It is not just personal information that is being swept into the National Security Agency’s (NSA) massive databases. It is corporate data as well It is not just personal information that is being swept into the National Security Agency’s (NSA) massive databases. It is corporate data as well. And that could cause some serious international […]
lees meerMenu
Categorieën
- advocaat
- Afghanistan
- afluisteren
- Africa
- Agência Brasileira de Inteligência (Abin)
- Airbus
- AIVD, Alg. Inlichtingen- en Veiligheidsdienst
- Algeria
- Altegrity Inc.
- Amesys
- Amsterdam
- anarchism
- Angola
- ANPR, Automatic Number Plate Recognition
- Anthrax
- Apalachee
- apartheid
- arab spring
- Argentina
- arms trade / wapenhandel
- ASIO, Australian Security Intelligence Org.
- Australia
- Austria / Oostenrijk
- automatisering
- Azerbaijan
- B.amt für Verf.schutz Terror.bekämpf. (BVT)
- BAE Systems
- Bahamas
- Bahrain
- Barrett Brown
- Belarus
- België
- bestuurlijke dwang
- BIBOB, bev. integrit.beoordel. openb. best.
- BKA, Bundeskriminalamt
- Black Lives Matter
- Black Panthers
- Blackwater
- BND, Bundesnachrichtendienst
- Bob Lambert / Bob Robinson
- Booz Allen Hamilton
- border control
- Boundless Informant
- Brazil
- Bulgaria
- Bundesamt für Verfassungsschutz (BfV)
- Caci International Inc.
- Cambodia
- cameratoezicht
- Canada
- Capitalism
- Carnivore, DCS-1000
- CBP, Col. bescherming persoonsgegevens
- CCTV, Closed-circuit TV, cameratoezicht
- Cellebrite
- Centro Nacional de Inteligencia (CNI)
- Chad
- Chelsea Manning
- Chemical weapons
- Chile
- China
- CIA, Central Intelligence Agency
- CIE, Criminele Inlichtingen Eenheid
- Climate talks
- CNI
- Cointelpro
- Cold War / Koude Oorlog
- Colombia
- Com. Security Establish. Canada, CSEC
- Computer Sciences Corporation, CSC
- Congo
- corporations/bedrijven
- corruption
- CSIS, Canadian Security Intelligence Ser.
- CTIVD, Com. Toez. Inlicht.- Veiligh.dienst
- Cuba
- cyber security
- cyber war
- dactyloscopy / fingerprint identification
- DAS
- Dassault Systèmes
- data exchange
- Data Intercept Technology Unit, DITU
- DCRI, Dir. cent. du Renseignement int.
- DEA, Drug Enforcement Administration
- Defence Signals Directorate, DSD
- Democratic Republic of the Congo
- Denmark
- deportation
- deskundigen
- DGSE
- DIA, Defense Intelligence Agency
- Diego Garcia
- dierenrechten / animal rights
- Djibouti
- DNA
- Döner-Morde
- drones
- Duitsland
- dwangarbeid
- Dyncorp
- Echelon
- economische spionage
- Egypt
- El Salvador
- Elbit Systems
- encryption
- Ercom-Suneris
- ethnic profiling
- EU, European Union
- European External Action Service
- Europol
- Extinction Rebellion
- extreemrechts
- Falklands
- FBI, Federal Bureau of Investigation
- FISA
- Foreign Security Administration (Tunisia)
- Fox-IT
- France
- fraude
- Freedom of Information Act
- Freezing of assets
- Frontex
- FSB, Federal Security Service (Russia)
- G4S, Group4securicor
- G7 G8 G20
- GCHQ, Gov. Com. Headquarters (UK)
- GCSB, Gov. Com. Security Bur. (N. Zealand)
- Genie
- genocide
- Gladio
- Greece
- grondrechten
- Groupe Bull
- Guantanamo Bay
- Guatemala
- Hauptstelle für Befragungswesen HBW
- Heeres-Abwehramt (HAA oder HabwA)
- Heeresnachrichtenamt (HNaA oder HNA)
- Hezbollah
- Hollywood
- Homeland Security
- Iceland
- In-Q-Tel
- IND
- India
- Indonesia
- industrial/economic espionage
- industry
- informanten/infiltranten
- Inlichting/Veiligheid/dienst (WIV)
- inlichtingen(operatie(s))
- internet surveillance
- interrogation/verhoor
- IRA, Irish Republican Army
- Iran
- Iran – Contra Affair
- Iraq
- Ireland
- ISI, Inter-Services Intelligence (Pakistan)
- Islamic State (IS)
- ISNU – the Israeli Sigint National Unit
- Israël
- Israel Aerospace Industries (IAI)
- ISS World Telestrategies Fair
- Italy
- Japan
- Jeremy Hammond
- Jordan
- journalisten
- JTRIG
- Kenya
- KGB see FSB
- KLPD, Korps Landelijke Politie Diensten
- KMar, Koninklijke Marechaussee
- Kurds
- L-3 Communications
- Laos
- Leak(s)
- Lebanon
- Libya
- lobbying
- Lockheed Martin
- Lustre
- Luxemburg
- MacAulay-Brown
- Maldives
- Mali
- Mark Kennedy
- Mauritania
- mercenaries/huurlingen
- Metropolitan Police / Scotland Yard
- Mexico
- MI5, The Security Service (Mili. Int. Sect. 5)
- MI6, Secret Int. Service (Mili. Int. Sect. 6)
- Micro Systemation AB
- migration
- Militärischer Abschirmdienst (MAD)
- military in general
- Military Intelligence
- Military Reaction Force
- Millî Istihbarat Teşkilâti (MIT) Turkey
- Ministerie van Defensie MoD
- Ministry of State Security (MSS)
- MIVD, Militaire Inlicht.- en Veiligheidsdienst
- Morocco
- Mossad
- multi nationals
- Mystic
- National Intelligence Service (South Korea)
- National Security Administration (Tunisia)
- NATO, North Atlantic Treaty Organization
- Nazis
- NCTV (Nat. Coord. Terror. en Veiligheid)
- NDB, Nachrichtendienst des Bundes
- Nederland
