An einem einzigen Tag soll der britische Geheimdienst GCHQ Zugriff auf 21.600 Terabyte gehabt haben – wozu, weiß nicht einmal der BND. Sicher ist nur: Die Überwacher bekommen Hilfe von großen Telekommunikationskonzernen. Das amerikanische Außenministerium hat vor Jahren einen kleinen Flecken in Ostfriesland auf eine Liste der weltweit schützenswürdigen Einrichtungen gesetzt. Ein Angriff auf das […]
lees meerMenu
Categorieën
- advocaat
- Afghanistan
- afluisteren
- Africa
- Agência Brasileira de Inteligência (Abin)
- Airbus
- AIVD, Alg. Inlichtingen- en Veiligheidsdienst
- Algeria
- Altegrity Inc.
- Amesys
- Amsterdam
- anarchism
- Angola
- ANPR, Automatic Number Plate Recognition
- Anthrax
- Apalachee
- apartheid
- arab spring
- Argentina
- arms trade / wapenhandel
- ASIO, Australian Security Intelligence Org.
- Australia
- Austria / Oostenrijk
- automatisering
- Azerbaijan
- B.amt für Verf.schutz Terror.bekämpf. (BVT)
- BAE Systems
- Bahamas
- Bahrain
- Barrett Brown
- Belarus
- België
- bestuurlijke dwang
- BIBOB, bev. integrit.beoordel. openb. best.
- BKA, Bundeskriminalamt
- Black Lives Matter
- Black Panthers
- Blackwater
- BND, Bundesnachrichtendienst
- Bob Lambert / Bob Robinson
- Booz Allen Hamilton
- border control
- Boundless Informant
- Brazil
- Bulgaria
- Bundesamt für Verfassungsschutz (BfV)
- Caci International Inc.
- Cambodia
- cameratoezicht
- Canada
- Capitalism
- Carnivore, DCS-1000
- CBP, Col. bescherming persoonsgegevens
- CCTV, Closed-circuit TV, cameratoezicht
- Cellebrite
- Centro Nacional de Inteligencia (CNI)
- Chad
- Chelsea Manning
- Chemical weapons
- Chile
- China
- CIA, Central Intelligence Agency
- CIE, Criminele Inlichtingen Eenheid
- Climate talks
- CNI
- Cointelpro
- Cold War / Koude Oorlog
- Colombia
- Com. Security Establish. Canada, CSEC
- Computer Sciences Corporation, CSC
- Congo
- corporations/bedrijven
- corruption
- CSIS, Canadian Security Intelligence Ser.
- CTIVD, Com. Toez. Inlicht.- Veiligh.dienst
- Cuba
- cyber security
- cyber war
- dactyloscopy / fingerprint identification
- DAS
- Dassault Systèmes
- data exchange
- Data Intercept Technology Unit, DITU
- DCRI, Dir. cent. du Renseignement int.
