NORTON META TAG

15 February 2014

NATIONAL SECURITY, NSA SECRETS 9JUN13 THROUGH 14FEB14

THERE has been so much in the media about the nsa and the federal government's domestic spying and surveillance programs. The Washington Post has all their articles collected and available at National Security, NSA Secrets http://www.washingtonpost.com/nsa-secrets/ 
Check it out, and as you get into the articles and see how our civil liberties and human rights have been violated be sure to send a mental thank you to Edward Snowden...

The National Security Agency has been forced to respond to unprecedented disclosures about its surveillance programs. Those programs have been assailed as a violation of privacy rights by critics and defended as critical to U.S. national security by intelligence officials.

Explore more documents

See the documents published by The Post
  • FULL COVERAGE: NSA SECRETS
Review

The man behind the NSA leaks

The man behind the NSA leaks
Luke Harding captures the drama of Edward Snowden’s deeds.

NSA employee implicated in Snowden probe has resigned

NSA employee implicated in Snowden probe has resigned
Agency memo says unidentified individual unwittingly aided leak by providing log-in credentials.

Reforms won’t hamper NSA’s efforts, official says

Reforms won’t hamper NSA’s efforts, official says
Obama administration reforms are not “putting us out of business,” NSA’s deputy director says.

Al-Qaeda expulsion prompts U.S. debate

Al-Qaeda expulsion prompts U.S. debate
The Obama administration is exploring whether a law regarding U.S. attacks still applies to the group.

NSA collects less than 30 percent of phone data

NSA collects less than 30 percent of phone data
The amount of phone records gathered has plummeted as cellphone use has increased.

NSA nominee likely to face tough questions on surveillance

NSA nominee likely to face tough questions on surveillance
Vice Adm. Michael S. Rogers would take on the challenge of mending the NSA’s image.

Head of intelligence calls on Snowden to return documents

Head of intelligence calls on Snowden to return documents
James Clapper offers blistering remarks at an annual hearing on the most significant U.S. security threats.

U.S. relaxes gag order on data requests to companies

Firms will be permitted for first time to publicize how often they must furnish customer information to government.

Democrat proves an obstacle to Obama’s spy-agency plans

Sen. Dianne Feinstein has opposed the president’s efforts to revamp U.S. drone and data-collection programs.

Snowden denies stealing passwords to access secret files

Snowden denies stealing passwords to access secret files
In online question-and-answer session, he says U.S. law precludes him from returning home.

Reforming phone record collection faces challenges

Reforming phone record collection faces challenges
Technical, logistical and political problems confront Obama’s goal of revising the controversial program.

Obama’s NSA restrictions rely on thin definition of ‘spying’

Obama’s NSA restrictions rely on thin definition of ‘spying’
President does not include ingestion of tens of trillions of records about phone calls, e-mails and locations.

‘We must maintain the trust of the American people’

‘We must maintain the trust of the American people’
President ends eavesdropping on friendly foreign governments, changes system of data collection.

Obama to deliver much-anticipated speech on NSA surveillance

President is expected to announce some new limits on the National Security Agency.

Man convicted in terror case seeks evidence from warrantless spying

Man convicted in terror case seeks evidence from warrantless spying
Oregon man guilty of Christmas tree bombing plot opens door for possible constitutional challenge to NSA program.

Tech firms: We don’t want to keep Internet metadata for the government

Tech firms: We don’t want to keep Internet metadata for the government
The tech firms are urging the White House and Congress to ban the bulk collection of Internet communications.

A hard-edged defender of spy agencies

A hard-edged defender of spy agencies
Attorney Robert S. Litt has led an unusually high-profile response to the Snowden leaks.

Obama, lawmakers discuss ending NSA phone program

Obama, lawmakers discuss ending NSA phone program
Review finds that the program “was not essential” to preventing terrorist attacks.

NSA exploring alternatives to holding phone-log database

NSA exploring alternatives to holding phone-log database
The agency is exploring how to relinquish control of the records while still being able to exploit them.

NSA seeks quantum computer that could crack most codes

Documents provided by Snowden show race for a machine light-years ahead of those using zeroes and ones.