- Nestlé
- New Zealand
- Nexa Technologies
- NORTHROP GRUMMAN
- NR, Nationale Recherche
- NSA, National Security Agency
- nuclear power
- NYPD
- Openbaarheid van Bestuur (Wob)
- opsporing
- Org. Petro. Export. Coun.
- Pakistan
- Palestine
- Panama
- Panama Papers
- particuliere beveiliging
- Pentagon
- PET
- Philippines
- Poland
- police cooperation
- Police judiciare
- politie
- politieke partijen
- preventief fouilleren
- Prism
- prisons gevangenissen
- Private Security Companies (PSC)
- privatisation
- Project Paperclip
- protesters
- Providence Equity Partners LLC
- provocateur
- proxy war
- Prüm
- Qatar
- Raytheon
- RCMP, Royal Canadian Mounted Police
- refugees vluchtelingen
- Regionale inlichtingendienst RID
- Renault
- rendition
- RUC
- Ruffle
- Russia
- Rwanda
- Rwanda's foreign intel. serv.
- SAIC
- sanctions
- Säpo Säkerhetspolisen
- Sardine
- Saudi Arabia
- schendingen van grondrechten
- Schengen
- scientists
- SDS Special Demonstration Squad
- Securitas AG
- sexual harassment
- Silverzephyr
- Singapore
- Skype
- social media surveillance
- Somalget
- Somalia
- SOS International SOSi
- South Africa
- South Korea
- Spain
- Special Branch
- Special Collection Service SCS
- Spyware
- SREL
- Sri Lanka
- Staatsveiligheid
- Stasi
- Stateroom
- Stephen Lawrence
- stop and search operation
- Stratfor
- students
- Sudan
- Suojelupoliisi (Supo)
- surveillance
- Sweden
- Switzerland
- Syria
- Taiwan
- taser gun
- Technical Services Division (TSD)
- telecom providers
- telefoontap/eavesdropping
- Tempora
- Terrorism
- terrorist lists UN EU US
- Thailand
- Thales
- The Asia Foundation
- The Kissinger Cables
- the Media
- toezicht geheime diensten CTIVD
- torture
- trade union / vakbond
- Tulsa Massacre
- Tunisia
- Turkey
- UDA
- Ukraine
- United Arab Emirates (UAE)
- United Kingdom UK
- United Nations (UN)
- United States of America USA
- United States SIGINT System USSS
- UNSCOM
- USIS
- Uzbekistan
- Vastech
- Venezuela
- Verint
- Vietnam
- voetbal
- war on drugs
- war on migration
- war on terror
- whistleblower
- Wikileaks
- WMD
- XKeyscore
- Yemen
- Zimbabwe
- Zweden
- Zwitserland
Foreign ministry spokesman shrugs off ‘groundless accusations’ by Australian media that Chinese hackers stole Asio blueprints China has shrugged off allegations by Australian media that Chinese hackers have stolen the blueprints for the new Australian spy headquarters. “China pays high attention to cybersecurity issues, and is firmly apposed to all forms of hacker attacks,” foreign […]
lees meerABC Television says secret data stolen in major cyber attack on foreign affairs office housing overseas spy agency. Carr says Australia’s relationship with China will not be damaged by the hacking allegations [Getty Images] Chinese hackers have reportedly stolen plans for a new $600m Australian spy headquarters as part of a growing wave of cyber […]
lees meerWhile debate rages over Australia’s border security, there’s growing evidence that the greatest threat to Australia’s national security potentially comes from foreign computer hackers. Few in government or business will admit the full extent of the break-ins, with one expert calling it a “dirty little secret”. Next on Four Corners reporter Andrew Fowler reveals that […]
lees meerInside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, […]
lees meerExclusive: Top-secret directive steps up offensive cyber capabilities to ‘advance US objectives around the world’ Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued […]
lees meerDesigns for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry. Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat […]
lees meerThis weekend, U.S. President Barack Obama sat down for a series of meetings with China’s newly appointed leader, Xi Jinping. We know that the two leaders spoke at length about the topic du jour — cyber-espionage — a subject that has long frustrated officials in Washington and is now front and center with the revelations […]
lees meer(Reuters) – China’s top Internet security official says he has “mountains of data” pointing to extensive U.S. hacking aimed at China, but it would be irresponsible to blame Washington for such attacks, and called for greater cooperation to fight hacking. Cyber security is a major concern for the U.S. government and is expected to be […]
lees meerHong Kong (CNN) — U.S. intelligence agents have been hacking computer networks around the world for years, apparently targeting fat data pipes that push immense amounts of data around the Internet, NSA leaker Edward Snowden told the South China Morning Post on Wednesday. Among some 61,000 reported targets of the National Security Agency, Snowden said, […]
