ForgotPassword?
Sign Up
Search this Topic:
Posts: 27156
Feb 5 16 1:53 PM
Highly critical report says proposed legislation must be reviewed to ensure obligations on tech industry are clear The government’s investigatory powers bill lacks clarity and is sowing confusion among tech firms about the extent to which “internet connection records” will be collected, a parliamentary select committee has warned. The highly critical report by the House of Commons science and technology committee says there are widespread doubts about key definitions in the legislation, “not to mention the definability, of a number of the terms”. The admission that many MPs and technology experts are baffled will reinforce political concerns that such a complex bill is being pushed through parliament at speed. Other select committees are meanwhile preparing assessments of different aspects of the bill.
Highly critical report says proposed legislation must be reviewed to ensure obligations on tech industry are clear
The government’s investigatory powers bill lacks clarity and is sowing confusion among tech firms about the extent to which “internet connection records” will be collected, a parliamentary select committee has warned.
The highly critical report by the House of Commons science and technology committee says there are widespread doubts about key definitions in the legislation, “not to mention the definability, of a number of the terms”.
The admission that many MPs and technology experts are baffled will reinforce political concerns that such a complex bill is being pushed through parliament at speed. Other select committees are meanwhile preparing assessments of different aspects of the bill.
Read more @ http://www.theguardian.com/law/2016/feb/01/investigatory-powers-bill-snoopers-charter-lacks-clarity-mps-warn
The home secretary's plan to force internet service providers to store everyone's internet activity is vague and confusing, says a committee of MPs. Police and security services will be able to see names of sites visited in the past year without a warrant, under the draft Investigatory Powers Bill. The science and technology Committee says its requirements are confusing, and firms fear a rise in hacking. The Home Office said it would study the report's findings. When she announced the draft bill last year, Theresa May stressed that the authorities would not be able to see individual web pages visited, just basic data, such as domain names like bbc.co.uk or facebook.com. 'Security goals' But tech firms have told MPs it may not be possible to separate out data in that way and the plans were not clear about was meant by "internet connection records". Committee chairman Nicola Blackwood said: "There remain questions about the feasibility of collecting and storing internet connection records (ICRs), including concerns about ensuring security for the records from hackers.
The home secretary's plan to force internet service providers to store everyone's internet activity is vague and confusing, says a committee of MPs.
Police and security services will be able to see names of sites visited in the past year without a warrant, under the draft Investigatory Powers Bill.
The science and technology Committee says its requirements are confusing, and firms fear a rise in hacking.
The Home Office said it would study the report's findings.
When she announced the draft bill last year, Theresa May stressed that the authorities would not be able to see individual web pages visited, just basic data, such as domain names like bbc.co.uk or facebook.com.
But tech firms have told MPs it may not be possible to separate out data in that way and the plans were not clear about was meant by "internet connection records".
Committee chairman Nicola Blackwood said: "There remain questions about the feasibility of collecting and storing internet connection records (ICRs), including concerns about ensuring security for the records from hackers.
Read more @ http://www.bbc.com/news/35455343
A group of MPs has criticized plans put forward in the Draft Investigatoy Powers Bill after consulting with several top technology firms, including the likes of Apple, Facebook and Google. The Science and Technology committee has slammed the bill as being vague and confusing, issuing a 43-page report outlining its views on key issues such as encryption and data collection. The committee’s chairwoman, Nicola Blackwood MP, said: "The current lack of clarity in the Draft Investigatory Powers Bill is causing concern among businesses. There are widespread doubts over the definition, not to mention the definability, of a number of the terms used in the draft bill. The government must urgently review the legislation so that the obligations on the industry are clear and proportionate". One of the most contentious aspects of the bill is encryption, with some firms worried that they will have to adopt weaker encryption standards and build backdoors into their products so that data can be accessed. This is especially relevant for companies that use end-to-end encryption, with Apple’s iMessage communication being a prime example. On this area, the report says: "There is some confusion about how the draft bill would affect end-to-end encrypted communications, where decryption might not be possible by a communications provider that had not added the original encryption. The government should clarify and state clearly in the Codes of Practice that it will not seek unencrypted content in such cases, in line with the way existing legislation is currently applied".
