I have a huge interest in NSA, CIA, cryptography and history. The release of the Snowden documents is about the biggest breakthrough into the shadow government that has ever been released. You can love what he did or hate what he did… The fact is … Continue reading How to get targeted.
This is more in line with my Link of the day ( when I feel like doing them).
I am sure almost every Country is doing this to some degree as the article suggests. The name of the British Program is spooky sounding. I know I have seen a diagram outlining how it worked.
See below for link…
Tempora is, according to The Guardian newspaper, a clandestine security electronic surveillance program trialled in 2008, established in 2011 and operated by the British Government Communications Headquarters (GCHQ). It was revealed by American whistleblower Edward Snowden in May 2013 as part of his revelations of government sponsored mass surveillance programs. Snowden said that data collected by the Tempora programme is shared with the National Security Agency of the United States.
GCHQ taps fibre-optic cables for secret access to world’s communications
Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
This is actually fascinating…
According to Snowden the two principal components of Tempora are called “Mastering the Internet” and “Global Telecoms Exploitation”, the aim of each to collate as much online and telephone traffic as possible. The vast volume of data utilised by GCHQ in Tempora is extracted from over 200 fibre-optic cables and processed; full data is preserved for three days while metadata is kept for 30 days. British officials have claimed that GCHQ produces larger amounts of metadata than the NSA. By May 2012 300 GCHQ analysts and 250 NSA analysts had been assigned to sift through the flood of data. About 850,000 people have security clearance to access the data.
The article, published on Thursday, claims that France’s intelligence agency, the DGSE, has its own PRISM-like scheme that collects metadata from communications within the country, as well as those flowing into and out of France. The data is reportedly stored in the DGSE’s basement, where the agency has a supercomputer to chew through it.
Other French intelligence services apparently also have access to this data. The program may be illegal, as French surveillance laws require case-by-case warrants.
France isn’t the only European country whose clandestine espionage activities have been exposed post-PRISM. Whistleblower Edward Snowden revealed a British program called Tempora, which involves the tapping of the internet’s backbone at locations around the world.
Fantastic New Yorker Articlr concerning NSA/Europe
As the reporters James Fontanella-Khan and Joshua Chaffin pointed out in the Financial Times this week, American diplomats have for four years now waged “an ongoing, multi-agency effort to convince the E.U. to cooperate on a wide array of intelligence gathering, from sharing airline passenger data to watering down consumer data protection legislation.” Persuading democratic governments to share information on their citizens in the name of counterterrorism or any other security priority is fraught with legal and political problems in the best of circumstances. It will now be harder. Was what the Obama Administration learned about the French Ambassador worth it?
I wonder if this is a backlash against the Muslim Brotherhood of if they are due to the failure of vast parts of his (Morsi’s) economic plan. I also wonder if the big talk of an Arab spring for democracy can be re evaluated? I am where democracy is thriving any where in the Middle East. Sadly it was the one area of the World I did not study well as a History major. I actually took a History of India class that was really really interesting.
You’d think we’d won the World Cup: cars honking, loud celebratory music, people carrying flags. There are also flags hanging from the military helicopters flying at low altitude above Egypt’s main cities.
The joke’s on us, though. This isn’t a cup, it’s a coup. A military coup against a failed president, but a coup nonetheless. This is no time for celebration.
The Supreme Council of the Armed Forces — the SCAF, remember them? — has issued a 48-hour ultimatum to “everyone” to “bear the burden of these historic circumstances.” If “the demands of the people aren’t met,” the army will announce a “roadmap” for Egypt’s further political development. The implementation of this roadmap will, of course, be overseen by the army itself.
Just read that one more time and let it sink in.
I hope this works.. If not a backup plan I have.
I read a interesting article that made me wonder of perhaps feasible interstellar propulsion systems. I am not actually sure of the Physics of what they are doing to some degree. I am not sure of the Science behind allowing Humans to survive the vast speeds and rigorous physical hell involved in so many ways.
I read the other day and will find the link in a second that NASA has an engine that has been running 5.5 years non stop. Amazing!!
The record-breaking Nasa rocket that’s run non-stop for five years and could be used in deep space science missions of the future
Next-generation solar-electric propulsion system runs for 48,000 hours
Could be used for future science missions in deep space
Thruster will be shut down having set the record for the longest test duration of any space propulsion system
Astrophysicist Eric Davis is one of the leaders in the field of faster-than-light (FTL) space travel. But for Davis, humanity’s potential to explore the vastness of space at warp speed is not science fiction.
Davis’ latest study, “Faster-Than-Light Space Warps, Status and Next Steps” won the American Institute of Aeronautics and Astronautics’ (AIAA) 2013 Best Paper Award for Nuclear and Future Flight Propulsion.
TechNewsDaily recently caught up with Davis to discuss his new paper, which appeared in the March/April volume of the Journal of the British Interplanetary Society and will form the basis of his upcoming address at Icarus Interstellar’s 2013 Starship Congress in August. [Super-Fast Space Travel Propulsion Ideas (Images)]
“The proof of principle for FTL space warp propulsion was published decades ago,” said Davis, referring to a 1994 paper by physicist Miguel Alcubierre. “All conventional advanced propulsion physics technologies are limited to speeds below the speed of light … Using an FTL space warp will drastically reduce the time and distances of interstellar flight.”
metadata information and link that puts it a bit more in perspective.
Technically the Government is not taking the content of our phone calls or web searches ( they claim). Metadata on the other hand is apparently open game.
