSA employee for breaking into their encrypted security system

The contractor is called Hal Martin, a Navy veteran, his attorney confirms. First appeared in court in late August. Charges to be unsealed soon. Ian Duncan (@iduncan) 05/10/2016, 17:26 Contractor is called Hal Martin, a Navy veteran, his attorney confirms. First appeared in court in late August. Charges to be unsealed soon. twitter.com/charlie_savage… […]

Today Thursday the Federal prosecutors to charge former #NSA contractor Harold T. Martin with violating Espionage Act; memo shows expanded allegations ahead of Friday court appearance – Washington Post

http://wapo.st/2dqR06x

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

WASHINGTON: Booz Allen Hamilton shares go negative after #NSA contractor who worked for firm arrested, accused of stealing info – CNBC – as insider threats within the NSA becomes a realisation within the security services – @AceNewsServices

#AceNewsReport – Oct.06: This is an update on the charge of Harold Thomas Martin arrested in August
https://acenewsservices.wordpress.com/2016/10/05/washington-contractor-arrested-on-suspicion-of-having-stolen-nsa-source-code-designed-to-hack-into-foreign-computer-systems-ny-times-acenewsservices

NSA contractor arrest highlights challenge of insider threat The arrest of a National Security Agency contractor for allegedly stealing classified information was the second known case of a government contractor being publicly accused of removing secret data from the intelligence agency since 2013. As the risk of contractors is real, Justice Dept. national security head says As US Justice Department identifies #NSA contractor charged with taking classified materials as Harold Thomas Martin, arrested after August search of residence – @markberman http://bit.ly/2e2o9FN

The Justice Department’s John Carlin talks about the arrest of a #NSA contractor for allegedly stealing government secrets.

As the news was released by the New York Times security firm Booz Allen Hamilton shares go negative after #NSA contractor who worked for firm arrested, accused of stealing info – CNBC
http://cnb.cx/2dvGSXT

Later @TheJusticeDept says it has filed charges against a govt contractor with top secret clearance, accuses him of taking classified documents

ORFb7uen_normal.jpg Mark Berman (@markberman)
05/10/2016, 17:37
.@TheJusticeDept says it has filed charges against a govt contractor with top secret clearance, accuses him of taking classified documents pic.twitter.com/UgAouTPoMk

Statement: US officials allege NSA contractor stole 6 classified documents ‘critical to a wide variety of national security issues‘ @markberman http://bit.ly/2e2o9FN

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

WASHINGTON: Contractor arrested on suspicion of having stolen #NSA ‘source code’ designed to hack into foreign computer systems – NY Times – @AceNewsServices

#AceNewsReport – Oct.05: Contractor is called Hal Martin, a Navy veteran, his attorney confirms. First appeared in court in late August. Charges to be unsealed soon.

o1XGoU2y_normal.jpeg Ian Duncan (@iduncan)
05/10/2016, 17:26
Contractor is called Hal Martin, a Navy veteran, his attorney confirms. First appeared in court in late August. Charges to be unsealed soon. twitter.com/charlie_savage…

N.S.A. Contractor Arrested in Possible New Theft of Secrets

eEelhvcE_normal.jpg Charlie Savage (@charlie_savage)
05/10/2016, 17:19
N.S.A. Contractor Arrested in Possible New Theft of Secrets
nytimes.com/2016/10/06/us/…

Contractor arrested on suspicion of having stolen NSA ‘source code‘ designed to hack into foreign computer systems – NY Times
http://nyti.ms/2dSyIYV

Ace Related News:
Snowden 2.0: NSA contractor arrested for stealing malware
https://www.rt.com/usa/361704-nsa-contractor-arrested-snowden/

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#nsa

#AceSecurityNews Report: Yahoo secretly built software program to search customer’s incoming emails for US intelligence officials, sources tell Reuters; unclear if Yahoo handed over any data but why would you build it in the first place – @AceNewsServices

#AceNewsReport – Oct.04: This is a follow up report on hacking of email accounts back in 2014 ….
https://acenewsservices.wordpress.com/2016/09/22/acesecuritynews-statement-on-the-yahoo-data-breach-the-bbc-report-on-the-yahoo-hack-of-more-than-500-million-accounts-disclosed-today-notes-that-it-appears-to-be-greater-than-recent-prominent-