A group of MPs has criticized plans put forward in the Draft Investigatoy Powers Bill after consulting with several top technology firms, including the likes of Apple, Facebook and Google.
The Science and Technology committee has slammed the bill as being vague and confusing, issuing a 43-page report outlining its views on key issues such as encryption and data collection.
The committee’s chairwoman, Nicola Blackwood MP, said: "The current lack of clarity in the Draft Investigatory Powers Bill is causing concern among businesses. There are widespread doubts over the definition, not to mention the definability, of a number of the terms used in the draft bill. The government must urgently review the legislation so that the obligations on the industry are clear and proportionate".
One of the most contentious aspects of the bill is encryption, with some firms worried that they will have to adopt weaker encryption standards and build backdoors into their products so that data can be accessed. This is especially relevant for companies that use end-to-end encryption, with Apple’s iMessage communication being a prime example.
On this area, the report says: "There is some confusion about how the draft bill would affect end-to-end encrypted communications, where decryption might not be possible by a communications provider that had not added the original encryption. The government should clarify and state clearly in the Codes of Practice that it will not seek unencrypted content in such cases, in line with the way existing legislation is currently applied".
Read more @ http://betanews.com/2016/02/02/snoopers-charter-is-vague-and-confusing/
Read more @ http://www.dailymail.co.uk/wires/pa/article-3425793/MPs-call-refinement-Governments-bill-snooping.html
Read more @ http://rinf.com/alt-news/latest-news/snoopers-charter-expensive-confusing-say-mps/
NSA’s Top Hacker Downplays Significance Of Zero-Day Exploits
In an appearance earlier this week at the Usenix Enigma security conference in San Francisco, the National Security Agency’s top hacker, Rob Joyce, downplayed the significance of zero-day exploits while noting that there are “many more vectors” that are not only easier to exploit, but “less risky” and “often more productive” than the zero-days the NSA has caught considerable attention for employing in recent years. I think a lot of people think the nation states are running on this engine of zero-days. You go out with your skeleton key and unlock the door and you’re in. It’s not that […] I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero-days […] There’s so many more vectors that are easier, less risky and quite often more productive than going down that route. Joyce, who heads the NSA’s top hacking outfit, which is known as Tailored Access Operations (TAO), suggested at the conference that it is more so the NSA’s abundance of resources and patience than it is their arsenal of zero-days that allows them to compromise the security of networks and systems targeted by their missions.
In October the European Union’s highest court invalidated the data protection agreement known as Safe Harbor, which had allowed 4,332 American companies to transfer the personal data of the European Union’s 500 million citizens back and forth across the Atlantic. This article is part of the March / April 2016 Business Report, Cyber Survival. View the full report The decision was a result of the 2013 revelations by NSA contractor Edward Snowden, which exposed the U.S. government’s access to personal data on the servers of companies like Google and Microsoft. Now, U.S. companies are facing pressure to keep the data of European users in Europe. And in some cases Europeans may be left in the hands of lesser-known companies whose main selling point is that they’re not holding data in the U.S. There is little evidence that either trend will benefit cybersecurity, says Herbert Lin, a senior researcher at Stanford’s Center for International Security and Cooperation. “I would argue that in general the American IT industry is significantly ahead of the rest of the world, and if you want the best technical talent applied, you go American,” he says. He points out that intelligence agencies in the United Kingdom, Germany, and elsewhere in Europe were just as deeply implicated in the Snowden documents as their counterparts in the U.S. “Just because the data is hosted over there doesn’t change the security dimensions of it very much,” he adds.
In October the European Union’s highest court invalidated the data protection agreement known as Safe Harbor, which had allowed 4,332 American companies to transfer the personal data of the European Union’s 500 million citizens back and forth across the Atlantic.
The decision was a result of the 2013 revelations by NSA contractor Edward Snowden, which exposed the U.S. government’s access to personal data on the servers of companies like Google and Microsoft. Now, U.S. companies are facing pressure to keep the data of European users in Europe. And in some cases Europeans may be left in the hands of lesser-known companies whose main selling point is that they’re not holding data in the U.S.
