THERE has been so much in the media about the nsa and the federal government's domestic spying and surveillance programs. The Washington Post has all their articles collected and available at National Security, NSA Secrets http://www.washingtonpost.com/nsa-secrets/
Check it out, and as you get into the articles and see how our civil liberties and human rights have been violated be sure to send a mental thank you to Edward Snowden...
The National Security Agency has been forced to respond to
unprecedented disclosures about its surveillance programs. Those
programs have been assailed as a violation of privacy rights by critics
and defended as critical to U.S. national security by intelligence
officials.
See the documents published by The Post
FULL COVERAGE: NSA SECRETS
Review
Greg Miller FEB 14
Luke Harding captures the drama of Edward Snowden’s deeds.
Ellen Nakashima FEB 13
Agency memo says unidentified individual unwittingly aided leak by providing log-in credentials.
Ellen Nakashima FEB 12
Obama administration reforms are not “putting us out of business,” NSA’s deputy director says.
Karen DeYoung and Greg Miller FEB 10
The Obama administration is exploring whether a law regarding U.S. attacks still applies to the group.
Ellen Nakashima FEB 7
The amount of phone records gathered has plummeted as cellphone use has increased.
Ellen Nakashima FEB 3
Vice Adm. Michael S. Rogers would take on the challenge of mending the NSA’s image.
Greg Miller JAN 29
James Clapper offers blistering remarks at an annual hearing on the most significant U.S. security threats.
Craig Timberg and Adam Goldman JAN 27
Firms will be permitted for first time to publicize how often they must furnish customer information to government.
Greg Miller JAN 25
Sen. Dianne Feinstein has opposed the president’s efforts to revamp U.S. drone and data-collection programs.
Greg Miller JAN 23
In online question-and-answer session, he says U.S. law precludes him from returning home.
Ellen Nakashima and Greg Miller JAN 18
Technical, logistical and political problems confront Obama’s goal of revising the controversial program.
Barton Gellman JAN 17
President does not include ingestion of tens of trillions of records about phone calls, e-mails and locations.
Ellen Nakashima and Greg Miller JAN 17
President ends eavesdropping on friendly foreign governments, changes system of data collection.
Ellen Nakashima JAN 17
President is expected to announce some new limits on the National Security Agency.
Ellen Nakashima JAN 13
Oregon man guilty of Christmas tree bombing plot opens door for possible constitutional challenge to NSA program.
Ellen Nakashima JAN 13
The tech firms are urging the White House and Congress to ban the bulk collection of Internet communications.
Greg Miller and Adam Goldman JAN 12
Attorney Robert S. Litt has led an unusually high-profile response to the Snowden leaks.
Ellen Nakashima JAN 9
Review finds that the program “was not essential” to preventing terrorist attacks.
Ellen Nakashima JAN 7
The agency is exploring how to relinquish control of the records while still being able to exploit them.
Steven Rich and Barton Gellman JAN 2
Documents provided by Snowden show race for a machine light-years ahead of those using zeroes and ones.
Ellen Nakashima DEC 25
Alternatives to NSA storing massing amounts of records are facing resistance on multiple fronts.
Barton Gellman DEC 23
His leaks have fundamentally altered the U.S. government’s relationship with its citizens, the rest of the world.
Ellen Nakashima DEC 21
Government defends NSA’s program to intercept phone and e-mail communications without a warrant.
Marc Fisher and Craig Timberg DEC 21
POST POLL | While government and business data tracking is a concern, many Americans use snooping tools.
Philip Rucker and Greg Miller DEC 20
In year-end press conference, president also faces questions on continuing gridlock in Washington.
Ellen Nakashima DEC 20
The office of an Israeli prime minister, an E.U. official and the heads of aid groups were targets, documents say.
Greg Miller and Ellen Nakashima DEC 19
A court ruling and an expert panel cast doubt on phone effort’s legality and value in deterring terrorism.
Ellen Nakashima and Ashkan Soltani DEC 18
Among the recommendations are an end to NSA collection and storage of Americans’ phone records.
Cecilia Kang and Ellen Nakashima DEC 17
In a meeting at the White House, they warned that a consumer backlash could harm the broader economy.
Ellen Nakashima and Ann E. Marimow DEC 16
Court grants request for a preliminary injunction on controversial program, but stays the action pending appeal.
Craig Timberg and Ashkan Soltani DEC 13
The agency’s cracking of A5/1 gives it the means to decode potentially billions of calls and texts.
Ellen Nakashima DEC 13
Critics say agencies needed separate heads to avoid undue concentration of power in single individual.
Ellen Nakashima DEC 11
“We can’t go back to a pre-9/11 moment,” Gen. Keith Alexander tells the Judiciary Committee.
Ashkan Soltani, Andrea Peterson and and Barton Gellman DEC 10
How the NSA piggybacks onto the tracking behaviors of commercial companies to enable exploitation and surveillance.
Craig Timberg DEC 9
The firms, including Microsoft, Google and Facebook, say there is an “urgent need” for reform.