- DEA, Drug Enforcement Administration
- Defence Signals Directorate, DSD
- Democratic Republic of the Congo
- Denmark
- deportation
- deskundigen
- DGSE
- DIA, Defense Intelligence Agency
- Diego Garcia
- dierenrechten / animal rights
- Djibouti
- DNA
- Döner-Morde
- drones
- Duitsland
- dwangarbeid
- Dyncorp
- Echelon
- economische spionage
- Egypt
- El Salvador
- Elbit Systems
- encryption
- Ercom-Suneris
- ethnic profiling
- EU, European Union
- European External Action Service
- Europol
- Extinction Rebellion
- extreemrechts
- Falklands
- FBI, Federal Bureau of Investigation
- FISA
- Foreign Security Administration (Tunisia)
- Fox-IT
- France
- fraude
- Freedom of Information Act
- Freezing of assets
- Frontex
- FSB, Federal Security Service (Russia)
- G4S, Group4securicor
- G7 G8 G20
- GCHQ, Gov. Com. Headquarters (UK)
- GCSB, Gov. Com. Security Bur. (N. Zealand)
- Genie
- genocide
- Gladio
- Greece
- grondrechten
- Groupe Bull
- Guantanamo Bay
- Guatemala
- Hauptstelle für Befragungswesen HBW
- Heeres-Abwehramt (HAA oder HabwA)
- Heeresnachrichtenamt (HNaA oder HNA)
- Hezbollah
- Hollywood
- Homeland Security
- Iceland
- In-Q-Tel
- IND
- India
- Indonesia
- industrial/economic espionage
- industry
- informanten/infiltranten
- Inlichting/Veiligheid/dienst (WIV)
- inlichtingen(operatie(s))
- internet surveillance
- interrogation/verhoor
- IRA, Irish Republican Army
- Iran
- Iran – Contra Affair
- Iraq
- Ireland
- ISI, Inter-Services Intelligence (Pakistan)
- Islamic State (IS)
- ISNU – the Israeli Sigint National Unit
- Israël
- Israel Aerospace Industries (IAI)
- ISS World Telestrategies Fair
- Italy
- Japan
- Jeremy Hammond
- Jordan
- journalisten
- JTRIG
- Kenya
- KGB see FSB
- KLPD, Korps Landelijke Politie Diensten
- KMar, Koninklijke Marechaussee
- Kurds
- L-3 Communications
- Laos
- Leak(s)
- Lebanon
- Libya
- lobbying
- Lockheed Martin
- Lustre
- Luxemburg
- MacAulay-Brown
- Maldives
- Mali
- Mark Kennedy
- Mauritania
- mercenaries/huurlingen
- Metropolitan Police / Scotland Yard
- Mexico
- MI5, The Security Service (Mili. Int. Sect. 5)
- MI6, Secret Int. Service (Mili. Int. Sect. 6)
- Micro Systemation AB
- migration
- Militärischer Abschirmdienst (MAD)
- military in general
- Military Intelligence
- Military Reaction Force
- Millî Istihbarat Teşkilâti (MIT) Turkey
- Ministerie van Defensie MoD
- Ministry of State Security (MSS)
- MIVD, Militaire Inlicht.- en Veiligheidsdienst
- Morocco
- Mossad
- multi nationals
- Mystic
- National Intelligence Service (South Korea)
- National Security Administration (Tunisia)
- NATO, North Atlantic Treaty Organization
- Nazis
- NCTV (Nat. Coord. Terror. en Veiligheid)
- NDB, Nachrichtendienst des Bundes
- Nederland
- Nestlé
- New Zealand
- Nexa Technologies
- NORTHROP GRUMMAN
- NR, Nationale Recherche
- NSA, National Security Agency
- nuclear power
- NYPD
- Openbaarheid van Bestuur (Wob)
- opsporing
- Org. Petro. Export. Coun.
- Pakistan
- Palestine
- Panama
- Panama Papers
- particuliere beveiliging
- Pentagon
- PET
- Philippines
- Poland
- police cooperation
- Police judiciare
- politie
- politieke partijen
- preventief fouilleren
- Prism
- prisons gevangenissen
- Private Security Companies (PSC)
- privatisation
- Project Paperclip
- protesters
- Providence Equity Partners LLC
- provocateur
- proxy war
- Prüm
- Qatar
- Raytheon
- RCMP, Royal Canadian Mounted Police
- refugees vluchtelingen
- Regionale inlichtingendienst RID
- Renault
- rendition
- RUC
- Ruffle
- Russia
- Rwanda
- Rwanda's foreign intel. serv.