There is little evidence that either trend will benefit cybersecurity, says Herbert Lin, a senior researcher at Stanford’s Center for International Security and Cooperation. “I would argue that in general the American IT industry is significantly ahead of the rest of the world, and if you want the best technical talent applied, you go American,” he says. He points out that intelligence agencies in the United Kingdom, Germany, and elsewhere in Europe were just as deeply implicated in the Snowden documents as their counterparts in the U.S. “Just because the data is hosted over there doesn’t change the security dimensions of it very much,” he adds.
Read more @ https://www.technologyreview.com/s/545671/europe-raises-barriers-to-american-data-transfers/
When the NSA subcontractor Edward Snowden released classified documents in June 2013 baring the U.S. intelligence community’s global surveillance programs, it revealed the lax attention to privacy and data security at major Internet companies like Apple, Google, Yahoo, and Microsoft. Warrantless surveillance was possible because data was unencrypted as it flowed between internal company data centers and service providers.
Read more @ https://www.technologyreview.com/s/545636/half-measures-on-encryption-since-snowden/
Venture Capitalists Chase Rising Cybersecurity Spending
Read more @ https://www.technologyreview.com/s/545626/venture-capitalists-chase-rising-cybersecurity-spending/
Why We’re So Vulnerable
An expert in U.S. national cybersecurity research and policy says the next generation of technology must have security built in from the very start. In an age of continuing electronic breaches and rising geopolitical tensions over cyber-espionage, the White House is working on a national cybersecurity strategy that’s expected in early 2016. Helping to draft that strategy is Greg Shannon. He was until recently chief scientist at Carnegie Mellon University’s Software Engineering Institute and is now on leave to serve as assistant director for cybersecurity strategy at the White House Office of Science and Technology Policy. In an interview with MIT Technology Review senior writer David Talbot, Shannon explained that dealing with today’s frequent breaches and espionage threats—which have affected federal agencies as well as businesses and individuals—requires fundamentally new approaches to creating all kinds of software. Fixing the infrastructure for good may take two decades.
An expert in U.S. national cybersecurity research and policy says the next generation of technology must have security built in from the very start.
In an age of continuing electronic breaches and rising geopolitical tensions over cyber-espionage, the White House is working on a national cybersecurity strategy that’s expected in early 2016. Helping to draft that strategy is Greg Shannon. He was until recently chief scientist at Carnegie Mellon University’s Software Engineering Institute and is now on leave to serve as assistant director for cybersecurity strategy at the White House Office of Science and Technology Policy.
Read more @ https://www.technologyreview.com/s/545621/why-were-so-vulnerable/
Read more @ https://www.technologyreview.com/s/545616/cybersecurity-the-age-of-the-megabreach/
The majority of people believe that being online makes it impossible to avoid data snatchers. However, researchers say that there are ways to cover your digital tracks in both the online and offline world. A new toolkit of privacy protecting techniques aims to teach users how to be invisible online.
The majority of people believe that being online makes it impossible to avoid data snatchers.
However, researchers say that there are ways to cover your digital tracks in both the online and offline world.
A new toolkit of privacy protecting techniques aims to teach users how to be invisible online.
Read more @ http://www.dailymail.co.uk/sciencetech/article-3421876/How-make-digitally-invisible-Researchers-reveal-best-way-stop-snoopers-tracking-offline-world.html
A US congressional probe into the impact of a hack of Juniper Networks software will examine the possibility it was initially altered at the behest of the National Security Agency (NSA), a lawmaker said in an interview yesterday. The House Committee on Oversight and Government Reform this month sent letters asking two-dozen agencies to provide documents showing whether they used Juniper devices running ScreenOS software. The company said in December ScreenOS had been compromised by hackers using a so-called back door in the software. Rep Will Hurd, a Texas Republican who heads the committee's technology subcommittee and formerly worked for the Central Intelligence Agency, said his initial goal in pursuing the probe was to determine whether government agencies, many of which use Juniper gear, had been compromised by the hackers.
