` Joint Investigations are Under-Way in US States Over Alleged Cyber-Attacks and Ebays Security Practices '


#AceSecurityNews – UNITED STATES – May 23 – Several U.S. states, including Connecticut, Florida, and Illinois, are jointly leading an investigation into eBay’s security practices, following eBay’s reveal this week of a massive cyber-attack which the company says compromised a large number of users’ personal information.

Courtesy of LoopNews

Though eBay claims that financial data, which was stored separately, was not acquired during this breach, these U.S. States Attorney Generals’ offices are taking the matter seriously after a series of high-profile attacks at retailers like Target, Neiman Marcus and Michael’s have left U.S. consumers vulnerable to identity theft.

` NSA Records Almost All Domestic and International Phone Calls in Afghanistan ‘


#AceSecurityNews – NSA – May 23 – The NSA records almost all domestic and international phone calls in Afghanistan, similar to what it does in the Bahamas, WikiLeaks’ Julian Assange said.

Reports in the Washington Post and the Intercept had previously reported that domestic and international phone calls from two or more target states had been recorded and stored in mass as of 2013.

Both publications censored the name of one victim country at the request of the US government, which the Intercept referred to as ‘Country X’.

Assange says he cannot disclose how WikiLeaks confirmed the identity of the victim state for the sake of source protection, though the claim can be “independently verified” via means of “forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs.”

This is not the first time it has been revealed mass surveillance was being conducted on Afghanistan by the NSA. According to a book released by Der Spiegel entitled ‘Der NSA Komplex’, a program called ACIDWASH collects 30-40 million telephony metadata records per day from Afghanistan. ACIDWASH has been identified as being part of the MYSTIC program.

WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is #Afghanistan. https://t.co/vWwU4DJw0I#afpak
— WikiLeaks (@wikileaks) May 23, 2014
The Intercept, which Glenn Greenwald, who first broke the Edward Snowden revelations helped to found, had earlier named the Bahamas as having their mobile calls recorded and stored by a powerful National Security Agency (NSA) program called SOMALGET.

SOMALGET is part of a broader NSA program called MYSTIC, which the the NSA is using to gather metadata – including the numbers dialled and the time and duration of the calls – from phone calls in the Bahamas, Mexico, Kenya and the Philippines. SOMALGET by its nature is far more controversial, however, as it stores actual phone conversations for up to 30 days.

WikiLeaks initially opted not to reveal the name of ‘Country X’ as they were led to believe it could “lead to deaths” by Greenwald. WikiLeaks later accused The Intercept and its parent company First Look Media of censorship, saying they would go ahead and publish the name of the NSA-targeted country.

“We do not believe it is the place of media to ‘aid and abet’ a state in escaping detection and prosecution for a serious crime against a population,” Assange said in the statement.

Read More at: RT – 23/05/2104 – http://tinyurl.com/paehpu9

#ANS2014

` Anti-Secrecy Group WikiLeaks Plans to Publish Name of Country Targeted by NSA ‘


#AceSecurityNews – UNITED STATES – May 21  – Despite warnings that doing so “could lead to increased violence” and potentially deaths, anti-secrecy group WikiLeaks says it plans to publish the name of a country targeted by a massive United States surveillance operation.

Wikileaks and Intercept

On Monday this week, journalists at The Intercept published a report based off of leaked US National Security Agency documents supplied by former contractor Edward Snowden which suggested that the NSA has collected in bulk the contents of all phone conversations made or received in two countries abroad. 

Only one of those nations, however — the Bahamas — was named by The Intercept. The other, journalists Ryan Devereaux, Glenn Greenwald and Laura Poitras wrote this week, was withheld as a result of “credible concerns that doing so could lead to increased violence.”

WikiLeaks has since accused The Intercept and its parent company First Look Media of censorship and says they will publish the identity of the country if the name remains redacted in the original article. The Intercept’s Greenwald fired back over Twitter, though, and said his outlet chose to publish more details than the Washington Post, where journalists previously reported on a related call collection program but chose to redact more thoroughly. 

“We condemn Firstlook for following the Washington Post into censoring the mass interception of an entire nation,” WikiLeaks tweeted on Monday.

“It is not the place of Firstlook or the Washington Post to deny the rights of an entire people to know they are being mass recorded,” WikiLeaks added. “It is not the place of Firstlook or WaPo to decide how people will [choose] to act against mass breaches of their rights by the United States.”

When Greenwald defended his decision to publish the names of four countries where telephony metadata is collected by the NSA but withhold a fifth where content is recorded as well, WikiLeaks said it could be interpreted as meaning that the unknown country doesn’t deserve to know they’re being surveilled, but Greenwald said

The Intercept was “very convinced” it could lead to deaths.

Later, WikiLeaks equated this as an act of racism.

But as the conversation escalated, the WikiLeaks Twitter announced it would disclose the nation’s identify if The Intercept did not, despite requests from the US government to leave that information redact over fears of what the response could be. 

When has true published information harmed innocents?” WikiLeaks asked.“To repeat this false Pentagon talking point is to hurt all publishers.” 

 

“We will reveal the name of the censored country whose population is being mass recorded in 72 hours,” WikiLeaks wrote at 6:35 p.m. EST Tuesday evening.

If the organization intends to uphold that promise, that the identity of the country could be revealed before the weekend. 

Read More at: RT

#ANS2014 

Enhanced by Zemanta

` Google Must Comply with European Laws on Privacy by Amending Search Results ‘


#AceSecurityNews – EU COURT Of JUSTICE – May 13 – Google must comply with the European laws on privacy and amend some search results, a top EU court ruled on Tuesday, May 13.