Report: Yahoo secretly built software program to search customer’s incoming emails for US intelligence officials, sources tell Reuters; unclear if Yahoo handed over any data

http://reut.rs/2dBQpyq

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews, #nsa

WASHINGTON: #NSA Cyber Weapons Hacked ‘ Shadow Brokers ‘ ask for $1-million in Bitcoin for the data stolen from #NSA’s Equation Group – @AceNewsServices

#AceNewsReport – Aug.19: This is a follow up report to our Just In report on Thursday about did hackers steal #NSA cyber weapons ?https://acenewsservices.wordpress.com/2016/08/18/washington-did-the-nsa-get-hacked-as-a-group-called-shadow-broker-is-auctioning-its-cyber-weapons-online-acenewsservices

A hacking group calling itself the Shadow Brokers says it has infiltrated the NSA’s Equation Group and is now looking to sell off “cyber weapons” used by the agency, asking for a payment of $1 billion in bitcoin.

Who could be behind the hack and what does it mean for the future of the NSA and cyber warfare?

Sputnik International contributed to this report ..

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

WASHINGTON: Did the #NSA get hacked as a group called ‘ Shadow Broker ‘ is auctioning its cyber weapons online – @AceNewsServices

#AceNewsGroup – Aug.18: Did the NSA Get Hacked?

A group calling itself the “Shadow Broker” is auctioning off what it says are the agency’s cyber weapons.

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acenewsreport, #nsa

‘ CONGRESS MULLS OVER HOW TO CURTAIL NSA’S COLLECTION OF AMERICAN’S PHONE RECORDS ‘

#AceWorldNews – WASHINGTON – October 28 – While Congress mulls how to curtail the NSA’s collection of Americans’ telephone records, impatient civil liberties groups are looking to legal challenges already under-way in the courts to limit government surveillance powers.

Three appeals courts are hearing lawsuits against the bulk phone records program, creating the potential for an eventual Supreme Court review.

Judges in lower courts, meanwhile, are grappling with the admissibility of evidence gained through the NSA’s warrantless surveillance.

Source:

#ANS2014 

#nsa, #supreme-court, #washington

‘ NSA Monitor’s Students in School on Social Media ‘

#AceNewsServices – ALABAMA – September 28 – A secret surveillance program has been running in an Alabama high schools after a phone call from the National Security Agency alerted the district to a ‘violent threat’.

School officials claim the system began monitoring students’ social media accounts in Huntsville City Schools 18 months ago, when the NSA tipped them off that a student was making violent threats on Facebook.

' SAFe, or Students Against Fear '

‘ SAFe, or Students Against Fear ‘

The schools began scanning Facebook and other sites for signs of gang activity, watching for photos of guns, photos of gang signs and threats of violence, as part of a program called SAFe, or Students Against Fear.

Internal documents explaining the program were obtained by AL.com, showing four different students – three males and one female – posing on Facebook with handguns. 

None are on school grounds. Some of the students were already in alternative programs for skipping or drinking. Three are listed as expelled and one was referred for counseling.

Huntsville schools Superintendent Casey Wardynski told the news site that there was a ‘foreign connection’, which was why the NSA – a U.S. agency responsible for foreign intelligence – became involved.

He said the student in Huntsville had made the threats while chatting on-line with a group that included an individual in Yemen.

Mr Wardynski, a former U.S. Army colonel appointed as superintendent in Huntsville in 2011, said that about a year and a half ago the NSA called Huntsville and reported a high school student had made a threat on Facebook to injure a teacher.

Al Lankford, the city’s school security officer, told AL.com that he took the NSA phone call and that security officers went to the high school and eventually searched the boy’s car.

Source: 

#ANS2014 

#alabama, #facebook, #huntsville, #nsa, #safe, #yemen

‘ Yahoo Releases Secret Documents from 2007 – 2008 Challenge to Surveillance Laws ‘

#AceNewsServices – UNITED STATES – Release of Documents – September 16 – Today we are pleased to announce the release of more than 1,500 pages of once-secret papers from Yahoo’s 2007-2008 challenge to the expansion of U.S. surveillance laws.

In 2007, the U.S. Government amended a key law to demand user information from online services. We refused to comply with what we viewed as unconstitutional and overbroad surveillance and challenged the U.S. Government’s authority.