Who, if anyone, should store phone data for the NSA?

Who, if anyone, should store phone data for the NSA?
Alternatives to NSA storing massing amounts of records are facing resistance on multiple fronts.

Snowden, in interview, says his mission’s accomplished

Snowden, in interview, says his mission’s accomplished
His leaks have fundamentally altered the U.S. government’s relationship with its citizens, the rest of the world.

U.S. reasserts need to keep domestic surveillance secret

U.S. reasserts need to keep domestic surveillance secret
Government defends NSA’s program to intercept phone and e-mail communications without a warrant.

Uneasy about surveillance, but also comforted by it

Uneasy about surveillance, but also comforted by it
POST POLL | While government and business data tracking is a concern, many Americans use snooping tools.

Obama promises review of NSA spying, possible reforms

Obama promises review of NSA spying, possible reforms
In year-end press conference, president also faces questions on continuing gridlock in Washington.

NSA, British spy agency targeted many foreign interests

The office of an Israeli prime minister, an E.U. official and the heads of aid groups were targets, documents say.

Officials’ defenses of NSA program may be unraveling

Officials’ defenses of NSA program may be unraveling
A court ruling and an expert panel cast doubt on phone effort’s legality and value in deterring terrorism.

Panel urges new curbs on surveillance by U.S.

Panel urges new curbs on surveillance by U.S.
Among the recommendations are an end to NSA collection and storage of Americans’ phone records.

Tech executives to Obama: Curb NSA spying programs

Tech executives to Obama: Curb NSA spying programs
In a meeting at the White House, they warned that a consumer backlash could harm the broader economy.

Judge: NSA phone data collecting likely unconstitutional

Court grants request for a preliminary injunction on controversial program, but stays the action pending appeal.

NSA has cracked popular cellphone code

NSA has cracked popular cellphone code
The agency’s cracking of A5/1 gives it the means to decode potentially billions of calls and texts.

U.S. to maintain unified NSA, Cyber Command leadership

U.S. to maintain unified NSA, Cyber Command leadership
Critics say agencies needed separate heads to avoid undue concentration of power in single individual.

At Senate hearing, NSA director defends spying program

“We can’t go back to a pre-9/11 moment,” Gen. Keith Alexander tells the Judiciary Committee.

NSA uses Google cookies to pinpoint users to hack

NSA uses Google cookies to pinpoint users to hack
How the NSA piggybacks onto the tracking behaviors of commercial companies to enable exploitation and surveillance.

Tech companies unite to call for new limits on surveillance

Tech companies unite to call for new limits on surveillance
The firms, including Microsoft, Google and Facebook, say there is an “urgent need” for reform.

Agencies collected data on cellphone use in ‘tower dumps’

Agencies collected data on cellphone use in ‘tower dumps’
Law enforcement made more than 9,000 requests last year, a congressional inquiry has revealed.

NSA morale low after Snowden revelations, ex-officials say

NSA morale low after Snowden revelations, ex-officials say
They add that they are surprised President Obama has not visited the agency to show his support.

Microsoft to encrypt data in its services

Microsoft to encrypt data in its services
The tech giant moves to reassure customers it will protect them against government surveillance.

NSA tracking cellphone locations worldwide

NSA tracking cellphone locations worldwide
Snowden documents show agency is collecting billions of records on whereabouts of mobile devices.

Key officials urge NSA, Cyber Command leadership be split

National security adviser is expected to make a formal recommendation to President Obama soon.

Microsoft to ramp up encryption to guard against NSA

Microsoft to ramp up encryption to guard against NSA
The company is moving toward a new effort to protect its Internet traffic amid suspicions of government spying.

Did the NSA target Microsoft too?

Did the NSA target Microsoft too?
This e-mail suggests Microsoft may have been compromised by the same program used to access Google and Yahoo data.

Evidence of Microsoft’s vulnerability

Evidence of Microsoft’s vulnerability
These slides suggest NSA programs targeting Google and Yahoo also had Microsoft in their sights.

Director of national intelligence releasing documents

Director of national intelligence releasing documents
One appears to be the original court document authorizing the NSA to conduct communications sweeps.