English: Google Logo officially released on Ma...

English: Google Logo officially released on May 2010 (Photo credit: Wikipedia)

The European Union Court of Justice said that ordinary people can ask Google to remove some sensitive, irrelevant or outdated information from Internet search results.

Earlier, the search engine stated that it does not control search results and bears no responsibility for personal data that is “in open access”. The responsibility lies with the owner of the website that provides the information, and Google merely presents the user with a link.

The case was brought by a Spanish man who complained that an auction notice of his home that could be found on Google infringed upon his privacy.

Around 180 similar complaints have been filed in Spain.

#ANS2014

Enhanced by Zemanta

` US House of Representatives Approves Legislation to Prevent Bulk Collection of Data ‘


#AceSecurityNews – UNITED STATES – WASHINGTON – NSA – May 08 –  A US House of Representatives committee approved legislation on Wednesday that would limit the National Security Agency’s bulk collection of domestic telephone metadata. By a vote of 32 to 0, the House Judiciary Committee advanced the USA Freedom Act, which would end the NSA’s wholesale gathering and storage of American phone data, leaving telecommunications companies responsible for retaining the records.

The bill would still allow the NSA to collect a person’s phone records, and those of people two “hops” or contacts away, if a judge on the Foreign Intelligence Surveillance Act court, which has been very generous to NSA spying requests in recent years, signs off on the request based on reasonable suspicion of so-called terrorism involvement.

A reform bill deemed as the toughest clampdown yet on the NSA’s collection of phone metadata is expected to move through a key US House committee this week, setting up a showdown between the bill and less stringent legislation supported by House leaders.

House of Representatives Judiciary Committee Chairman Bob Goodlatte (R-VA) will reportedly act on the USA Freedom Act on Wednesday after the bill sat dormant since its introduction in October by former judiciary committee chair and US Patriot Act author Jim Sensenbrenner (R-OH).

The bill is the favored legislative vehicle for privacy advocates that want to see reform of the NSA’s bulk collection of domestic phone call data. Congressional aides believe the bill will pass through the committee with bipartisan support, the Guardian reported. Privacy advocates believe the bill has real potential to pass in a general House vote should it get the chance.

The House Judiciary Committee’s USA Freedom Act was left for dead by House Republican leadership after a competing NSA reform bill was offered in March by House Intelligence Committee Chairman Mike Rogers. The intel committee’s proposal would allow the NSA to continue gathering domestic call data without a prior judicial order.

Hours after the Judiciary Committee announced it would markup its NSA bill on Wednesday, the Intelligence Committee said it would do the same with its own reform bill, the FISA Transparency and Modernization Act, on Thursday. FISA, or the Foreign Intelligence Surveillance Act, dictates US surveillance of “foreign intelligence information” that can include American citizens or permanent residents suspected of terrorism.

Goodlatte’s support for the USA Freedom Act was reportedly in doubt before House Republican leaders decided to bypass his committee effort to reform the NSA in favor of the Intelligence Committee’s more lukewarm legislation.

The Intelligence Committee’s Rogers has criticized the USA Freedom Act for going too far in curbing bulk collection capabilities that, he says, are vital for national security reasons.

Sensenbrenner’s USA Freedom Act was initially more strict in limiting NSA collection abilities, positing that it would “end bulk collection under Section 215 of the Patriot Act, in light of the massive intrusion on Americans’ privacy and the lack of evidence of its effectiveness.”

Ace Related News:

1. FOIA – http://www.gpo.gov/fdsys/pkg/BILLS-113hr3361ih/pdf/BILLS-113hr3361ih.pdf

2. FISA – http://judiciary.house.gov/_cache/files/d4c6f7fd-4768-4b30-813d-47109cac271a/fisa-anos-001-xml.pdf

RT – March 27

Tweet or Share adding @AceNewsServices or #ANS2014  

 

Enhanced by Zemanta

NSA: ` Complex Analysis of Electronic Surveillance used to Target Lethal Drone Attacks ‘


#AceSecurityNews – Guest Post – May 06 – The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

Courtesy of By  and  10 Feb 2014, 12:03 AM EDT

Ace Related News:

  1. First Look

Share or Tweet with #ANS2014 

 

 

 

 

Enhanced by Zemanta

` Telekom Obliged by Law to Give Security Agencies Information to Monitor under the Four Eyes Principle ‘


AceSecurityNews – BERLIN – May 05 – PRESS RELEASE – Telekom is obliged by law to give security agencies under certain conditions and information to enable monitoring. To ensure transparency, the Telekom now publishes the annual figures.

The Telekom pays strict attention to the compliance of telecommunications secrecy and data protection. If authorities intervene in these fundamental rights of citizens, Deutsche Telekom provides the legally impeccable machining state monitoring and requests for information secure. In particular, it is guaranteed that Telekom is active only if the legal conditions are met.

Support services for surveillance activities are thereby rendered strictly in accordance with the four-eyes principle, ie there are always two people involved that monitor each other.

This procedure protects against work errors. The individual processing steps are documented and subject to regular inspection by the safety representative and by the Federal Network Agency. In addition, check the Privacy Officer and the Internal Audit Department of Deutsche Telekom.

The following table shows for the period 2013 arranged by state authorities against the telecom connection monitoring and beauskunfteten traffic data sets, participants inventory data and IP addresses:

Ace Related News:
1. German Telekom Press Release – May 05 – http://tinyurl.com/o4kvkyu
2. Sueddeutsche.de – Article – May 05 – http://tinyurl.com/oxrda4k

#ANS2014