- SAIC
- sanctions
- Säpo Säkerhetspolisen
- Sardine
- Saudi Arabia
- schendingen van grondrechten
- Schengen
- scientists
- SDS Special Demonstration Squad
- Securitas AG
- sexual harassment
- Silverzephyr
- Singapore
- Skype
- social media surveillance
- Somalget
- Somalia
- SOS International SOSi
- South Africa
- South Korea
- Spain
- Special Branch
- Special Collection Service SCS
- Spyware
- SREL
- Sri Lanka
- Staatsveiligheid
- Stasi
- Stateroom
- Stephen Lawrence
- stop and search operation
- Stratfor
- students
- Sudan
- Suojelupoliisi (Supo)
- surveillance
- Sweden
- Switzerland
- Syria
- Taiwan
- taser gun
- Technical Services Division (TSD)
- telecom providers
- telefoontap/eavesdropping
- Tempora
- Terrorism
- terrorist lists UN EU US
- Thailand
- Thales
- The Asia Foundation
- The Kissinger Cables
- the Media
- toezicht geheime diensten CTIVD
- torture
- trade union / vakbond
- Tulsa Massacre
- Tunisia
- Turkey
- UDA
- Ukraine
- United Arab Emirates (UAE)
- United Kingdom UK
- United Nations (UN)
- United States of America USA
- United States SIGINT System USSS
- UNSCOM
- USIS
- Uzbekistan
- Vastech
- Venezuela
- Verint
- Vietnam
- voetbal
- war on drugs
- war on migration
- war on terror
- whistleblower
- Wikileaks
- WMD
- XKeyscore
- Yemen
- Zimbabwe
- Zweden
- Zwitserland
Ecuador’s flag flying above its coat of arms at the country’s embassy in Moscow on Monday. Snowden is seeking asylum in the South American nation. Journalists flocked to Moscow’s Sheremetyevo Airport on Monday to board a flight to Cuba that supposedly would also contain fugitive Edward Snowden, who is attempting to escape arrest by U.S. […]
lees meerIn early 2010, journalist and satirist Barrett Brown was working on a book on political pundits, when the hacktivist collective Anonymous caught his attention. He soon began writing about its activities and potential. In a defense [2] of the group’s anti-censorship operations in Australia published on February 10, Brown declared, “I am now certain that […]
lees meerJeremy Hammond pleaded guilty today to the infamous Stratfor hack, as well as taking responsibility for eight additional hacks of law enforcement and defense contractor websites in 2011 and 2012. As a condition of the plea, the radical hacker will face a maximum of 10 years in federal prison, and restitution costs of up to […]
lees meerLONDON—Today, Monday 27 February, WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to […]
lees meerWilliam Hague has hailed GCHQ’s ‘democratic accountability’, but legislation drafted before a huge expansion of internet traffic appears to offer flexibility GCHQ – the government’s communications headquarters. Does it have the strongest checks and balances in the world? Photograph: Reuters William Hague was adamant when he addressed MPs on Monday last week. In an emergency […]
lees meerFisa court submissions show broad scope of procedures governing NSA’s surveillance of Americans’ communication • Document one: procedures used by NSA to target non-US persons • Document two: procedures used by NSA to minimise data collected from US persons The documents show that discretion as to who is actually targeted lies directly with the NSA’s […]
lees meerWASHINGTON — When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work […]
lees meerScheme – set up before firm was purchased by Microsoft – allegedly eased access for US law enforcement agencies Prosecutors in Zhu Yufu’s trial for subversion cited text messages that he sent using Skype. Photograph: Mario Tama/Getty Images Skype, the web-based communications company, reportedly set up a secret programme to make it easier for US […]
lees meerSkype calls’ immunity to police phone tapping threatened Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown. Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown on what law authorities believe is a massive technical loophole in current wiretapping laws, allowing […]
lees meerIn het voorjaar van 2010 was India een paar weken in de ban van een afluisterschandaal, maar vervolgens verdween dat in de vergetelheid. Dit is opmerkelijk gezien de staat van dienst van de inlichtingenwereld in India. Schandalen die gewone Indiërs raken, maar ook corruptie, slecht management, verkeerde technologie en apparatuur en bovenal incompetentie lijken de […]
lees meerMUMBAI, India — The terrorists who struck this city last month stunned authorities not only with their use of sophisticated weaponry but also with their comfort with modern technology. The terrorists navigated across the Arabian Sea to Mumbai from Karachi, Pakistan, with the help of a global positioning system handset. While under way, they communicated […]