lees meerObama administration says NSA data helped make arrests in two important cases – but critics say that simply isn’t true A new NSA data farm is set to open in the fall in Bluffdale, Utah. A former CIA agent said: ‘[Data-mining] played no role in the Headley case.’ Photograph: George Frey/Getty Images Lawyers and intelligence […]
lees meerListen to defenders of the U.S. government’s recently revealed data collection practices, and you’re likely to hear claims about terrorist plots these sweeping activities have purportedly stopped. Senate Intelligence Committee Chairwoman Dianne Feinstein, D-Calif., explained on ABC’s “This Week” Sunday that in one of the signature uses of the dragnet collection of every American’s phone […]
lees meerDefenders of “PRISM” say it stopped subway bombings. But British and American court documents suggest old-fashioned police work nabbed Zazi. Would-be subway bomber Najibullah Zazi. Image by Marc Piscotty / Getty Images Defenders of the American government’s online spying program known as “PRISM” claimed Friday that the suddenly controversial secret effort had saved New York […]
lees meerEuropean authorities have known since mid-2011 that the US could conduct surveillance on EU citizens. But experts say that European countries had little interest in picking a fight with their ally in Washington. There has been widespread outrage in Europe over the scope of the National Security Agency’s PRISM surveillance program. European experts, however, are […]
lees meerThe recent confirmation that NSA is performing data mining on the telephone records of Americans raises an important question for Canadians, is CSE likewise mining the call records of people in Canada? The short answer is I don’t know. But there are some telling indications that CSE is interested in undertaking such monitoring and that […]
lees meerDisclosure triggers civil liberties storm as the information-sharing agreement had not been made known to Parliament or the public as accusations raise ethical and legal concerns over direct access to ‘millions’ of web users A report by GCHQ to Parliament’s Intelligence and Security Committee on the listening agency’s links to a secret US spy programme […]
lees meerExclusive: UK security agency GCHQ gaining information from world’s biggest internet firms through US-run Prism programme Documents show GCHQ (above) has had access to the NSA’s Prism programme since at least June 2010. Photograph: David Goddard/Getty Images The UK’s electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world’s biggest internet […]
lees meerData on U.S. customers, secretly collected from phone companies, has been shared with British security agencies, writes Eli Lake. Plus, everything you need to know about the NSA Spying Program. At least one foreign government has gained access to sensitive data collected by the National Security Agency from U.S. telecommunications companies in dragnet court warrants […]
lees meerAmerican telecoms giant Verizon has been handing information about British companies to the US government, putting it on a collision course with UK regulators. On Verizon’s UK website, the company makes a point of telling customers it will help to defend them against spying by government agencies Photo: AP The company has found itself at […]
lees meerSophisticated telecommunication interception capabilities, of the sort that was used to unravel the cricket corruption scandal, are pushing the frontiers of communications intelligence. IN the age of digital communication, criminals are often better equipped but the line is also increasingly becoming unsafe. So, it appears, is running a large corporation, managing state secrets or just […]
lees meerNo one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies. The most extensive claims yet came this spring in a report written for the European Parliament. The report […]
lees meerGovernment Tapping CONTENT, Not Just Metadata … Using Bogus “Secret Interpretation” of Patriot Act We reported in 2008 that foreign companies have had key roles scooping up Americans’ communications for the NSA: At least two foreign companies play key roles in processing the information. Specifically, an Israeli company called Narus processes all of the information […]
lees meerAT&T’s central office on Folsom Street in San Francisco houses a secret room that allows the National Security Agency to monitor phone and internet traffic, according to former AT&T technician-cum-whistle-blower Mark Klein. View Slideshow AT&T provided National Security Agency eavesdroppers with full access to its customers’ phone calls, and shunted its customers’ internet traffic to […]
lees meerIsraeli high-tech firms Verint and Narus have had connections with U.S. companies and Israeli intelligence in the past, and ties between the countries’ intelligence agencies remain strong. Were Israeli companies Verint and Narus the ones that collected information from the U.S. communications network for the National Security Agency? The question arises amid controversy over revelations […]
