Skip to main contentdfsdf

  • Jan 16, 14

    Information regarding the distribution of $52.6 billion across government administrated defense agencies.

    • “America’s capabilities are unique,” Mr. Obama said. “And the power of new technologies means that there are fewer and fewer technical constraints on what we can do. That places a special obligation on us to ask tough questions about what we should do.”
    • Invoking lofty principles and then going into a highly technical discussion of the N.S.A.’s procedures, Mr. Obama said he would require prior court approval each time an agency analyst wants access to calling records, except in emergencies. He also said he had forbidden eavesdropping on the leaders of allied countries, after the disclosure of such activities ignited a diplomatic firestorm with Germany, Brazil and other countries.

    7 more annotations...

    • judges in Oregon on Tuesday upheld a 2008 law permitting warrantless surveillance but struck down a key aspect of the so-called no-fly list that blocks people suspected of terrorism ties from boarding planes.
    • Analysts working for the NSA refer to this behaviour as LOVEINT – a play on existing surveillance parlance such as HUMINT (‘human intelligence’) and SIGINT (‘signals intelligence’).
    • The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted.
    • Because the government tracks “suspected terrorists” as well as “known terrorists,” individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity.

    9 more annotations...

    • In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.
    • The NSA’s formal “Third Party” relationship with the Saudis involves arming the MOI with highly advanced surveillance technology. The NSA “provides technical advice on SIGINT topics such as data exploitation and target development to TAD,” the memo says, “as well as a sensitive source collection capability.”

       

    • Beyond their own surveillance programs, the American and British surveillance agencies rely on U.S.-supported Arab regimes, including the Jordanian monarchy and even the Palestinian Authority Security Forces, to provide vital spying services regarding Palestinian targets.
    • “The United States has been trying to broker peace in the Middle East for the past 20 years,” wrote the liberal commentator Kevin Drum in Mother Jones, last Tuesday. The following day, CNN reported that the Obama administration ”agreed to Israel’s request to resupply it with several types of ammunition … Among the items being bought are 120mm mortar rounds and 40mm ammunition for grenade launchers.”

       

    • To begin with, Recorded Future, the outfit that produced the government-affirming report, is anything but independent. To the contrary, it is funded by the CIA and U.S. intelligence community with millions of dollars. Back in 2010, it also filed forms to become a vendor for the NSA.
    • One document found in the GCHQ archive provided by Snowden is a 45-page, single-spaced manual that the British spy agency calls a “Jihadist Handbook.” Though undated, the content suggests it was originally written in 2002 or 2003: more than 10 years before the Snowden reporting began.
    • Metadata reveals information about a communication—such as the “to” and “from” parts of an email, and the time and date it was sent, or the phone numbers someone called and when they called—but not the content of the message or audio of the call.
    • To allow government agents to sift through the masses of records on ICREACH, engineers designed a simple “Google-like” search interface. This enabled analysts to run searches against particular “selectors” associated with a person of interest—such as an email address or phone number—and receive a page of results displaying, for instance, a list of phone calls made and received by a suspect over a month-long period. The documents suggest these results can be used reveal the “social network” of the person of interest—in other words, those that they communicate with, such as friends, family, and other associates.

    2 more annotations...

    • Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

       

    • The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia.

    9 more annotations...

    • Skynet uses phone location and call metadata from bulk phone call records to detect suspicious patterns in the physical movements of suspects and their communication habits, according to a 2012 government presentation The Intercept obtained from Edward Snowden.
    • The presentation indicates that Skynet looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” It also looks for suspicious behaviors such as someone who engages in “excessive SIM or handset swapping” or receives “incoming calls only.”
    • Under the bipartisan bill, which passed, the Patriot Act would be changed to prohibit bulk collection by the National Security Agency of metadata charting telephone calls made by Americans.
    • In addition, the legislation would bar permitting bulk collection of records using other tools like so-called national security letters, which are a kind of administrative subpoena.

    1 more annotation...

1 - 18 of 18
20 items/page
List Comments (0)