A US congressional probe into the impact of a hack of Juniper Networks software will examine the possibility it was initially altered at the behest of the National Security Agency (NSA), a lawmaker said in an interview yesterday.
The House Committee on Oversight and Government Reform this month sent letters asking two-dozen agencies to provide documents showing whether they used Juniper devices running ScreenOS software. The company said in December ScreenOS had been compromised by hackers using a so-called back door in the software.
Rep Will Hurd, a Texas Republican who heads the committee's technology subcommittee and formerly worked for the Central Intelligence Agency, said his initial goal in pursuing the probe was to determine whether government agencies, many of which use Juniper gear, had been compromised by the hackers.
Read more @ http://www.itweb.co.za/index.php?option=com_content&view=article&id=149373
Edward Snowden tipped for 2016 Nobel Peace Prize
Former US spy agency contractor Edward Snowden, peace negotiators in Colombia and Greek islanders helping Syrian refugees are among those favoured for the 2016 Nobel Peace Prize, with the deadline for nominations looming. Nobel watchers on Monday also speculated that negotiators of an accord over Iran's nuclear program could be in the running after a surprise award last year to a coalition of Tunisian democracy campaigners, the National Dialogue Quartet. "2016 may finally be Edward Snowden's year ... His leaks are now having a positive effect," Kristian Berg Harpviken, head of the Peace Research Institute, Oslo, told Reuters on Monday, putting him top of his list of candidates. Harpviken said many nations were now reforming laws to restrict intelligence gathering, helping human rights, in the wake of Snowden's leaks in 2013 of details of the US government's surveillance programs.
Former US spy agency contractor Edward Snowden, peace negotiators in Colombia and Greek islanders helping Syrian refugees are among those favoured for the 2016 Nobel Peace Prize, with the deadline for nominations looming.
Nobel watchers on Monday also speculated that negotiators of an accord over Iran's nuclear program could be in the running after a surprise award last year to a coalition of Tunisian democracy campaigners, the National Dialogue Quartet.
"2016 may finally be Edward Snowden's year ... His leaks are now having a positive effect," Kristian Berg Harpviken, head of the Peace Research Institute, Oslo, told Reuters on Monday, putting him top of his list of candidates.
Harpviken said many nations were now reforming laws to restrict intelligence gathering, helping human rights, in the wake of Snowden's leaks in 2013 of details of the US government's surveillance programs.
Read more @ http://www.9news.com.au/world/2016/02/02/03/10/snowden-tipped-for-nobel-peace-prize
Canada’s two major spy agencies, the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), have been illegally obtaining personal information about the population and sharing data with their partners in the US National Security Agency-led “Five Eyes” alliance without the required authorization. These long-suppressed revelations emerge from reports of the intelligence services’ oversight committees that were presented to parliament last week. The report from the Security and Intelligence Review Committee (SIRC), which is responsible for overseeing CSIS, revealed that the domestic intelligence agency illegally obtained information on individuals from the Canada Revenue Agency, the country’s tax authority. The information was accessed without a court warrant on numerous occasions, and even after CSIS assured the federal courts and government ministers that the information had been removed from its system, CSIS retained it on one of its databases.
Canada’s two major spy agencies, the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), have been illegally obtaining personal information about the population and sharing data with their partners in the US National Security Agency-led “Five Eyes” alliance without the required authorization. These long-suppressed revelations emerge from reports of the intelligence services’ oversight committees that were presented to parliament last week.
The report from the Security and Intelligence Review Committee (SIRC), which is responsible for overseeing CSIS, revealed that the domestic intelligence agency illegally obtained information on individuals from the Canada Revenue Agency, the country’s tax authority. The information was accessed without a court warrant on numerous occasions, and even after CSIS assured the federal courts and government ministers that the information had been removed from its system, CSIS retained it on one of its databases.