Our challenge, and a later appeal in the case, did not succeed. The Foreign Intelligence Surveillance Court (FISC) upheld the predecessor to Section 702 of the FISA Amendments Act. The Court ordered us to give the U.S. Government the user data it sought in the matter.

The FISC and the FISC-R are “secret” courts that oversee requests by the U.S. Government for surveillance orders and other types of legal process in national security investigations. The Court’s hearings and records are closed to the public and typically classified. For example, our role in the 2007-2008 lawsuit remained classified until 2013. In spite of this, we fought to declassify and to share the findings from the case. A decision to open FISC or FISC-R records to the public is extremely rare. 

We consider this an important win for transparency, and hope that these records help promote informed discussion about the relationship between privacy, due process, and intelligence gathering.

Key takeaways from these documents include:

  • An expanded version of the FISC-R opinion in the case, originally released in 2008 in a more redacted form.
  • The release of the never-before-seen 2008 FISC opinion that we challenged on appeal.
  • The parties’ briefs, including some of the lower court briefings in the appendices.
  • An Ex-Parte Appendix of classified filings.
  • A partially redacted certification filed with the FISC, as well as a mostly unredacted directive that Yahoo received.  

Despite the declassification and release, portions of the documents remain sealed and classified to this day, unknown even to our team. The released documents underscore how we had to fight every step of the way to challenge the U.S. Government’s surveillance efforts. At one point, the U.S. Government threatened the imposition of $250,000 in fines per day if we refused to comply.

Our fight continues. We are still pushing for the FISC to release materials from the 2007-2008 case in the lower court. The FISC indicated previously that it was waiting on the FISC-R ruling in relation to the 2008 appeal before moving forward. Now that the FISC-R matter is resolved, we will work hard to make the materials from the FISC case public, as well.

Users come first at Yahoo. We treat public safety with the utmost seriousness, but we are also committed to protecting users’ data. We will continue to contest requests and laws that we consider unlawful, unclear, or overbroad.

NOTE: As there is no FISC-R public docket, we’d like to thank the Center for Democracy and Technology (LINK) for hosting the documents released by the FISC.

By Ron Bell, General Counsel

Source: 

Ace Related News: Yahoo Fined $250,000 for not Supplying Data to NSA  

#ANS2014

#fisa, #nsa, #the-foreign-intelligence-surveillance-courtfisc, #united-states

‘ NSA and FBI Covertly Monitored Emails of Prominent Muslim-Americans ‘

#AceWorldNewsUNITED STATES – July 18  – The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies.

asim-handshake

According to documents provided by NSA whistle-blower Edward Snowden, the list of Americans monitored by their own government includes:

Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”—short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens.

namesgrabredacted

The spreadsheet shows 7,485 email addresses listed as monitored between 2002 and 2008. Many of the email addresses on the list appear to belong to foreigners whom the government believes are linked to Al Qaeda, Hamas, and Hezbollah. Among the Americans on the list are individuals long accused of terrorist activity, including Anwar al-Awlaki and Samir Khan, who were killed in a 2011 drone strike in Yemen.

But a three-month investigation by The Intercept—including interviews with more than a dozen current and former federal law enforcement officials involved in the FISA process—reveals that in practice, the system for authorizing NSA surveillance affords the government wide latitude in spying on U.S. citizens.

The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.

“I just don’t know why,” says Gill, whose AOL and Yahoo! email accounts were monitored while he was a Republican candidate for the Virginia House of Delegates. “I’ve done everything in my life to be patriotic. I served in the Navy, served in the government, was active in my community—I’ve done everything that a good citizen, in my opinion, should do.”

raghead1

(An Intercept video interview with Gill and Ghafoor and Awad on this link) 

They were directed by Nadia Hallgren and Intercept co-founder Laura Poitras.) 

#ANS2014 

 

#edward-snowden, #agha-saeed, #council-on-american-islamic-relations, #faisal-gill, #fbi, #george-w-bush, #national-security-agency, #nihad-awad, #nsa

' Classified Files Leaked by Danish Media Reveal NSA Data Hoover Rampart Able to Capture Three Terabits of Data Per Second From Fibre Cables '

#AceNewsServices – BRUSSELS – June 21 – Classified files leaked to Danish media suggest some EU states are allowing US spies to install surveillance equipment on cables in order to intercept the emails, private phone calls, and Internet chats of their citizens.


