Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Search Results for: Snowden

Cryptographer and Harvard Scholar – NSA broke Internet’s security for everyone

Sean Gallagher, Ars Technica: “To say that there are a lot of people who are angry with the National Security Agency (NSA) right now would be an understatement. But the things that are getting the most political attention right now—such as the invasion of the privacy of American citizens and spying on the leaders of American… Continue Reading

Commentary on Google’s latest transparency report – what is missing that they cannot reveal

Rebecca J. Rosen – The Atlantic: “Today brings the release of the first Transparency Report since the Snowden revelations about widespread government surveillance, and Google’s tone has changed dramatically. In contrast with the warm glow of corporate benevolence Google has tended to exude in these moments, today’s Google Blog post announcing the new Report is a touch surly,… Continue Reading

NYT – No Morsel Too Minuscule for All-Consuming N.S.A.

Via Scott Shane this investigative report – “From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as… Continue Reading

UK Guardian’s interactive interviews, charts open the debate on NSA surveillance

NSA Files Decoded – Edward Snowden’s surveillance revelations explained – By EWEN MACASKILL and GABRIEL DANCE – Produced by FEILDING CAGE and GREG CHEN “When Edward Snowden met journalists in his cramped room in Hong Kong’s Mira hotel in June, his mission was ambitious. Amid the clutter of laundry, meal trays and his four laptops,… Continue Reading

WaPo – NSA infiltrates links to Yahoo, Google data centers worldwide

Snowden documents how NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants – by Barton Gellman and Ashkan Soltani “The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world,… Continue Reading

UK Guardian – NSA monitored calls of 35 world leaders after US official handed over contacts

Jason Ball – The NSA memo suggests that such surveillance was not isolated as the agency routinely monitors world leaders. [snipped] “The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward… Continue Reading

WaPo – NSA challenged by data overcollection from e-mail address books, buddy lists

Barton Gellman, Ashkan Soltani, Julie Tate: “The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden. The collection program, which has not… Continue Reading

Paper – The Massive Metadata Machine

The Massive Metadata Machine: Liberty, Power, and Secret Mass Surveillance in the U.S. and Europe, Bryce Clayton Newell, University of Washington – The Information School, October 11, 2013. I/S: A Journal of Law and Policy for the Information Society (ISJLP), 10, 2014 “This paper explores the relationship between liberty and security implicated by secret government… Continue Reading

Legal challenge to UK Internet surveillance

“Since the first disclosure of documents regarding the US National Security Agency (NSA)’s collection of US phone records from 5 June 2013 the British public has witnessed a series of alarming disclosures regarding the extent of the surveillance programmes operated by US and UK intelligence services. The source for the vast majority of these reports… Continue Reading

Guardian – Attacking Tor: how the NSA targets users’ online anonymity

Secret servers and a privileged position on the internet’s backbone used to identify users and attack target computers, by Bruce Schneier, October 4, 2013. “The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA‘s application vulnerabilities branch, which is part of… Continue Reading

Guardian – NSA, GCHQ target Tor network that protects anonymity of web users

One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers by James Ball, Bruce Schneier and Glenn Greenwald “The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the… Continue Reading

UK Guardian faces financial hurdles in taking investigations global

A British newspaper wants to take its aggressive investigations global, but money is running out. by Ken Auletta, New Yorker, October 7, 2013. “Since June 5th, the Guardian had been publishing top-secret digital files provided by Edward Snowden, a former contract employee of the National Security Agency. In a series of articles, the paper revealed… Continue Reading