Read more @ https://www.wsws.org/en/articles/2016/02/03/cana-f03.html
Read more @ http://www.vox.com/2016/2/3/10906064/john-oliver-edward-snowden-interview-hbo
Laura Poitras has a talent for disappearing. In her early documentaries like My Country, My Country and The Oath, her camera seems to float invisibly in rooms where subjects carry on intimate conversations as if they’re not being observed. Even in Citizenfour, the Oscar-winning film that tracks her personal journey from first contact with Edward Snowden to releasing his top secret NSA leaks to the world, she rarely offers a word of narration. She appears in that film exactly once, caught as if by accident in the mirror of Snowden’s Hong Kong hotel room. Now, with the opening of her multi-media solo exhibit, Astro Noise, at New York’s Whitney Museum of American Art this week, Snowden’s chronicler has finally turned her lens onto herself. And she’s given us a glimpse into one of the darkest stretches of her life, when she wasn’t yet the revelator of modern American surveillance but instead its target. The exhibit is vast and unsettling, ranging from films to documents that can be viewed only through wooden slits to a video expanse of Yemeni sky which visitors are invited to lie beneath. But the most personal parts of the show are documents that lay bare how excruciating life was for Poitras as a target of government surveillance—and how her subsequent paranoia made her the ideal collaborator in Snowden’s mission to expose America’s surveillance state. First, she’s installed a wall of papers that she received in response to an ongoing Freedom of Information lawsuit the Electronic Frontier Foundation filed on her behalf against the FBI. The documents definitively show why Poitras was tracked and repeatedly searched at the US border for years, and even that she was the subject of a grand jury investigation. And second, a book she’s publishing to accompany the exhibit includes her journal from the height of that surveillance, recording her first-person experience of becoming a spying subject, along with her inner monologue as she first corresponded with the secret NSA leaker she then knew only as “Citizenfour.”
Laura Poitras has a talent for disappearing. In her early documentaries like My Country, My Country and The Oath, her camera seems to float invisibly in rooms where subjects carry on intimate conversations as if they’re not being observed. Even in Citizenfour, the Oscar-winning film that tracks her personal journey from first contact with Edward Snowden to releasing his top secret NSA leaks to the world, she rarely offers a word of narration. She appears in that film exactly once, caught as if by accident in the mirror of Snowden’s Hong Kong hotel room.
Now, with the opening of her multi-media solo exhibit, Astro Noise, at New York’s Whitney Museum of American Art this week, Snowden’s chronicler has finally turned her lens onto herself. And she’s given us a glimpse into one of the darkest stretches of her life, when she wasn’t yet the revelator of modern American surveillance but instead its target.
The exhibit is vast and unsettling, ranging from films to documents that can be viewed only through wooden slits to a video expanse of Yemeni sky which visitors are invited to lie beneath. But the most personal parts of the show are documents that lay bare how excruciating life was for Poitras as a target of government surveillance—and how her subsequent paranoia made her the ideal collaborator in Snowden’s mission to expose America’s surveillance state. First, she’s installed a wall of papers that she received in response to an ongoing Freedom of Information lawsuit the Electronic Frontier Foundation filed on her behalf against the FBI. The documents definitively show why Poitras was tracked and repeatedly searched at the US border for years, and even that she was the subject of a grand jury investigation. And second, a book she’s publishing to accompany the exhibit includes her journal from the height of that surveillance, recording her first-person experience of becoming a spying subject, along with her inner monologue as she first corresponded with the secret NSA leaker she then knew only as “Citizenfour.”
Read more @ http://www.wired.com/2016/02/snowdens-chronicler-reveals-her-own-life-under-surveillance/
Read more @ http://www.theguardian.com/artanddesign/2016/feb/04/laura-poitras-astro-noise-whitney-the-art-of-surveillance
Bed Down Location is military jargon for the sleeping quarters of people targeted for assassination. It’s also the title of a new work by Laura Poitras, the filmmaker who worked with Edward Snowden to expose the secret activities of the NSA. Poitras is best known for her Academy Award-winning documentary about the Snowden affair, Citizenfour. With Bed Down Location, she’s adapted documentary filmmaking to installation art, a strikingly powerful transformation that is certain to provoke strong emotion when her first museum show opens at the Whitney tomorrow.