Ellen Nakashima DEC 9
Law enforcement made more than 9,000 requests last year, a congressional inquiry has revealed.
Ellen Nakashima DEC 7
They add that they are surprised President Obama has not visited the agency to show his support.
Craig Timberg DEC 5
The tech giant moves to reassure customers it will protect them against government surveillance.
Barton Gellman and Ashkan Soltani DEC 4
Snowden documents show agency is collecting billions of records on whereabouts of mobile devices.
Ellen Nakashima NOV 29
National security adviser is expected to make a formal recommendation to President Obama soon.
Craig Timberg, Barton Gellman and Ashkan Soltani NOV 26
The company is moving toward a new effort to protect its Internet traffic amid suspicions of government spying.
Craig Timberg NOV 26
This e-mail suggests Microsoft may have been compromised by the same program used to access Google and Yahoo data.
Craig Timberg NOV 26
These slides suggest NSA programs targeting Google and Yahoo also had Microsoft in their sights.
Ellen Nakashima and Greg Miller NOV 18
One appears to be the original court document authorizing the NSA to conduct communications sweeps.
Greg Miller NOV 14
James Comey testifies that the risk of a major terrorist attack has fallen but “is more dispersed geographically.”
Ellen Nakashima NOV 6
Some officials argue a shift would help avoid an undue concentration of power in one individual.
Greg Miller NOV 5
Report says intelligence community has also struggled with developing defenses against emerging threats.
Barton Gellman, Ashkan Soltani and Andrea Peterson NOV 4
New documents reveal exactly how the Post was able to determine
that the NSA was peeking inside the Google and Yahoo’s cloud network.
Ellen Nakashima NOV 2
Concerns are expressed that Senate bill would validate NSA’s harvesting of telephone, e-mail records.
Ellen Nakashima OCT 31
Measure passed by Intelligence Committee limits use of phone data but endorses its collection.
Greg Miller OCT 31
Disclosure of surveillance program on allies results in both diplomatic and intelligence service predicaments.
Craig Timberg OCT 31
Letter from firms, including Google and Apple, calls for changes that would enhance privacy protections.
Barton Gellman and Ashkan Soltani OCT 30
Agency positioned itself to collect from among millions of accounts, many belonging to Americans.
Graphic
Barton Gellman, Todd Lindeman and Ashkan Soltani OCT 30
The NSA, working with its British counterpart, the Government
Communications Headquarters (GCHQ), secretly taps into the internal
networks of Yahoo and Google, the two biggest Internet companies by
overall data traffic. The operation intercepts information flowing
between the enormous data centers that those companies maintain around
the world. In general, Google and Yahoo use privately owned or leased
lines to synchronize their data centers. This graphic shows how the NSA
and GCHQ break into those internal networks, using Google’s as an
example. Less is known about Yahoo’s networks, but the NSA operations
are thought to be similar.
Ellen Nakashima and Karen DeYoung OCT 30
Keith Alexander says reports that NSA collected records of European citizens is “completely false.”
Ellen Nakashima OCT 28
End the agency’s bulk collection of phone records or endorse it?
Ellen Nakashima OCT 24
Documents contain material about operations that involve countries not publicly allied with the United States.
Michael Birnbaum and Ellen Nakashima OCT 24
The allegations rocked Germany’s government and created a new diplomatic challenge for Obama.
Greg Miller, Julie Tate and Barton Gellman OCT 16
EXCLUSIVE | The drone campaign in Pakistan — often depicted as the
CIA’s exclusive domain — relies heavily on the NSA’s ability to collect
enormous quantities of e-mail, phone calls and other fragments of
intelligence.
Barton Gellman and Ashkan Soltani OCT 14
The contact information is intercepted as it moves across global data links. Many lists belong to Americans.
Ellen Nakashima and Carol D. Leonnig OCT 12
Document provided legal foundation for NSA’s collection of all Americans’ phone records.
Craig Timberg OCT 11
Electronic Frontier Foundation doesn’t want to play political games, but how can it not?
Ellen Nakashima OCT 10
Agency is trying to regain industry’s faith in order to work cooperatively against cyber-threats.
Ellen Nakashima OCT 6
Gen. Keith Alexander is building up forces to fend off cyberattacks; some question the centralizing of power.
Barton Gellman OCT 4
This 2006 research paper lays out the technical features of Tor and proposes a number of attacks.
Barton Gellman, Craig Timberg and Steven Rich OCT 4
Agency has worked for years to unmask users on one the world’s most popular encryption networks.
Ellen Nakashima OCT 2
Director says two-year effort was discontinued and that data were not used for intelligence analysis.
Ellen Nakashima SEP 28
Seeking foreign intelligence, the agency has used e-mail and phone call data to build extensive graphs.
Ellen Nakashima SEP 26
At Senate hearing, Feinstein adds that surveillance reforms could boost trust and transparency.
Ellen Nakashima SEP 25
Gen. Keith Alexander says database can help “connect the dots” between domestic and foreign threats.
Ellen Nakashima SEP 24
Congress to consider NSA surveillance reforms.