FBI director sees cyberattacks emerging as a top threat

FBI director sees cyberattacks emerging as a top threat
James Comey testifies that the risk of a major terrorist attack has fallen but “is more dispersed geographically.”

U.S. mulls end to dual leadership at NSA, Cyber Command

Some officials argue a shift would help avoid an undue concentration of power in one individual.

Panel: U.S. spy agencies hampered by poor collaboration

Panel: U.S. spy agencies hampered by poor collaboration
Report says intelligence community has also struggled with developing defenses against emerging threats.

How we know the NSA had access to internal Google and Yahoo cloud data

How we know the NSA had access to internal Google and Yahoo cloud data
New documents reveal exactly how the Post was able to determine that the NSA was peeking inside the Google and Yahoo’s cloud network.

Privacy advocates oppose proposed surveillance measure

Concerns are expressed that Senate bill would validate NSA’s harvesting of telephone, e-mail records.

Senate bill would approve NSA program but try to curb it

Senate bill would approve NSA program but try to curb it
Measure passed by Intelligence Committee limits use of phone data but endorses its collection.

U.S. tries to deal with ‘blowback’

U.S. tries to deal with ‘blowback’
Disclosure of surveillance program on allies results in both diplomatic and intelligence service predicaments.

Tech companies urge lawmakers to reform NSA programs

Tech companies urge lawmakers to reform NSA programs
Letter from firms, including Google and Apple, calls for changes that would enhance privacy protections.

NSA infiltrates links to Yahoo, Google data centers

NSA infiltrates links to Yahoo, Google data centers
Agency positioned itself to collect from among millions of accounts, many belonging to Americans.
Graphic

How the NSA is infiltrating private networks

How the NSA is infiltrating private networks
The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data traffic. The operation intercepts information flowing between the enormous data centers that those companies maintain around the world. In general, Google and Yahoo use privately owned or leased lines to synchronize their data centers. This graphic shows how the NSA and GCHQ break into those internal networks, using Google’s as an example. Less is known about Yahoo’s networks, but the NSA operations are thought to be similar.

NSA chief: NATO allies shared phone records with agency

NSA chief: NATO allies shared phone records with agency
Keith Alexander says reports that NSA collected records of European citizens is “completely false.”

Dueling NSA bills set up a choice in Congress

Dueling NSA bills set up a choice in Congress
End the agency’s bulk collection of phone records or endorse it?

Officials alert foreign services about Snowden documents

Officials alert foreign services about Snowden documents
Documents contain material about operations that involve countries not publicly allied with the United States.

German leader calls Obama on alleged cellphone tapping

German leader calls Obama on alleged cellphone tapping
The allegations rocked Germany’s government and created a new diplomatic challenge for Obama.

Documents reveal NSA’s role in drone program

Documents reveal NSA’s role in drone program
EXCLUSIVE | The drone campaign in Pakistan — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to collect enormous quantities of e-mail, phone calls and other fragments of intelligence.

NSA collects millions of e-mail address books globally

The contact information is intercepted as it moves across global data links. Many lists belong to Americans.

Push underway to declassify FISC document

Push underway to declassify FISC document
Document provided legal foundation for NSA’s collection of all Americans’ phone records.

Try as it might, anti-surveillance group can’t avoid D.C.

Try as it might, anti-surveillance group can’t avoid D.C.
Electronic Frontier Foundation doesn’t want to play political games, but how can it not?

After leaks, NSA struggles for trust

After leaks, NSA struggles for trust
Agency is trying to regain industry’s faith in order to work cooperatively against cyber-threats.

Dual-leadership role at NSA, Cyber Command stirs debate

Dual-leadership role at NSA, Cyber Command stirs debate
Gen. Keith Alexander is building up forces to fend off cyberattacks; some question the centralizing of power.

NSA report on Tor network

NSA report on Tor network
This 2006 research paper lays out the technical features of Tor and proposes a number of attacks.

NSA files show campaign against Tor encrypted network

NSA files show campaign against Tor encrypted network
Agency has worked for years to unmask users on one the world’s most popular encryption networks.

