Академический Документы
Профессиональный Документы
Культура Документы
http://www.lawfareblog.com/catalog-of-the-snowden-...
LAWFARE
H A R D N AT I O N A L S E C U R I T Y C H O I C E S
1 of 3
01/31/2014 08:00 PM
http://www.lawfareblog.com/catalog-of-the-snowden-...
NSA has collected draft email messages written by leaders of the Islamic State of Iraq. NSA has monitored the communications of the Afghan Ministry of Foreign Affairs and UN officials in Afghanistan. NSA has monitored the communications of Venezuelas Ministry of Planning and Finance. NSA and GCHQ have penetrated OPECs network to collect economic data. NSA has monitored the communications of German Chancellor Angela Merkel. NSA has monitored the communications of the Italian leadership and Ministry of Defense. NSA has monitored the communications of the French embassy in Washington and the French mission in New York. NSA has monitored the communications of several Mexican and Brazilian officials, including the presidents of both countries. NSA has monitored the communications of Petrobas, an oil company that is partially owned by the Brazilian government. NSA has penetrated the network of the French Ministry of Foreign Affairs. NSA has monitored the communications of Al Jazeera. NSA has penetrated Aeroflots reservation system. NSA has monitored the unencrypted communications of the Syrian military. NSA and GCHQ monitored the communications of several delegations to the 2009 G20 summit in London, including the South African, Turkish, and Russian delegations. 4. Encryption that NSA has broken NSA has broken the A5/1 encryption used by many GSM cell phones. 5. Identity of ISPs and platforms that NSA has penetrated or attempted to penetrate NSA has developed hardware and software implants for Juniper, Cisco, and Huaweil firewalls. NSA has developed software to target the firmware of Western Digital, Seagate, Maxtor and Samsung hard drives. NSA has developed hardware and software implants for Dell and HP servers. NSA has developed software to target users of Juniper and Huaweil routers. NSA has developed an implant for first-generation iPhones that enables downloading and uploading data, activating the phones microphone and camera, and locating the phone. NSA has developed modified Eastcom and Samsung cell phones, which can be swapped with a targets own phone of the same model and then used to collect information. NSA and GCHQ have penetrated the Xbox Live gaming system to collect information about foreign targets. NSA and GCHQ have intercepted communications at communication links outside the United States that connect Google and Yahoo data centers. NSA has harvested email and instant messaging contact lists from Yahoo, Hotmail, Facebook, and Gmail. NSA and GCHQ have attempted to develop techniques to identify Tor users but have been largely unsuccessful. NSA has collected financial transaction information from Visa and SWIFT. NSA and GCHQ have developed capabilities to access user data from iPhone, BlackBerry, and Android devices. 6. Identities of cooperating companies and governments NSA entered into a contract with RSA to use an NSA formula as the default option for number generation in the Bsafe security software, enabling NSA to penetrate the software more easily. RSA asked consumers to stop using the formula after the Snowden leaks revealed its weaknesses. The Norwegian Intelligence Service cooperates with NSA to collect information about Russia, particularly Russian military activities in the Kola Peninsula and Russian energy policy. The Communications Security Establishment Canada has established listening posts in approximately twenty countries at NSAs request. The Swedish Defence Radio Establishment cooperates with NSA to collect information about Russia. The Australian Signals Directorate has been more willing than other allies to share unminimized bulk metadata with NSA. The Communications Security Establishment Canada cooperated with NSA to collect information about the 2010 G20 summit in Toronto. The Australian Signals Directorate cooperated with NSA in an attempt to monitor the communications of senior Indonesian officials, including the President, the Vice President, and several ministers. As of 2009, NSA was considering establishing an intelligence-sharing relationship with Vietnam. NSA has an intelligence-sharing relationship with the Israeli SIGINT National Unit. The Communications Security Establishment Canada cooperated with NSA to monitor the communications of Brazils Ministry of Mines and Energy. NSA has collected international communications from Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple as part of its PRISM program.
Like 503 Tweet 225 64
80
2 of 3
01/31/2014 08:00 PM
http://www.lawfareblog.com/catalog-of-the-snowden-...
Add a comment...
Comment Andrew Borene Director of National Security Solutions at Nuance Communications I'm glad Lawfare pulled this together and will continue to do so-- because it illustrates the damage being done by the Snowden leaks to US interests. This is not a catalog of "whistle-blowing" related to any unique abuse of US government power against US persons or any domestic surveillance concern... this is a wholesale, non-specific, and intentional compromise of vital national security information (specifically SIGINT sources and methods)... our tax dollars will have to be re-spent to re-establish many collections channels, our troops will be in greater danger, and our elected leaders will be at an information disadvantage because of these disclosures.... Oh, and our US-based ISPs and internet companies are suffering losses because of these leaks by one leaker. Whatever Edward Snowden really intends to do, if you are an American will you think twice before you say he is a "whistle-blower"? Reply Like Yesterday at 8:05am
Facebook social plugin
3 of 3
01/31/2014 08:00 PM