Read more @ http://www.forbes.com/sites/jonathonkeats/2016/02/04/citizenfour-director-laura-poitrass-whitney-exhibit-exposes-nsa-surveillance-from-a-new-perspective/#79b9f7363a40
Read more @ https://boingboing.net/2016/02/04/laura-poitrass-astro-noise.html
Student-run Foreign Affairs Symposium features six events in 2016 National Security Agency whistleblower Edward Snowden, the author of a bestselling book about life in a women's prison, and the founder of Vox.com are among those who will speak at Johns Hopkins University during the spring semester as part of the 2016 Foreign Affairs Symposium. The annual speaker series, founded in 1998, is run by Johns Hopkins students and sponsored by the university's Office of Student Development and Programming. All events are free and open to the public; reserved seats can be purchased in advance through jhutickets.com.
National Security Agency whistleblower Edward Snowden, the author of a bestselling book about life in a women's prison, and the founder of Vox.com are among those who will speak at Johns Hopkins University during the spring semester as part of the 2016 Foreign Affairs Symposium.
The annual speaker series, founded in 1998, is run by Johns Hopkins students and sponsored by the university's Office of Student Development and Programming. All events are free and open to the public; reserved seats can be purchased in advance through jhutickets.com.
Read more @ http://hub.jhu.edu/2016/02/01/foreign-affairs-symposium-lineup
Edward Snowden, the former National Security Agency contractor famous for sharing classified information with the public, is scheduled to speak at the University of Colorado on Tuesday, Feb. 16 at 7 p.m. in Macky Auditorium. Snowden will be speaking live via video chat from Russia, where he is seeking safety from prosecution by the United States for theft of government property and unauthorized communication of national defense information. Tickets went on sale Monday morning. Since then, 1,239 tickets have been sold of the 2,000 available. Tickets are $2 for students, $10 for CU Boulder faculty and staff, and $20 for the general public. They are available in the University Memorial Center dining area across from the Alferd Packer Grill. The production of this event began back in October 2015 when the American Program Bureau contacted CU’s Distinguished Speakers Board. The APB served as a medium for the DSB to get in contact with Snowden, providing the opportunity to host the event
Edward Snowden, the former National Security Agency contractor famous for sharing classified information with the public, is scheduled to speak at the University of Colorado on Tuesday, Feb. 16 at 7 p.m. in Macky Auditorium. Snowden will be speaking live via video chat from Russia, where he is seeking safety from prosecution by the United States for theft of government property and unauthorized communication of national defense information.
Tickets went on sale Monday morning. Since then, 1,239 tickets have been sold of the 2,000 available. Tickets are $2 for students, $10 for CU Boulder faculty and staff, and $20 for the general public. They are available in the University Memorial Center dining area across from the Alferd Packer Grill.
The production of this event began back in October 2015 when the American Program Bureau contacted CU’s Distinguished Speakers Board. The APB served as a medium for the DSB to get in contact with Snowden, providing the opportunity to host the event
Read more @ http://cuindependent.com/2016/02/03/snowden-tickets-selling-fast/
Read more @ http://truthinmedia.com/documents-cia-flew-rendition-flight-in-attempt-capture-snowden/
British and US intelligence have hacked Israeli drones' video feeds, allowing them to watch in real time as Israel bombed Gaza and spied on Syria, according to documents leaked by Edward Snowden. GCHQ and its US counterpart, the NSA, also monitored the drone footage in the hope of getting an early warning if Israel was attacking Iran's nuclear facilities. The disclosures were the latest in a series of examples of how the US and Israel professed friendship in public but also spied intensively on each other. They could heighten tensions between the two countries, which were already at odds over the Iranian nuclear deal and Israel's settlement policy in the occupied West Bank. The hacking programme, code-named Anarchist, also appeared to confirm a badly kept secret: that Israeli drones carry missiles and are used for lethal strikes. Israel has never publicly confirmed it has armed drones but the footage appeared to show a Heron drone, one of the world's largest unmanned aircraft, carrying missiles.
British and US intelligence have hacked Israeli drones' video feeds, allowing them to watch in real time as Israel bombed Gaza and spied on Syria, according to documents leaked by Edward Snowden.