NSA ran test program on Americans’ cellphone locations

NSA ran test program on Americans’ cellphone locations
Director says two-year effort was discontinued and that data were not used for intelligence analysis.

NSA said to study some Americans’ social connections

NSA said to study some Americans’ social connections
Seeking foreign intelligence, the agency has used e-mail and phone call data to build extensive graphs.

U.S. officials dodge questions on scope of surveillance

U.S. officials dodge questions on scope of surveillance
At Senate hearing, Feinstein adds that surveillance reforms could boost trust and transparency.

NSA chief defends collecting Americans’ phone records

NSA chief defends collecting Americans’ phone records
Gen. Keith Alexander says database can help “connect the dots” between domestic and foreign threats.

Senator calls for end to NSA bulk phone records collection

Senator calls for end to NSA bulk phone records collection
Congress to consider NSA surveillance reforms.

Declassified court documents highlight NSA violations

Declassified court documents highlight NSA violations
The agency searched a massive database of phone-call records in violation of privacy rules.

Obama administration had restrictions on NSA reversed

Obama administration had restrictions on NSA reversed
Move allowed agency to search for Americans’ communications.

Google races to encrypt data amid backlash over NSA spying

Google races to encrypt data amid backlash over NSA spying
EXCLUSIVE | The Web giant accelerates a program to make it harder for outsiders to intercept its user information.

NSA has led effort to crack Internet encryption technology

NSA has led effort to crack Internet encryption technology
Agency has worked with its British counterpart to break codes that protect data sent across Web.

Al-Qaeda seeks ways to fight U.S. drones, documents say

Al-Qaeda seeks ways to fight U.S. drones, documents say
Cells of engineers try to find ways to exploit technological vulnerabilities of the deadly weapons system.

Secret intelligence files show growing distrust of Pakistan

Secret intelligence files show growing distrust of Pakistan
Stark assessments of the purported ally contained in the documents belie U.S. officials’ public statements.

Millions spent to hunt for insider threats

Millions spent to hunt for insider threats
The U.S. suspects that people with ties to al-Qaeda or other groups have tried to get jobs, a document shows.

Bounds of government secrecy shifting in wake of leaks

Bounds of government secrecy shifting in wake of leaks
The U.S. will release an annual report about its surveillance orders, in addition to other recent disclosures.

U.S. intelligence-gathering giant revealed by ‘black budget’

U.S. intelligence-gathering giant revealed by ‘black budget’
Despite huge funding, agencies are unable to provide critical data on a range of national security threats.

NSA pays firms for access to networks

NSA pays firms for access to networks
Documents offer a look at program expected to cost $278 million in the current fiscal year.

To hunt bin Laden, satellites watched over Abbottabad

To hunt bin Laden, satellites watched over Abbottabad
Satellites aimed dozens of receivers over Pakistan to collect intelligence as the mission unfolded.

NSA gathered tens of thousands of e-mails between Americans

A new document reveals the extent of the collection before the FISA court forced the agency to revise its tactics.

New demands for reform of NSA spy programs

New demands for reform of NSA spy programs
Some lawmakers called for greater transparency in the surveillance operations of the National Security Agency.

NSA broke privacy rules thousands of times per year, audit finds

NSA broke privacy rules thousands of times per year, audit finds
Agency also has overstepped legal authority since Congress gave it broad new power in 2008.

Newly declassified documents on phone records program released

Newly declassified documents on phone records program released
Obama administration faces growing political skepticism about the counterterrorism program.

Panama releases ex-CIA operative

Robert Seldon Lady was freed two days after he was detained by Panama authorities, officials said.

Ex-CIA operative convicted in kidnapping is detained

Case in 2005 drew attention to agency practice known as “extraordinary rendition.”

For NSA chief, terrorist threat drives a passion to ‘collect it all’

For NSA chief, terrorist threat drives a passion to ‘collect it all’
Aggressive methods fuel debate over divide between privacy, security.

Officials: NSA’s Snowden review focuses on China espionage files

Officials: NSA’s Snowden review focuses on China espionage files
Intelligence officials fear leaker Edward Snowden has information on spying on China, other critical targets.

