Intelligence Leaks
Edward Snowden - answers Reader Questions - the Guardian: LINK ¤ the GUARDIAN
_________________________________________
Question: - "why did you at first choose - Hong Kong ?!"
- "it is a safe place - for a whistleblower !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "and because at home - there would not be - a fair trial !"
_________________________________________
- "they openly claimed treason - and that the disclosure of secret !"
_________________________________________
- "itself would had been criminal - and even unconstitutional act !"
_________________________________________
- "there must be - justice !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "he does not volunteer himself to it - he can do more good - outside !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "in the revelations - there was no operation - of a military target !"
_________________________________________
- "but civilian infrastructure - universities - hospitals - and private businesses !"
_________________________________________
- "they must be more careful - this are critical systems !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "what would be - if they would make a - technical mistake ?!"
_________________________________________
- "network operations - without asked for public permission !"
_________________________________________
- "and many of the countries - were allies !"
- "and for - what ?!"
_________________________________________
- "the public - needs to know - such kinds of things !"
_________________________________________
- "if analysts had access to query - raw SIGINT databases ! - ( NSA - FBI - CIA - DIA ! )"
_________________________________________
- "they could enter - and get results - for anything they wanted !"
_________________________________________
- "phone number - email - user id - cell phone handset id - IMEI !"
_________________________________________
- "the restrictions against this - were policy based - not technically based !"
_________________________________________
- "and audits were cursory - incomplete - and easily fooled by fake justifications !"
_________________________________________
- "USA communications were collected - and viewed on a daily basis !"
_________________________________________
- "( FISA Amendments Act - and its section 702 authorities ! )"
_________________________________________
- "on the certification of an analyst - rather than a warrant !"
_________________________________________
- "they excused this as - "incidental" - collection !"
_________________________________________
- "but at the end of the day - they had the content - of USA communications !"
_________________________________________
- "even in the event of "warranted" intercept - it was important to understand !"
_________________________________________
- "they did not always deal with - what you would consider a "real" warrant - like a Police department !"
_________________________________________
- "the "warrant" was more of a - templated form - they filled out !"
_________________________________________
- "and sent to a reliable judge - with a rubber stamp !"
_________________________________________
- "they had both - a record of it - and the actual content !"
_________________________________________
- "if the email address - of a person was targeted - for example under FAA 702 !"
_________________________________________
- "and that email address sent something - the analyst got it !"
_________________________________________
- "IPs - raw data - content - headers - and attachments !"
_________________________________________
- "and it got - saved !"
_________________________________________
- "they were legally compelled to it - and maintained their silence !"
_________________________________________
- "in regard to specifics - of the program !"
_________________________________________
- "but that does not comply them - from ethical obligation !"
_________________________________________
- "if for example Apple - and Google - refused to provide cooperation with them !"
_________________________________________
- "what do you think - they would do ?! - they cannot - shut them down !"
_________________________________________
- "a person - an accountant - a federal judge - do you stand by that ?!"
_________________________________________
- "yes - he stands by it !"
_________________________________________
- "US persons did enjoy - limited policy protections !"
_________________________________________
- "it was important to understand - that policy protection - was no protection !"
_________________________________________
- "policy was a one-way ratchet - that only loosened !"
_________________________________________
- "and one weak - technical protection !"
_________________________________________
- "the filter was constantly - out of date !"
_________________________________________
- "was set at - what is euphemistically referred to as !"
_________________________________________
- "the "widest allowable - aperture" !"
_________________________________________
- "and could be stripped out - at any time !"
_________________________________________
- "encryption - works !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "properly implemented - strong crypto systems !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "are one of the things - that you can rely on !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "but endpoint security - has sometimes to be bettered !"
G20 Summit - the Guardian: LINK ¤ the GUARDIAN
_________________________________________
- "documents from the GCHQ - described the G20 summit !"
_________________________________________
- "two meetings - of foreign politicians and officials - in London !"
_________________________________________
- "their computers - and their phone calls !"
_________________________________________
- "there have often been rumours of this kind - but it was highly unusual for hard evidence !"
_________________________________________
- "the top secret documents described - the G20 meetings !"
_________________________________________
- ""ground-breaking intelligence" - the communications of visiting delegations !"
- "Internet cafes - where they used an email - interception programme !"
_________________________________________
- "key-logging software had looked at delegates' - use of computers !"
_________________________________________
- "and at delegates' BlackBerrys - their email messages - and phone calls !"
_________________________________________
- "45 analysts with a live round-the-clock summary - of who was phoning who - at the summit !"
_________________________________________
- "documents from the NSA - described specialists !"
_________________________________________
- "targeted encrypted phone calls - from London to Moscow !"
_________________________________________
- "targeted the Russian president - and Russian delegates !"
_________________________________________
- "a group of analysts - had sent an internal message !"
_________________________________________
- "the call records activity - had been successful - and was well received !"
______________________________________________________________________________
SNOWDEN - Wikipedia EN: LINK ¤ SNOWDEN
_________________________________________
- "Edward Snowden - is a whistleblower !!!!!!!!!!!!"
______________________________________________________________________________
Verschlüsselung hilft - der Standard: LINK ¤ der STANDARD
_________________________________________
- "Edward Snowden - beantwortet Fragen - in einem Forum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "beim Programm "Prism" - war ein Schutz von US-Bürgern - rein theoretischer Natur !"
_________________________________________
- "denn in technischer Hinsicht - hatte es nur eine Hürde gegeben !"
_________________________________________
- "und einen Filter - mit chronisch veralteten Daten !"
_________________________________________
- "Edward Snowden verweist darauf - dass Verschlüsselung funktioniert !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "vor allem ordentlich implementierte - starke Verschlüsselungssysteme !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "gehören zu den Dingen - auf die man sich verlassen kann !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "aber die Sicherheit an den Endpunkten - war manchmal verbesserungswürdig !"
G-20 Gipfel - der Standard: LINK ¤ der STANDARD
_________________________________________
- "Dokumente vom GCHQ - beschrieben einen G-20-Gipfel - in London !"
_________________________________________
- "Telefone und Computer - von Politikern - und Diplomaten !"
_________________________________________
- "die Dokumente beschrieben - 45 Analysten !"
_________________________________________
- "Mobiltelefone - von den Gipfelteilnehmern !"
_________________________________________
- "ein eigens eingerichtetes Internetcafé - sollte die Delegationsteilnehmer hinlocken !"
_________________________________________
- "wo sämtliche Computer - dann Verbindung aufgenommen hatten !"
______________________________________________________________________________
SNOWDEN - Wikipedia DE: LINK ¤ SNOWDEN
_________________________________________
- "Edward Snowden - ist ein Whistleblower !!!!!!!!!!!!"