GCHQ and its US counterpart, the NSA, also monitored the drone footage in the hope of getting an early warning if Israel was attacking Iran's nuclear facilities.
The disclosures were the latest in a series of examples of how the US and Israel professed friendship in public but also spied intensively on each other.
They could heighten tensions between the two countries, which were already at odds over the Iranian nuclear deal and Israel's settlement policy in the occupied West Bank.
The hacking programme, code-named Anarchist, also appeared to confirm a badly kept secret: that Israeli drones carry missiles and are used for lethal strikes. Israel has never publicly confirmed it has armed drones but the footage appeared to show a Heron drone, one of the world's largest unmanned aircraft, carrying missiles.
Read more @ http://www.afr.com/news/world/middle-east/edward-snowden-leaks-us-and-uk-watched-israeli-aircraft-bomb-gaza-in-real-time-20160130-gmhv3h
Top secret documents have revealed an alleged espionage operation codenamed Anarchist, dating back to 1998An official has called revelations that the UK and US have been monitoring Israel's drones and fighter jets the “worst leak in the history of Israeli intelligence”. Material leaked by Edward Snowden appears to show spies hacking cameras and video feeds almost two decades. Images obtained by The Intercept, German magazine Der Spiegel and Israeli newspaper Yedioth Ahronoth showed drones flying missions over Gaza and the West Bank, including some appearing to snow the aircraft armed with missiles.
Top secret documents have revealed an alleged espionage operation codenamed Anarchist, dating back to 1998An official has called revelations that the UK and US have been monitoring Israel's drones and fighter jets the “worst leak in the history of Israeli intelligence”.
Material leaked by Edward Snowden appears to show spies hacking cameras and video feeds almost two decades.
Images obtained by The Intercept, German magazine Der Spiegel and Israeli newspaper Yedioth Ahronoth showed drones flying missions over Gaza and the West Bank, including some appearing to snow the aircraft armed with missiles.
Read more @ http://www.independent.co.uk/news/world/middle-east/edward-snowden-leaks-showing-uk-and-us-spying-on-drones-is-worst-breach-in-israeli-intelligence-a6843241.html
The United States and Great Britain combined to hack into Israeli drone and fighter jet surveillance feeds as part of secret program that in part watched for a potential Israeli military strike against Iran, according to a new report published along with corresponding photos. The Intercept reported that the secret program was called “Anarchist.” It was carried out by Britain’s Government Communications Headquarters, or GCHQ, and the National Security Agency from a mountaintop Royal Air Force base in Cyprus, according to the report. “GCHQ files provided by former NSA contractor Edward Snowden include a series of ‘Anarchist snapshots’ — thumbnail images from videos recorded by drone cameras,” The Intercept reported. “The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.”
The United States and Great Britain combined to hack into Israeli drone and fighter jet surveillance feeds as part of secret program that in part watched for a potential Israeli military strike against Iran, according to a new report published along with corresponding photos.
The Intercept reported that the secret program was called “Anarchist.” It was carried out by Britain’s Government Communications Headquarters, or GCHQ, and the National Security Agency from a mountaintop Royal Air Force base in Cyprus, according to the report.
“GCHQ files provided by former NSA contractor Edward Snowden include a series of ‘Anarchist snapshots’ — thumbnail images from videos recorded by drone cameras,” The Intercept reported. “The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.”