lees meerExclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal Secret document detailing GCHQ’s ambition to ‘master the internet’ Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the […]
lees meerBritain’s intelligence agencies will emerge as the biggest winners from the Government’s review of public spending, The Telegraph can disclose. MI6, MI5 and Government Communications Headquarters will see an increase in their combined £1.9 billion budget MI6, MI5 and Government Communications Headquarters (GCHQ) will see an inflation-busting increase in their combined £1.9 billion budget, underlining the Government’s […]
lees meerData includes recordings of telephone calls, contents of emails, details of messages on social media and the history of internet use Britain’s electronic eavesdropping centre, GCHQ, has started collecting data from the network of fibre-optic cables carrying the world’s telephone calls and internet traffic, it was reported tonight. The massive programme of surveillance allows the […]
lees meerAmid leaks from NSA whistleblower Edward Snowden, senior intelligence source reveals worries were voiced in 2008 GCHQ taps can intercept UK and US phone and internet traffic. Photograph: EPA Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of […]
lees meerLeaked documents reveal Russian president was spied on during visit, as questions are raised over use of US base in Britain US spies intercepted communications of the then Russian president, Dmitry Medvedev, during a G20 summit in London. Photograph: Alexander Zemlianichenko/AP American spies based in the UK intercepted the top-secret communications of the then Russian […]
lees meerExclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009 Documents uncovered by the NSA whistleblower, Edward Snowden, reveal surveillance of G20 delegates’ emails and BlackBerrys. Photograph: Guardian Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their […]
lees meerIntelligence services were even said to have set up internet cafés at the summit venues which they used to read emails Britain was plunged into a diplomatic row last night following claims that foreign politicians and diplomats were repeatedly spied upon when they attended two G20 summit meetings in London. The allegations provoked anger in […]
lees meerTop-secret document, prepared by GCHQ, contained proposals to target Commonwealth allies at heads of government summit The Queen and Commonwealth leaders at the heads of government summit in Trinidad. Photograph: Luis Acosta/AFP/Getty Images UK intelligence agencies planned to spy on delegates to the Commonwealth heads of government meeting in 2009, including being asked to obtain […]
lees meerControversial firm saw income from UK taxpayer rise by 20% last year Company earned £394million in 2012-13, up from £328.5million Labour MP Barry Sheerman warns of over-reliance on private contractors Controversial security firm G4S has enjoyed a 20 per cent surge in government contracts despite a string of blunders, new figures show. The company – […]
lees meerMicrosoft founder Bill Gates has given a vote of confidence to embattled British security firm G4S, despite a recent profit warning and ongoing controversy over the company’s Israeli prison contracts and the death of an Angolan man. The US tech titan’s private investment vehicle, Cascade Investment, and his high-profile charitable fund, the Bill & Melinda […]
lees meerThe brother of one of the men charged with the murder of Drummer Lee Rigby in Woolwich has claimed he was “harassed and threatened” by the British security services. Michael Adebolajo’s younger brother, Jeremiah, 26, said he met MI6 intelligence officers numerous times while he was working in Saudia Arabia and was quizzed by MI5 […]
lees meerThe younger brother of one of the men accused of murdering Drummer Lee Rigby was paid thousands of pounds by MI6 as part of spying operations in the Middle East, The Mail on Sunday has discovered. Jeremiah Adebolajo, who uses the name Abul Jaleel, was also asked to help ‘turn’ his brother, Michael, to work […]
lees meerThe brutal murder of an off-duty British soldier in broad daylight in the southeast London district of Woolwich raises new questions about the British government’s national security strategy, at home and abroad. Officials have highlighted the danger of “self-radicalizing” cells inspired by Internet extremism, but this ignores overwhelming evidence that major UK terror plots have […]
