View
3
Download
0
Category
Preview:
Citation preview
SNOWDEN, THE NSA, AND THE SURVILLANCE STATE
THE NSA THE NSA AND THE
SOWDEN SOWDEN
THE SURVILLANCE STATE THE SURVILLANCE STATE
PARTS 7 & 8 SNOWDEN
The Other Programs The Abuses
PART SEVEN
THE OTHER PROGRAMS MUSCULAR, XKEYSCORE, BOUNDLESS INFORMANT, AND MYSTIC
AS THE WEEKS FOLLOWED, JOURNALISTS WOULD DISCOVER MANY MORE SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA...
HERE ARE FOUR OF THEM...
FOURTH AMENDMENT T
HE
Let’s Take A Look!
The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures, shall not be violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons or
things to be seized.
PROGRAM NUMBER ONE DATA COLLECTION
A program jointly administered by the NSA and Great Britain’s Government Communications HeadQuarters.
IT SECRETELY BREAKS INTO YAHOO AND GOOGLE DATA CENTERS AROUND THE WORLD.
According to leaked SNOWDEN documents, the program sends Millions
of records every day from
networks to data warehouses at the agencies headquarters in Fort
Meade, Maryland.
The program operates via an access point known as DS-200B, which is
outside the United States.
AN
D
According to the WASHINGTON POST the program collects more than
twice as many data points as the PRISIM program.
IT DOES NOT REQUIRE A FISA WARRENT.
GOOGLE was first made aware of the
program when a top-secret drawing on a PowerPoint slide was leaked by Snowden
The WP reported that “Two engineers with close ties to GOOGLE
exploded in profanity when they saw the drawing.”
Here is the slide they saw...
UPLOADED THIS REPORT OCT. 30, 2013
In November, 2013 Google announced
it was encrypting all traffic
between its data
centers.
YAHOO announced
similar encryption
plans at about the same time as Gogle.
In December, 2013 Micro-
soft referred to an
“advance persistent
threat” and announced
its own encryption
plans.
CORPORATE
In November, 2013 Google announced
it was encrypting all traffic
between its data
centers.
YAHOO announced
similar encryption
plans at about the same time as Gogle.
In December, 2013 Micro-
soft referred to an
“advance persistent
threat” and announced
its own encryption
plans.
FILED THIS REPORT ON OCTOBER 31, 2013
PROGRAM NUMBER TWO SEARCH ENGINE
Formerly secret computer system used by the NSA for searching and analyzing the internet data it collects everyday. Characterized by Snowden and Greenwald as a system which enables almost unlimited surveillance of anyone, anywhere in the world...
On January 26, 2014, SNOWDEN gave an interview with the German radio broadcaster, Norddeutscher Rundfunk. He said the following...
“You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information. …You can tag individuals… Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”
According to The Guardian's Glenn Greenwald, low-level NSA analysts can via systems like XKeyscore "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."
He added that the NSA's databank of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future"
ACCORDING TO THIS TOP SECRET SLIDE REVEALED
BY SNOWDEN, THE NSA USES 700 SERVERS
IN APPROXIMATELY 150 SITES THROUGHOUT
THE WORLD...
ACCORDING TO THE NSA
In an official statement from July, 2013, the NSA said “Xkeyscore is used as part of the NSA’s lawful foreign signals intelligence collection system to legally obtain information about “legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. There is no “unchecked analyst access to NSA collection data. Access to Xkeyscore, as well as all of NSA’s analytic tools is limited to only those personnel who require access for their assigned tasks.” and that there are stringent oversight and compliance mechanisms built in at several levels.
On August 1, 2013, RT filed this report,
explaining the system...
PROGRAM NUMBER THREE VISUALIZATION TOOL
Is a big data analysis and visualization tool used by the NSA to show summaries of world-wide data collection. When the tool was revealed to the public it served as a direct contradiction to assurances from the NSA that it does not collect any type of data on millions of Americans
The existence of the tool was revealed in THE GUARDIAN on June 8, 2013.
Leaked documents contained a Top Secret
“heat map” summarizing data records from 504 separate DNI (Digital Network
Intelligence, or INTERNET records) and DNR (Dialed Number Recognition or
TELEPHONE records).
The map also documented massive spying on other countries...
The map shows almost 3 BILLION data elements from inside the United States for a 30 day period ending March, 2013.
The map also showed massive surveillance in German, France, Spain, Norway, Italy, and the Netherlands.
NSA DIRECTOR
KEITH ALEXANDER
On October 29th 2013 Keith Alexander declared that accusations in French, Spanish, and Italian media about NSA intercepting millions of phone calls from these countries are “completely false.”
He added that “This is not information that we collected on European citizens.” It represents information that we and our NATO allies have collected in defense of our countries.”
PROGRAM NUMBER FOUR DATA COLLECTION
The program was revealed by Barton Gelman in the Washington Post on March 18, 2014. The scope and size of the NSA’s data collection program proved to be much larger than anyone had ever imagined...
The program allows the NSA to record 100% of an ENTIRE NATION’S
telephone calls. It can then rewind and replay the conversations
for as long as a month after they have taken place.
When the story was first revealed
the target nation was not identified...
WATCH THE NEWS SUMMARY...
On May 19, 2014 the
revealed that the nation being spied on was the BAHAMAS
The INTERCEPT published this chart, suggesting another unnamed nation was also targeted. The audio program was
called SOMALGET. The program also scoops up massive metadata from 3 other countries as listed.
The NSA used this cover slide as
the logo for the program.
On MAY 27th 2014, Julian Assange, founder of WIKKILEAKS
revealed the identity of the nation marked with an “X” on
the INTERCEPT graphic...
Watch the summary from RT...
VIDEO BREAK
THE NBC INTERVIEW brian williams and edward snowden
On May 28,2014 Brian Williams of NBC Nightly News
flew to Moscow to meet with Edward Snowden for the
first major network TV interview
In it, he would attempt to explain his motivations to a national audience.
PART EIGHT
THE ABUSES AUDIT REPORTS – SPYING ON AMERICANS
Although James Clapper, Director of Natl. Intel. suggested that none of
the programs you have just seen exist, we know they do, and that there have been abuses in the past...
WATCH THIS REPORT
FROM NBC NEWS, 9-23-2013
On Aug. 16, 2013, Barton Gellman published details of a classified internal audit
that showed the NSA violated it’s own rules thousands of times...
For a period of about a year, there were 2,776 VIOLATIONS. Most involved “unauthorized
surveillance of Americans or foreign intelligence targets in the U.S.” and most were accidental.
Less than 1 year after the previous
story (9-11-2013)
ran this story about more violations...
Documents also reveal that the NSA spies on gamers,
including X-BOX live connections and games like
“WORLD OF WARCRAFT”
For some, this seems to be an abuse of government power... Watch the report...
The NSA also had an unusually high interest
on specific games...
WATCH THE NEWS REPORT...
THE END SNOWDEN / THE NSA AND THE SURVEILLANCE STATE
Recommended