Read more @ https://www.washingtonpost.com/news/checkpoint/wp/2016/01/29/u-s-and-britain-hacked-into-feeds-from-israeli-drones-and-fighter-jets-according-to-report/
One of the tactless features of the Obama administration has been its misuse of the National Security Agency. Characterized in the mid-2000s by its tendency to spy on American citizens sans warrant, the nature of the agency created a chilling and Orwell-esque atmosphere for many citizens. Now the Israeli military feels the same infringement of their privacy. According to documents leaked by former-National Security Agency employee Edward Snowden, a spy operation also based in England, ironically code-named “Anarchist” has been spying on Israeli air force missions against Syria, Iran and finally Palestinians in the Gaza Strip since – wait for it – 1998. The operation was seated from a base in the Troodos Mountains (near Mount Olympus) the highest known point on the Mediterranean island of Cyprus. Why would America spy on Israel? Distrust and paranoia, mainly, related to feelings that there is mutual espionage being conducted between the two countries. But these sentiments are gravely misjudged. Israel insists that there has been no kind of below-the-radar espionage since the case of Jonathan Pollard in the 1980s, who had in any case acted independently. “We know that the Americans spy on the whole world, and also on us, also on their friends,” said Israeli energy minister, Yuval Steinitz, in a quote to Israel Army Radio, recorded by Reuters. “But still, it is disappointing, inter alia because, going back decades already, we have not spied nor collected intelligence nor hacked encryptions in the United States.”
One of the tactless features of the Obama administration has been its misuse of the National Security Agency. Characterized in the mid-2000s by its tendency to spy on American citizens sans warrant, the nature of the agency created a chilling and Orwell-esque atmosphere for many citizens. Now the Israeli military feels the same infringement of their privacy.
According to documents leaked by former-National Security Agency employee Edward Snowden, a spy operation also based in England, ironically code-named “Anarchist” has been spying on Israeli air force missions against Syria, Iran and finally Palestinians in the Gaza Strip since – wait for it – 1998. The operation was seated from a base in the Troodos Mountains (near Mount Olympus) the highest known point on the Mediterranean island of Cyprus.
Why would America spy on Israel? Distrust and paranoia, mainly, related to feelings that there is mutual espionage being conducted between the two countries. But these sentiments are gravely misjudged. Israel insists that there has been no kind of below-the-radar espionage since the case of Jonathan Pollard in the 1980s, who had in any case acted independently.
“We know that the Americans spy on the whole world, and also on us, also on their friends,” said Israeli energy minister, Yuval Steinitz, in a quote to Israel Army Radio, recorded by Reuters. “But still, it is disappointing, inter alia because, going back decades already, we have not spied nor collected intelligence nor hacked encryptions in the United States.”
Read more @ http://dailycaller.com/2016/02/01/american-citizens-and-the-israeli-military-together-as-victims-of-the-nsa/
U.K.-U.S. Spy Operations Also Reportedly Targeted Israeli Missile Project
Following reports over the weekend of surveillance of Israel's drone operations, it is now being reported that part of Israel's Arrow missile interception program has also been compromised.
Read more @ http://www.haaretz.com/middle-east-news/1.700506
Read more @ http://www.jpost.com/Israel-News/No-surprise-but-changes-needed-443320
Read more @ http://jewishexponent.com/headlines/2016/02/us-and-uk-have-spied-on-israeli-army-for-18-years
Watch the video @ http://www.federaltimes.com/videos/government/cybersecurity/2016/02/02/79708362/
White House denies security clearance to Pulitzer-prize winning journalist with links to Edward Snowden
The White House has denied a security clearance to a member of its technology team who previously helped report on documents leaked by Edward Snowden. Ashkan Soltani, a Pulitzer prize-winning journalist and recent staffer at the Federal Trade Commission, recently began working with the White House on privacy, data ethics and technical outreach. The partnership raised eyebrows when it was announced in December because of Soltani’s previous work with the Washington Post, where he helped analyze and protect a cache of National Security Agency documents leaked by Snowden.
The White House has denied a security clearance to a member of its technology team who previously helped report on documents leaked by Edward Snowden.
Ashkan Soltani, a Pulitzer prize-winning journalist and recent staffer at the Federal Trade Commission, recently began working with the White House on privacy, data ethics and technical outreach.
The partnership raised eyebrows when it was announced in December because of Soltani’s previous work with the Washington Post, where he helped analyze and protect a cache of National Security Agency documents leaked by Snowden.
Read more @ http://www.businessinsider.com/white-house-denies-security-clearance-to-journalist-with-links-to-edward-snowden-2016-2?IR=T
"What lies behind us and what lies before us are small matters compared to what lies within us." ~ Ralph Waldo Emerson ~
Interact