writes: The http://thedesk.matthewkeys.net... reports on a FOIA request covering "... all e-mails sent by Edward Snowden"
Remember how Snowden should have raised his concerns with his superiors within the NSA?
Remember how no such communication could be found?
Remember how one such communication was released but did not seem to be raising direct concerns?
Well some record of e-mail communications seems to exist but they are exempt from public disclosure under the federal Freedom of Information Act.Link to Original Source
writes: The Sydney Morning Herald is reporting that Australian federal and state police are using a no warrant cell phone tower metadata access technique called a "tower dump".
A "tower dump" provides the identity, activity and location of all cell phones that connect a cellphone tower(s) over time (an hour or two). The metadata from thousands of phones and numbers connected are then sorted. Australian law-enforcement agencies made 330,000 requests for metadata in 2012-13.
Some US views on the same legal issues:
Judge Questions Tools That Grab Cellphone Data on Innocent People (Oct 22, 2012)
Will Telcos Follow ISPs and Extend Warrant Protection for All? (JUNE 17, 2014)
"Lawsuit seeks details on Chicago Police purchases of cellular tracking gear" (June 10, 2014)
"Records from more than 125 police agencies in 33 states revealed one in four used a tactic called a “tower dump,”...."Link to Original Source
writes: Follow the ongoing EFF work on obtaining a document FOIA (Freedom of Information Act) requests have found to be exempt under "internal deliberations".
Are secret laws been used to provide more cover for a CIA's $10 million telco record deal?
Welcome to the world of past telco exigent letters and National Security Letters.
"FBI Replaced Legal Process with Post-It Notes to Obtain Phone Records"
http://www.techdirt.com/articles/20100121/1418107862.shtmlLink to Original Source
writes: A team of eight antiwar activists broke into an FBI office in Media, Pennsylvania and removed at least 1000 documents.
Once removed and sorted, the bulk of the files showed FBI spying on US political groups. Cointelpro had been found.
43 year later more details about how the anonymously packages ended up with select US reporters weeks later.
Years later the full extent of COINTELPRO (COunter INTELligence PROgram) was finally understood.
http://en.wikipedia.org/wiki/COINTELPROLink to Original Source
writes: The US Department of Defense (DoD) has released a 150 page document covering its vision for the future role of unmanned systems.
The report mostly covers drones (unmanned aerial systems) use but offers insight into land, and sea technology too.
Pre-programmed tasks, new algorithms, more sensors, and complex machine learning will be advanced to help try and reduce projected funding needs. For example humans will not be needed for the duration of the mission until a drone swarm is released. The need to shape cultural hurdles, standards, and export regulations around the use of drones will also be worked on.
pdf at http://www.defense.gov/news/newsarticle.aspx?id=121392 or
http://publicintelligence.net/dod-unmanned-systems-2013/Link to Original Source
writes: The American Civil Liberties Union sought to challenge the Ul legal "border exemption" three years ago.
Can your laptop be seized and searched at the border?
A 32 page decision provides new legal insight into legal thinking around suspicion less searches, making copies, keeping copies.
"think twice about the information you carry on your laptop.."
“Is it really necessary to have so much information accessible to you on your computer?”
i.e. your electronic devices searchable and sizeable for any reason at the U.S. border.
ACLU may appeal. The decision: https://www.aclu.org/sites/default/files/assets/abidor_decision.pdf
Also note the Kool-Aid comment.Link to Original Source
writes: USCYBERCOM was a powerful new command to conduct full spectrum military cyberspace operations created in 2006 and reached full operational capability by late 2010.
Could CYBERCOM be returning to its US military origin away from public spotlight of its more civilian setting in the NSA via the Director of National Intelligence (DNI)?
The NSA may have its powers returned to that of keeping US codes safe, ensuring international cryptography is useless, spying and its ongoing US domestic surveillance duties. The newer, coveted global operations role hidden before more relations by Snowden, other whistleblowers or investigative journalists induce public hearings?
Cyber Commands “offensive” operations on the Internet would then be secure form hearings, investigations or any new laws or limits.
Will part of the US mil get their offensive cyber warfare role back from an agency that gained many new roles in a very short time frame and much publicly?