​(Fibre Optic Surveillance Routes)

Large amounts of data are said to be swept up via a programme codenamed "RAMPART-A", according to documents disclosed by former US agent Edward Snowden and made public on Wednesday (18 June) by Dagbladet Information and The Intercept.

Allegations had previously surfaced that member states collaborate to some extent with the US-led surveillance outfit, the National Security Agency (NSA).

At least 15 member states have some sort of partnership with the NSA, according to former Guardian journalist Glenn Greenwald.

Australia, Canada, New Zealand, and the UK have a more robust “Five Eyes” surveillance pact with the Americans.

But the Danish revelations suggest the extent of the collaboration with member states outside the Five Eyes pact is far greater than originally thought.


​The NSA documents under RAMPART-A say “foreign partners provide access to cables and host US equipment.”


​The equipment allows the Americans to hoover up some three terabits of data every second from the cables.

​(The documents reveal the NSA has set up at least 13 RAMPART-A sites).

Nine are said to have been active last year.

Among the reportedly willing “foreign partners” are Denmark and Germany.

Ryan Gallagher at The Intercept says the two governments “appear to be associated with RAMPART-A because it is the only NSA cable-access initiative that depends on the cooperation of third-party partners.”


#ANS2014

#nsa, #rampart

Connection Between Flight 370 and Snowden NSA Smartphone Leak!

ok, this is me using common sense here with Snowden and flight Flight 370, the missing Malaysian flight. Now Snowden said “They can turn on an App and tap into your Smart phone even when the BATTERY IS OUT” He said it, the video below is a reminder of the interview. Now, if the NSA for example can track you or I 10,000 miles away, 20,000 miles away with a phone powered off or with no battery in it, HOW ON EARTH CAN’T THEY TRACK FLIGHT 370! What Snowden said and using common sense and logic, we see clearly, 100% that this flight, crashed or not could and would have been monitored till it crashed or till it landed. I think it’s a VERY fair assumption to say, flight 370 is a black ops operation, we are being lied to. There is a video at the very bottom explaining all this, but check what Snowden said about smart phones

Edward Snowden’s recent revelation that the NSA can bug cell phones even when they are turned off left some experts split on whether it is true or not. But a group of hackers claim that at least there is a way to protect your phone from spies’ ears. Snowden, who exposed the American government’s secret mass surveillance program, has been making headlines in the media for almost a year with shocking details about the scale of snooping by the National Security Agency (NSA). In last week’s interview with NBC, the former CIA employee yet again added to the spreading privacy panic when he said the NSA can actually eavesdrop on cellphones even when they are turned off. “Can anyone turn it on remotely if it’s off?” Williams asked Snowden referring to the smartphone he used for travel to Russia for the interview. “Can they turn on apps? Did anyone know or care that I Googled the final score of the Rangers-Canadiens game last night because I was traveling here?” “I would say yes to all of those,” Snowden replied. “They can absolutely turn them on with the power turned off to the device,” he added.

It is not news that American (and possibly not only American) special services have been able to use mobile phones as a spying tool for at least a decade. Back in 2006, media reported that the FBI applied a technique known as a “roving bug” which allowed them to remotely activate a cell phone’s microphone and listen to nearby conversations. Pinpointing a person’s location to within just a few meters has not been a problem either thanks to a tracking device built into mobile phones. This option, a party-spoiler for criminals, has also been helpful in finding people who have gone missing or got into trouble. The general belief has been that removing a battery would make tracking impossible. In July last year, Washington Post wrote that “By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off.” The agency used it to help American forces in Iraq. Joint Special Operations Command (JSOC) called the method “The Find,” and “it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq,” the paper wrote.

The video below explains it with the use of a real iPhone.

There are easier ways to enter a complete shutdown, according to Wired. You can hold the home and power buttons simultaneously for 10 seconds without the DFU button sequence. This will put the phone in too low level a state for anything to able to interact with its baseband.