lees meerVeteran foreign correspondent Patrick Cockburn of The Independent joins us to discuss the Obama administration’s decision to begin directly arming Syrian rebels after concluding the regime of President Bashar al-Assad has used chemical weapons. “There must be some doubts about this,” Cockburn says, adding that it “reminds me of what they were saying in 2002 […]
lees meerLike characters from The Great Gatsby, Britain and the US have arrogantly turned their backs and left a country in ruins Iraq’s ministry of social affairs estimates 4.5 million children have lost one or both parents. This means 14% of the population are orphans. Photograph: Reuters The dust in Iraq rolls down the long roads […]
lees meerRobert Mueller tells Congress bureau uses drones in a ‘very, very minimal way’ as senators describe ‘burgeoning concern’ The FBI has admitted it sometimes uses aerial surveillance drones over US soil, and suggested further political debate and legislation to govern their domestic use may be necessary. Speaking in a hearing mainly about telephone data collection, […]
lees meerWith the announcement that James B. Comey will be nominated by President Barack Obama to replace Robert W. Mueller III as the director of the FBI, a modern era will soon come to an end. Mueller has served longer (12 years) as FBI director than anyone since J. Edgar Hoover. He is the first person […]
lees meerToday, House Intelligence Committee Chairman Mike Rogers (R-Michigan) insisted [3] the NSA has not been recording Americans’ phone calls under any surveillance program, and that any claim to the contrary was “misinformation.” Rogers’ comments countered remarks from Rep. Jerrold Nadler (D-NY), who said he was told in a House Judiciary Committee briefing [4] by FBI […]
lees meerNSA Director Keith Alexander says his agency’s analysts, which until recently included Edward Snowden among their ranks, take protecting “civil liberties and privacy and the security of this nation to their heart every day.” (Credit: Getty Images) The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization […]
lees meerThe controversy involving Edward Snowden and the National Security Agency (NSA) leaks has drawn attention to the fact that most analysis of the government’s intelligence data is performed by private contractors, not government employees. When it comes to examining and deciphering the enormous volumes of communications collected by the NSA, it’s companies like SAIC, CSC […]
lees meerAs the Justice Department prepares to file charges against Booz Allen Hamilton employee Edward Snowden for leaking classified documents about the National Security Agency, the role of private intelligence firms has entered the national spotlight. Despite being on the job as a contract worker inside the NSA’s Hawaii office for less than three months, Snowden […]
lees meerOne of the big questions raised after Edward Snowden exposed the NSA’s secret surveillance programs is how a private contractor working at Booz Allen Hamilton had access to such sensitive information in the first place. We still don’t know the precise answer, though here’s a bit of broader context: As our Washington Post colleagues report […]
lees meerAs the American Civil Liberties Union sues the Obama administration over its secret NSA phone spying program, we look at how the government could use phone records to determine your friends, medical problems, business transactions and the places you’ve visited. While President Obama insists that nobody is listening to your telephone calls, cybersecurity expert Susan […]
lees meerI have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of […]
lees meerOn March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign- intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the […]
lees meerWASHINGTON (AP) — In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers. Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the […]
lees meerAs NSA director General Keith Alexander blasts the leaks that exposed widespread surveillance of Americans, we’re joined by Chris Pyle, a former military instructor who exposed the CIA and Army’s monitoring of millions of Americans in the 1970s. Pyle discovered the Army and CIA were spying on millions of Americans engaged in lawful political activity […]
lees meerPRISM appears to be a response to overseas data centers and Internet services’ increasing encryption of email. WASHINGTON — Operating under secret court orders, the National Security Agency has access to a large segment of U.S. and global Internet traffic, allowing the giant spy agency to intercept specific information for counter-terrorism and foreign intelligence purposes, […]
lees meer