Suspicion of U.S. international manhunt follows Snowden case

Suspicion of U.S. international manhunt follows Snowden case
The grounding of the Bolivian president’s plane feeds talk that U.S. officials are calling the shots.

U.S. seeks to calm Europe over surveillance

As leaders of France and Germany react to reports of NSA monitoring, Obama defends agency’s methods.

Misinformation on NSA programs includes statements by officials

Misinformation on NSA programs includes statements by officials
Inadvertent missteps, legal parsing blamed for errors and false assertions about classified programs.

Surveillance-court judges upset at portrayal of collaboration with U.S.

Surveillance-court judges upset at portrayal of collaboration with U.S.
Judges at the Foreign Intelligence Surveillance Court feel report distorts their role in data-collection approvals.

NSA worked closely with private sector after Sept. 11, 2001, attacks

NSA worked closely with private sector after Sept. 11, 2001, attacks
Surveillance program under president’s authority collected content, metadata from Americans.

NSA head acknowledges flaws with fact sheet on surveillance programs

The agency removed the four-page document after concerns about its accuracy were raised by lawmakers.

U.S. worried about security of files Snowden is thought to have

U.S. worried about security of files Snowden is thought to have
The ability of the contractor-turned-fugitive to evade arrest is raising the new concerns.

Leahy proposes new oversight of surveillance programs

Leahy proposes new oversight of surveillance programs
The bill seeks to raise the legal bar the government must meet before obtaining call detail records.

Officials: Surveillance programs foiled more than 50 terrorist plots

Officials: Surveillance programs foiled more than 50 terrorist plots
The NSA’s head and others defended the effectiveness and oversight of leaked surveillance programs.

Snowden defends his NSA leaks in live chat on Guardian Web site

Snowden defends his NSA leaks in live chat on Guardian Web site
He claims he exposed only hacking of civilian targets, not “legitimate military targets.”

The keystones of U.S. surveillance

Two of the NSA’s four main collection programs target revealing metadata from Web, phone communications.

U.S. fears NSA leaker has more classified files

U.S. fears NSA leaker has more classified files
Administration officials defend surveillance programs amid calls for additional transparency.

NSA director says dozens of attacks stopped by surveillance programs

NSA director says dozens of attacks stopped by surveillance programs
In an interview with a Hong Kong paper, Edward Snowden asserts the U.S. has mounted hacking operations against hundreds of Chinese targets since 2009.

NSA director says surveillance thwarted ‘dozens’ of attacks

NSA director says surveillance thwarted ‘dozens’ of attacks
Gen. Keith Alexander says agency will make public records showing success of secret programs

Tech companies urge U.S. to be open on national security probes

Tech companies urge U.S. to be open on national security probes
Google, Facebook, Microsoft and others want U.S. officials to ease secrecy rules on data collection.

The low-level, tech-savvy leaker. Anomaly or growing problem?

The low-level, tech-savvy leaker. Anomaly or growing problem?
The Edward Snowden and Bradley Manning cases represent back-to-back blows for U.S. intelligence.

U.S. disrupts al-Qaeda’s online magazine

The debate tips toward taking action when U.S. officials believe Inspire promotes an imminent threat.

Investigators looking at how contractor gained access at NSA

Investigators looking at how contractor gained access at NSA
Edward Snowden leaked documents on distinctly different operations.

Who is Edward Snowden?

Who is Edward Snowden?
The NSA contractor “wanted to expose the “surveillance state.”

Snowden, in exchanges with Post reporter, made clear he knew risks

Snowden, in exchanges with Post reporter, made clear he knew risks
The leaker, at times eloquent and at times jittery, took the code name “Verax,” or “truth teller” in Latin.

From obscurity to notoriety, Snowden took an unusual path

From obscurity to notoriety, Snowden took an unusual path
Daniel Ellsberg praises NSA leaker while others condemn him for revealing surveillance programs.

Man who leaked NSA secrets reveals himself

Man who leaked NSA secrets reveals himself
Edward Snowden, a 29-year-old Booz Allen Hamilton employee, says he’s done nothing wrong in revealing government surveillance programs.
http://www.washingtonpost.com/nsa-secrets/

No comments:

Post a Comment