#edward-snowden, #call-made-from-flight-370, #cant-find-a-plane-full-of-people-with-phones, #detecting-anyone-with-a-phone, #flight-mh370, #hacking-a-turned-off-smart-phone, #lies, #mobile-phones, #nsa, #smart-phones, #snowden, #snowden-flight-370-connection

NSA releases single Snowden e-mail as Kerry tells him ‘MAN UP’ before interview with US media

The National Security Agency said Thursday that Edward Snowden sent supervisors only one e-mail when he worked there, and it did not protest the nature of NSA surveillance programs. In the e-mail to the Office of General Counsel, Snowden posed a legal question about a training program. “There are numerous avenues that Mr. Snowden could have used to raise other concerns or whistleblower allegations,” the NSA said in a statement. “We have searched for additional indications of outreach from him in those areas and to date have not discovered any engagements related to his claims.”

In an interview with NBC News, Snowden said he told the NSA about his concerns about its widespread methods of intelligence gathering.

“I actually did go through channels, and that is documented,” Snowden said. “The NSA has records, they have copies of emails right now to their Office of General Counsel, to their oversight and compliance folks, from me raising concerns about the NSA’s interpretations of its legal authorities. … The response more or less, in bureaucratic language, was, ‘You should stop asking questions.'”

Snowden — who remains in Russia, which has granted him temporary asylum — faces espionage charges in the United States.

Email:

This comes on the day John Kerry 68th United States Secretary of State said “‘Man Up And Come Home'”

US Secretary of State John Kerry has challenged Edward Snowden to “man up and come back to the United States”, after the whistleblower admitted he wanted to return home. Mr Kerry’s comments follow the former National Security Agency contractor’s interview with NBC, his first for US media since he fled the country after leaking a huge volume of classified documents. Now living in Russia on a temporary grant of asylum, Mr Snowden told the network he took action in the belief that he was serving his country in exposing the surveillance programs of the NSA. “I don’t think there’s ever been any question that I’d like to go home,” Snowden said in a segment of the interview. “Now, whether amnesty or clemency ever becomes a possibility is not for me to say. That’s a debate for the public and the government to decide. But, if I could go anywhere in the world, that place would be home.” And Mr Kerry, speaking before NBC aired that portion of the interview, said: “If Mr Snowden wants to come back to the United States, we’ll have him on a flight today. A patriot would not run away.


Susan Rice has denied Mr Snowden’s recent claims

“He should man up and come back to the United States. If he has a complaint about what’s the matter with American surveillance, (he should) come back here and stand in our system of justice and make his case. “If he cares so much about America and he believes in America, he should trust the American system of justice.” Mr Snowden had also said in an earlier part of his interview that he worked undercover and overseas for the CIA and the NSA. He claimed he had a far more important role in US intelligence than the government has acknowledged. “I was trained as a spy in sort of the traditional sense of the word, in that I lived and worked undercover overseas,” he said. National security adviser Susan Rice insisted in a CNN interview that Mr Snowden never worked undercover. Mr Snowden said he never intended to end up in Russia but was forced to go there because Washington decided to “revoke my passport.” In response, Mr Kerry said: “Well, for a supposedly smart guy, that’s a pretty dumb answer, after all. “I think he’s confused. I think it’s very sad. But this is a man who has done great damage to his country.”

All this after:
Edward Snowden: ‘I Worked As A Spy Overseas’


Snowden has received support during demonstrations in the US

Fugitive whistleblower Edward Snowden has said he “trained as a spy” and worked “undercover overseas” for intelligence agencies. In his first interview in American media, he rejected claims he was merely a junior contractor, saying he worked “at all levels from the bottom on the ground, all the way to the top”. The 30-year-old, who has been charged in the US with espionage, was granted asylum by Russia in August, 2013, after instigating a series of leaks on mass surveillance in America and around the world. In the NBC News interview, due to air in full on Wednesday, Snowden defended himself against claims he had minimal intelligence experience before he released classified documents revealing the National Security Agency’s programme of phone and internet surveillance. “I was trained as a spy in sort of the traditional sense of the word in that I lived and worked undercover overseas – pretending to work in a job that I’m not – and even being assigned a name that was not mine,” he said. He said he had worked covertly as “a technical expert” for the Central Intelligence Agency and the NSA, and as a trainer for the Defense Intelligence Agency.