I thought this link did the best job of showing what they could squeeze out of just say 6 months worth of metadata.
Green party politician Malte Spitz sued to have German telecoms giant Deutsche Telekom hand over six months of his phone data that he then made available to ZEIT ONLINE. We combined this geolocation data with information relating to his life as a politician, such as Twitter feeds, blog entries and websites, all of which is all freely available on the internet.
They told us we are not stealing content of your phone calls. We are just collecting metadata.
I do not believe the first part. Why have the capability to snag all of it ( which they do. They can snag upwards of 9 billion calls a day if not more. They have places to store it—Utah data center— and they have the supercomputers to sift through it).
Does it really matter if we are being spied on by our Govt or if indeed it is the United Kingdom or any of the other Echelon countries. They swap it with us with no hesitation based on treaties or agreements signed most likely before you were born.
We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when — “telephony metadata” — for every call made on their networks, because of a secret order by the Foreign Intelligence Surveillance Court. It turns out that this has been going on for seven years (and was even reported by USA Today then); the difference now is that the government — uncharacteristically for such a secret intelligence operation — quickly acknowledged the authenticity of the leaked order and the existence of the metadata collection program.
Should we be worried? At least “nobody is listening to our telephone calls” (so the president himself assured us). People breathed a sigh of relief since first learning of the surveillance because surely there’s nothing to worry about when it comes to such seemingly innocuous information — it’s just metadata, after all. Phew!
Unfortunately, metadata still leaves a lot to be concerned about. There’s more to privacy than just the sounds of our voices: Content may be what we say, but metadata is about what we actually do.
Glad these questions are finally starting to get asked.
It’s a fine thing to see mainstream American media outlets finally sparing some of their attention toward the cyber-industrial complex – that unprecedented conglomeration of state, military and corporate interests that together exercise growing power over the flow of information. It would be even more heartening if so many of the nation’s most influential voices, from senator to pundits, were not clearly intent on killing off even this belated scrutiny into the invisible empire that so thoroughly scrutinizes us – at our own expense and to unknown ends.
Summing up the position of those who worry less over secret government powers than they do over the whistleblowers who reveal such things, we have New York Times columnist Thomas Friedman, who argues that we can trust small cadres of unaccountable spies with broad powers over our communications. We must all wish Friedman luck with this prediction. Other proclamations of his – including that Vladimir Putin would bring transparency and liberal democracy to Russia, and that the Chinese regime would not seek to limit its citizens’ free access to the internet – have not aged especially well.
An unkind person might dismiss Friedman as the incompetent harbinger of a dying republic. Being polite, I will merely suggest that Friedman’s faith in government is as misplaced as faith in the just and benevolent God that we know not to exist – Friedman having been the winner of several of the world’s most-coveted Pulitzer Prizes.
If Friedman is, indeed, too quick to trust the powerful, it’s a trait he shares with the just over half of Americans, who tell pollsters they’re fine with the NSA programs that were until recently hidden from their view. Why, our countrymen wonder, ought we to be disturbed by our state’s desire to know everything that everyone does? Given the possibility that this surveillance could perhaps prevent deaths in the form of terrorist attacks, most Americans are willing to forgo some abstract notion of privacy in favor of the more concrete benefits of security.
Besides, the government to which we’re ceding these broad new powers is a democracy, overseen by real, live Americans. And it’s hard to imagine American government officials abusing their powers – or at least, it would be, had such officials not already abused similar but more limited powers through repeated campaigns of disinformation, intimidation and airtight crimes directed at the American public over the last five decades. Cointelpro, Operation Mockingbird, Ultra and Chaos are among the now-acknowledged CIA, FBI and NSA programs by which those agencies managed to subvert American democracy with impunity. Supporters of mass surveillance conducted under the very same agencies have yet to address how such abuses can be insured against in the context of powers far greater than anything J Edgar Hoover could command.
This is going to be a major problem going forward.
Top secret documents detail the mass scope of efforts by the United States to spy on Germany and Europe. Each month, the NSA monitors a half a billion communications and EU buildings are bugged. The scandal poses a threat to trans-Atlantic relations.
At first glance, the story always appears to be the same. A needle has disappeared into the haystack — information lost in a sea of data.
For some time now, though, it appears America’s intelligence services have been trying to tackle the problem from a different angle. “If you’re looking for a needle in the haystack, you need a haystack,” says Jeremy Bash, the former chief of staff to ex-CIA head Leon Panetta.
An enormous haystack it turns out — one comprised of the billions of minutes of daily cross-border telephone traffic. Add to that digital streams from high-bandwidth Internet cables that transport data equivalent to that held in Washington’s Library of Congress around the world in the course of a few seconds. And then add to that the billions of emails sent to international destinations each day — a world of entirely uncontrolled communication. And also a world full of potential threats — at least from the intelligence services’ perspective. Those are the “challenges,” an internal statement at the National Security Agency (NSA), the American signals intelligence organization, claims.
German Chancellor Angela Merkel has compared US spying to Cold War tactics and Brussels wants EU facilities checked for American eavesdropping equipment. Concern is growing the scandal could seriously damage trans-Atlantic relations.
The German government reacted strongly on Monday to media reports that the United States has spent years spying on the European Union and on specific European countries. Meanwhile, European Union leaders have both reviled the US for allegedly bugging EU diplomatic missions in Washington, DC, and New York and ordered that bloc facilities be searched for American eavesdropping equipment.
Potential GDP vs Actual GDP
Where are jobs coming from?
“What is driving the consumer?”