Expect to see the spin of many classic sock puppets with good news stories about why the NSA needs its new powers to reach out globally and within the USA e.g.
Some links about the role, formation and use of Cyber Command can be found at https://en.wikipedia.org/wiki/United_States_Cyber_CommandLink to Original Source
writes: Thomas Drake a decorated United States air force, navy veteran and whistleblower from a position as a senior executive at America's National Security Agency.
His views on the 4th amendment, the foreign intelligence surveillance act and the role of an extraordinarily broad dragnet of electronic surveillance in the US.
The interview talks about countries going along with US surveillance as they feel they will never be caught and the telco tech is in place.Link to Original Source
writes: With the US trying to understand the domestic role of their foreign intelligence and counterintelligence services in 2013, what can a declassified look back into the 1960's and 1970's add to the ongoing legal debate?
Welcome to the world of Interagency Security Classification Appeals Panel and the work done by the National Security Archive at George Washington University.
Read about prominent anti-war critics and US senators been tracked and who was on the late 1960's NSA watch list.
From Rev. Martin Luther King to civil rights leader Whitney Young, boxer Muhammad Ali, Tom Wicker, the Washington bureau chief and Washington Post columnist Art Buchwald, Sen. Howard Baker (R-Tenn.).
The NSA was aware of the legality of its work and removed all logos or classification markings, using the term 'For Background Use Only".
Even back then NSA director at the time, Lew Allen noted: “appeared to be a possible violation of constitutional guarantees,” page 86:
What did the NSA think about signals intelligence sites in your country? See if your country makes the "indefinite" list on page 392:
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%201%202008-021%20Burr%20Release%20Document%201%20-%20Part%20A2.pdfLink to Original Source
writes: Slashdot readers have seen and commented on the news surrounding internet encryption and who can get access.
The Sydney Morning Herald is reporting that the Australian Signals Directorate (was Defence Signals Directorate, DSD) and New Zealand's GCSB are expected to invited into the same initiative.Link to Original Source
writes: Australia’s Foreign Minister Bob Carr seems to be fine with US international data collection (spying) with the help of US consumer hardware, telcos and software vendors by the NSA (National Security Agency). It would seem the protections offered to all US citizens under the US "Bill of Rights and its Supreme Court, on where individuals stand in relationship to Government" will some how be offered to or balance out Australian law on privacy and data protection. Will a "lively political system" in the USA look after the privacy of Australians?
Network Ten’s Meet the Press program has the text of the interview here http://resources.news.com.au/files/2013/06/09/1226660/835253-meet-the-press-transcript.pdfLink to Original Source
writes: Could using social media or blog comments about any military operation make you a legal military target? Australian army Land Warfare Studies Centre analyst Chloe Diggins looks at what could make a web 2.0 user a combatant.
The Geneva Convention protecting civilians could be removed if a power feels uploading, downloading or sharing is part of the fight. How long before "knowingly providing material support or resources to an entity that has been designated as Foreign Terrorist Organizations under section 219 of the Immigration and Nationality Act." becomes just "providing material support or resources to an entity that has been designated"Link to Original Source
writes: The US Federal Communications Commission (FCC) is considering an expansion to the Universal Service Fund. Submarine cable operators with landings in the United States could face a 15.7 percent levy on quarterly revenues. Some history on US telco rates can be found at: http://www.commsday.com/commsday/2012/comment-bad-timing-proposed-undersea-cable-tax/Link to Original Source
writes: delimiter.com.au has news on ISP data retention ideas in Australia.
Australia would like to follow the EU down the "European Directive on Data Retention" path.
Australian law enforcement agencies may have the option to request a log of all a users of interest telco usage without any review or time limits.
Another option would be for local politics eg. an activist community. Data retention over a postcode (suburb).
The data collection could also be out sourced to private contractors.Link to Original Source
writes: A law enforcement Trojan seems to have used the now patched unencrypted HTTP version request in Apple's media software.
A new update request would direct the target to a fake webpage. Apple now uses https.
More at http://blogs.wsj.com/digits/2011/11/21/surveillance-company-says-it-sent-fake-itunes-flash-updates-documents-show/Link to Original Source