“I don’t work with people,” he said. “I don’t recruit agents. What I do is I put systems to work for the United States. And I’ve done that at all levels from, from the bottom on the ground all the way to the top. “So when they say I’m a low-level systems administrator, that I don’t know what I’m talking about, I’d say it’s somewhat misleading.” After the leaks, Snowden travelled to Hong Kong, then headed to Moscow, where he was holed up in the Sheremetyevo Airport for days before he was eventually granted asylum. Secretary of State John Kerry, reacting to the interview, called Snowden a “man who has done great damage to his country”. “A patriot would not run away and look for refuge in Russia,” Mr Kerry told NBC’s Today. “He can come home but he’s a fugitive from justice.” Snowden is wanted in the US on charges including espionage.

#edward-snowden, #anonymous, #banking, #ceos, #conspiracies, #corporate-greed, #elections, #email, #espionage, #government, #john-kerry, #lies, #man-up, #national-security-agency, #nsa, #nsa-email, #politics, #ron-paul, #snowden, #snowden-e-mail, #spy, #strange-stories, #sue-rice, #wealth, #wikileaks

` NSA Records Almost All Domestic and International Phone Calls in Afghanistan ‘

#AceSecurityNews – NSA – May 23 – The NSA records almost all domestic and international phone calls in Afghanistan, similar to what it does in the Bahamas, WikiLeaks’ Julian Assange said.

Reports in the Washington Post and the Intercept had previously reported that domestic and international phone calls from two or more target states had been recorded and stored in mass as of 2013.

Both publications censored the name of one victim country at the request of the US government, which the Intercept referred to as ‘Country X’.

Assange says he cannot disclose how WikiLeaks confirmed the identity of the victim state for the sake of source protection, though the claim can be “independently verified” via means of “forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs.”


This is not the first time it has been revealed mass surveillance was being conducted on Afghanistan by the NSA. According to a book released by Der Spiegel entitled ‘Der NSA Komplex’, a program called ACIDWASH collects 30-40 million telephony metadata records per day from Afghanistan. ACIDWASH has been identified as being part of the MYSTIC program.

WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is #Afghanistan. https://t.co/vWwU4DJw0I#afpak
— WikiLeaks (@wikileaks) May 23, 2014
The Intercept, which Glenn Greenwald, who first broke the Edward Snowden revelations helped to found, had earlier named the Bahamas as having their mobile calls recorded and stored by a powerful National Security Agency (NSA) program called SOMALGET.

SOMALGET is part of a broader NSA program called MYSTIC, which the the NSA is using to gather metadata – including the numbers dialled and the time and duration of the calls – from phone calls in the Bahamas, Mexico, Kenya and the Philippines. SOMALGET by its nature is far more controversial, however, as it stores actual phone conversations for up to 30 days.

WikiLeaks initially opted not to reveal the name of ‘Country X’ as they were led to believe it could “lead to deaths” by Greenwald. WikiLeaks later accused The Intercept and its parent company First Look Media of censorship, saying they would go ahead and publish the name of the NSA-targeted country.

“We do not believe it is the place of media to ‘aid and abet’ a state in escaping detection and prosecution for a serious crime against a population,” Assange said in the statement.

Read More at: RT – 23/05/2104 – http://tinyurl.com/paehpu9

#ANS2014

#bahamas, #kenya, #mexico, #nsa, #philippines, #wikileaks

` US House of Representatives Approves Legislation to Prevent Bulk Collection of Data ‘

#AceSecurityNewsUNITED STATES – WASHINGTON – NSA – May 08 –  A US House of Representatives committee approved legislation on Wednesday that would limit the National Security Agency’s bulk collection of domestic telephone metadata. By a vote of 32 to 0, the House Judiciary Committee advanced the USA Freedom Act, which would end the NSA’s wholesale gathering and storage of American phone data, leaving telecommunications companies responsible for retaining the records.

The bill would still allow the NSA to collect a person’s phone records, and those of people two “hops” or contacts away, if a judge on the Foreign Intelligence Surveillance Act court, which has been very generous to NSA spying requests in recent years, signs off on the request based on reasonable suspicion of so-called terrorism involvement.

A reform bill deemed as the toughest clampdown yet on the NSA’s collection of phone metadata is expected to move through a key US House committee this week, setting up a showdown between the bill and less stringent legislation supported by House leaders.

House of Representatives Judiciary Committee Chairman Bob Goodlatte (R-VA) will reportedly act on the USA Freedom Act on Wednesday after the bill sat dormant since its introduction in October by former judiciary committee chair and US Patriot Act author Jim Sensenbrenner (R-OH).