lees meerWASHINGTON—The National Security Agency’s monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency’s activities. Jerry Seib explains how the far-reaching data collection conducted by the U.S. government includes phone companies in […]
lees meerThe Carlyle Group has spent years attempting to shed its image as a well-connected private equity firm leveraging Washington heavyweights in the defense sector. Instead, it nurtured a reputation as a financially sophisticated asset manager that buys and sells everything from railroads to oil refineries. The recent disclosures involving National Security Agency surveillance on U.S. […]
lees meerWASHINGTON: The explosive leak uncovering America’s vast surveillance program highlights the risks Washington takes by entrusting so much of its defense and spy work to private firms, experts said on Monday. From analyzing intelligence to training new spies, jobs that were once performed by government employees are now carried out by paid contractors, in a […]
lees meerThe top-secret Boundless Informant tool details and maps by country the voluminous amount of information it collects from computer and telephone networks guardian.co.uk, Saturday 8 June 2013 20.11 BST Find this story at 8 June 2013
lees meerRevealed: The NSA’s powerful tool for cataloguing global surveillance data – including figures on US collection The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the ‘2007’ date in the image relates to the document from which the interactive map derives its top secret classification, […]
lees meerAnalysts at the National Security Agency can now secretly access real-time user data provided by as many as 50 American companies, ranging from credit rating agencies to internet service providers, two government officials familiar with the arrangements said. Several of the companies have provided records continuously since 2006, while others have given the agency sporadic […]
lees meerA slide depicting the top-secret PRISM program. The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material […]
lees meer(Reuters) – The leak of a document showing the Obama administration asked for millions of phone records has turned a spotlight anew on a secretive U.S. federal court set up 35 years ago to curb intelligence abuses. Made up of 11 judges who serve staggered seven-year terms, it is called the U.S. Foreign Intelligence Surveillance […]
lees meerOn Sept. 11, 2007, the National Security Agency signed up Microsoft as its first partner for PRISM, a massive domestic surveillance program whose existence was reported by the Washington Post today. That’s barely a month after Congress passed, and President George W. Bush signed, the Protect America Act. The Bush Administration portrayed the PAA as […]
lees meerThe National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY. The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary […]
lees meerToday, the Guardian newspaper confirmed what EFF (and many others) have long claimed: the NSA is conducting widespread, untargeted, domestic surveillance on millions of Americans. This revelation should end, once and for all, the government’s long-discredited secrecy claims about its dragnet domestic surveillance programs. It should spur Congress and the American people to make the […]
lees meerThe top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work. These […]
lees meerWASHINGTON — The massive National Security Agency collection of telephone records disclosed Wednesday was part of a continuing program that has been in effect nonstop since 2006, according to the two top leaders of the Senate Intelligence Committee. “As far as I know, this is the exact three-month renewal of what has been in place […]
lees meerThe US government is collecting the phone records of millions of US customers of Verizon under a top secret court order. Read the Foreign Intelligence Surveillance Court order Find this story at 6 June 2013 guardian.co.uk, Thursday 6 June 2013 00.04 BST
lees meerExclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama Under the terms of the order, the numbers of both parties on a call are handed over, as is location data and the time and duration of all calls. Photograph: Matt Rourke/AP The National Security […]
lees meerStaatsminister Eckhard von Klaeden bestätigt Auflösung deutscher Gladio-Einheiten im September 1991 Nun ist auch die Bundesregierung auf den Plan gerufen: Die Vorwürfe des Duisburger Historikers Andreas Kramer, wonach der Bundesnachrichtendienst (BND) an Anschlägen auf Strommasten in Luxemburg beteiligt war (Stay Behind – Agenten sterben einsam ), werden derzeit auf Veranlassung der Bundesregierung überprüft. Das geht […]
lees meer