The bill is the favored legislative vehicle for privacy advocates that want to see reform of the NSA’s bulk collection of domestic phone call data. Congressional aides believe the bill will pass through the committee with bipartisan support, the Guardian reported. Privacy advocates believe the bill has real potential to pass in a general House vote should it get the chance.

The House Judiciary Committee’s USA Freedom Act was left for dead by House Republican leadership after a competing NSA reform bill was offered in March by House Intelligence Committee Chairman Mike Rogers. The intel committee’s proposal would allow the NSA to continue gathering domestic call data without a prior judicial order.

Hours after the Judiciary Committee announced it would markup its NSA bill on Wednesday, the Intelligence Committee said it would do the same with its own reform bill, the FISA Transparency and Modernization Act, on Thursday. FISA, or the Foreign Intelligence Surveillance Act, dictates US surveillance of “foreign intelligence information” that can include American citizens or permanent residents suspected of terrorism.

Goodlatte’s support for the USA Freedom Act was reportedly in doubt before House Republican leaders decided to bypass his committee effort to reform the NSA in favor of the Intelligence Committee’s more lukewarm legislation.

The Intelligence Committee’s Rogers has criticized the USA Freedom Act for going too far in curbing bulk collection capabilities that, he says, are vital for national security reasons.

Sensenbrenner’s USA Freedom Act was initially more strict in limiting NSA collection abilities, positing that it would “end bulk collection under Section 215 of the Patriot Act, in light of the massive intrusion on Americans’ privacy and the lack of evidence of its effectiveness.”

Ace Related News:

1. FOIA – http://www.gpo.gov/fdsys/pkg/BILLS-113hr3361ih/pdf/BILLS-113hr3361ih.pdf

2. FISA – http://judiciary.house.gov/_cache/files/d4c6f7fd-4768-4b30-813d-47109cac271a/fisa-anos-001-xml.pdf

RT – March 27

Tweet or Share adding @AceNewsServices or #ANS2014  

 

Enhanced by Zemanta

#ans2014, #bob-goodlatte, #foreign-intelligence-surveillance-act, #house-judiciary-committee, #jim-sensenbrenner, #judiciary-committee, #national-security-agency, #nsa, #united-states, #united-states-house-committee-on-the-judiciary, #united-states-house-permanent-select-committee-on-intelligence, #usa-freedom-act

NSA: ` Complex Analysis of Electronic Surveillance used to Target Lethal Drone Attacks ‘

#AceSecurityNews – Guest Post – May 06 – The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

Courtesy of By  and  10 Feb 2014, 12:03 AM EDT

Ace Related News:

  1. First Look

Share or Tweet with #ANS2014 

 

 

 

 

Enhanced by Zemanta

#ans2014, #edward-snowden, #afghanistan, #central-intelligence-agency, #high-value-target, #jeremy-scahill, #joint-special-operations-command, #national-security-agency, #nsa, #subscriber-identity-module

NSA Slits Own Wrist: Classifies MH370 Info – What Do They Know The Rest Of The World Doesn’t Know?

In response to a freedom of information request made by Before It’s News friend and Attorney Orly Taitz requesting any and all documents in the possession of NSA regarding the missing Malaysian airplane MH370, the NSA has seemingly slit its own wrist by denying all information under the grounds of Executive Order 13526: “…the MH370 disappearance has been classified as a matter ‘to be kept secret in the interest of national defense or foreign relations’….”

The NSA couldn’t have possibly done more harm to their credibility by making such an announcement which, in a backhanded way, confirms that they know SOMETHING about the missing airliner that if found out, may damage our ‘national defense or foreign relations’. What does the NSA know that the rest of the world DOESN’T KNOW about MH370? Bill Still breaks it all down in the newly released video below. We are all in agreement, the NSA is hiding something.

#attorney-orly-taitz, #bill-still, #executive-order-13526, #freedom-of-information-request, #malaysian-airplane-mh370, #nsa, #nsa-has-seemingly-slit-its-own-wrist

` White House Seeks to Obtain Legislator's Approval over Legal Immunity for Companies Handing over Data '

#AceSecurityNews – WASHINGTON – WHITE HOUSE – (Guardian) – The White House has asked legislators crafting competing reforms of the National Security Agency to provide legal immunity for telecommunications firms that provide the government with customer data, the Guardian has learned.

In a statement of principles privately delivered to lawmakers some weeks ago to guide surveillance reforms, the White House said it wanted legislation protecting “any person who complies in good faith with an order to produce records” from legal liability for complying with court orders for phone records to the government once the NSA no longer collects the data in bulk.

The brief request, contained in a four-page document, echoes a highly controversial provision of the 2008 Fisa Amendments Act, which provided retroactive immunity to the telecommunications companies that allowed the NSA to access calls and call data between Americans and foreigners, voiding lawsuits against them. Barack Obama’s vote for that bill as a senator and presidential candidate disappointed many supporters.

(PressTV) – A senior US administration official described the provision as typical for surveillance law that aims to protect firms that comply with Fisa court orders for customer data.

“This would refer to any new orders issued by the court under the new regime we are proposing. This is similar to the way the rest of Fisa already operates, and Fisa already contains virtually identical language for its other provisions, including Section 215,” the official stated.

A congressional aide said such companies were anticipated to “fight hard” for the provision in order to survive in any other surveillance bill.

Press TV – Guardian
Fisa 2008 Act – http://www.gpo.gov/fdsys/pkg/BILLS-110hr6304enr/pdf/BILLS-110hr6304enr.pdf

#ANS2014

#national-security-agency, #nsa, #us-foreign-intelligence-surveillance-court-fisa, #washington, #white-house

` Journalist’s are Honoured at ` Pulitzer Prize Awards ‘ in Difficult and Dangerous Times ‘

#AceBreakingNews – April 14 – (RT) – The Guardian US and the Washington Post are among the winners of a prestigious journalistic Pulitzer award. The newspapers shared the 2014 Pulitzer Prize for Public Service Reporting for coverage of NSA surveillance and whistleblower Snowden’s leaks.

The prize is awarded “for a distinguished example of meritorious public service by a newspaper or news site through the use of its journalistic resources,” according to the Pulitzer Committee. This includes the use of “stories, editorials, cartoons, photographs, graphics, videos, databases, multimedia or interactive presentations or other visual material.”

The committee stated that it was awarded to the Washington Post for “its revelation of widespread secret surveillance by the National Security Agency, marked by authoritative and insightful reports that helped the public understand how the disclosures fit into the larger framework of national security.”

It also awarded joint gold to Guardian US for its “revelation of widespread secret surveillance by the National Security Agency, helping through aggressive reporting to spark a debate about the relationship between the government and the public over issues of security and privacy.”

#BREAKINGNEWS: We have won the Pulitzer Prize for public service for our coverage of Snowden’s NSA leaks, along with @GuradianUS.
— Washington Post (@washingtonpost) April 14, 2014
Among Guardian US and Washington Post revelations were some of the most wide-scale and high-profile disclosures of government secrets since 1971’s Pentagon Papers on the Vietnam War.

Glenn Greenwald headed up reporting at the Guardian alongside Ewen MacAskill and film-maker Laura Poitras. Poitras has also collaborated with the Washington Post’s Barton Gellman, who was also honoured.

The impact of both newspapers’ revelations has sparked global outrage at the extent of US covert surveillance of its own citizens and those of other nations. With the help of documents leaked by former NSA contractor and whistleblower Edward Snowden, details of clandestine PRISM operations and UK Government Communication Headquarters (GCHQ) collaboration emerged.

#ANS2014

#gchq, #guardian, #national-security-agency, #nsa, #pulitzer-award, #snowden, #washington-post

NSA and GCHQ : ` Targeted Private and German Companies ' Spying on 122 World Leaders '

#AceSecurityNews – UNITED STATES – The NSA’s data-base contains information obtained during the surveillance of over a hundred world leaders, new leaks by NSA whistle-blower Edward Snowden revealed.

Der Spiegel has looked through a top secret presentation by NSA’s Centre for Content Extraction, which is responsible for automated analysis of all types of text data.

According to the document, the leaders of 122 states were among the high-ranked targets of the US intelligence.

However, only 12 names were revealed by the German journalists in the publication as an example – http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html

ANS2014

#ans2014, #gchq, #nsa, #snowden, #united-states, #us