Ellen Nakashima, Julie Tate and Carol Leonnig SEP 10
The agency searched a massive database of phone-call records in violation of privacy rules.
Ellen Nakashima SEP 7
Move allowed agency to search for Americans’ communications.
Craig Timberg SEP 6
EXCLUSIVE | The Web giant accelerates a program to make it harder for outsiders to intercept its user information.
Ellen Nakashima SEP 5
Agency has worked with its British counterpart to break codes that protect data sent across Web.
Craig Whitlock and Barton Gellman SEP 3
Cells of engineers try to find ways to exploit technological vulnerabilities of the deadly weapons system.
Greg Miller, Craig Whitlock and Barton Gellman SEP 2
Stark assessments of the purported ally contained in the documents belie U.S. officials’ public statements.
Carol D. Leonnig, Julie Tate and Barton Gellman SEP 1
The U.S. suspects that people with ties to al-Qaeda or other groups have tried to get jobs, a document shows.
Ellen Nakashima AUG 30
The U.S. will release an annual report about its surveillance orders, in addition to other recent disclosures.
Barton Gellman and Greg Miller AUG 29
Despite huge funding, agencies are unable to provide critical data on a range of national security threats.
Craig Timberg and Barton Gellman AUG 29
Documents offer a look at program expected to cost $278 million in the current fiscal year.
Craig Whitlock and Barton Gellman AUG 29
Satellites aimed dozens of receivers over Pakistan to collect intelligence as the mission unfolded.
Ellen Nakashima AUG 21
A new document reveals the extent of the collection before the FISA court forced the agency to revise its tactics.
Ellen Nakashima AUG 16, 2013
Some lawmakers called for greater transparency in the surveillance operations of the National Security Agency.
Barton Gellman AUG 15, 2013
Agency also has overstepped legal authority since Congress gave it broad new power in 2008.
Ellen Nakashima JUL 31, 2013
Obama administration faces growing political skepticism about the counterterrorism program.
Greg Miller and Karen DeYoung JUL 19, 2013
Robert Seldon Lady was freed two days after he was detained by Panama authorities, officials said.
Greg Miller JUL 19, 2013
Case in 2005 drew attention to agency practice known as “extraordinary rendition.”
Ellen Nakashima and Joby Warrick JUL 14, 2013
Aggressive methods fuel debate over divide between privacy, security.
Ellen Nakashima JUL 11, 2013
Intelligence officials fear leaker Edward Snowden has information on spying on China, other critical targets.
Greg Miller JUL 3, 2013
The grounding of the Bolivian president’s plane feeds talk that U.S. officials are calling the shots.
Colum Lynch and Ellen Nakashima JUL 1, 2013
As leaders of France and Germany react to reports of NSA monitoring, Obama defends agency’s methods.
Greg Miller JUN 30, 2013
Inadvertent missteps, legal parsing blamed for errors and false assertions about classified programs.
Carol D. Leonnig, Ellen Nakashima and Barton Gellman JUN 29, 2013
Judges at the Foreign Intelligence Surveillance Court feel report distorts their role in data-collection approvals.
Robert O’Harrow Jr. and Ellen Nakashima JUN 27, 2013
Surveillance program under president’s authority collected content, metadata from Americans.
Greg Miller and Ellen Nakashima JUN 25, 2013
The agency removed the four-page document after concerns about its accuracy were raised by lawmakers.
Ellen Nakashima and Greg Miller JUN 24, 2013
The ability of the contractor-turned-fugitive to evade arrest is raising the new concerns.
Aaron Blake and Ellen Nakashima JUN 24, 2013
The bill seeks to raise the legal bar the government must meet before obtaining call detail records.
Ellen Nakashima JUN 18, 2013
The NSA’s head and others defended the effectiveness and oversight of leaked surveillance programs.
Ellen Nakashima and Sari Horwitz JUN 17, 2013
He claims he exposed only hacking of civilian targets, not “legitimate military targets.”
Barton Gellman JUN 15, 2013
Two of the NSA’s four main collection programs target revealing metadata from Web, phone communications.
Greg Miller and Sari Horwitz JUN 13, 2013
Administration officials defend surveillance programs amid calls for additional transparency.
Ellen Nakashima and Jerry Markon JUN 12, 2013
In an interview with a Hong Kong paper, Edward Snowden asserts the
U.S. has mounted hacking operations against hundreds of Chinese targets
since 2009.
Jerry Markon and Ellen Nakashima JUN 12, 2013
Gen. Keith Alexander says agency will make public records showing success of secret programs
Craig Timberg and Cecilia Kang JUN 11, 2013
Google, Facebook, Microsoft and others want U.S. officials to ease secrecy rules on data collection.
Greg Miller JUN 11, 2013
The Edward Snowden and Bradley Manning cases represent back-to-back blows for U.S. intelligence.
Ellen Nakashima JUN 11, 2013
The debate tips toward taking action when U.S. officials believe Inspire promotes an imminent threat.
Peter Finn, Greg Miller and Ellen Nakashima JUN 10, 2013
Edward Snowden leaked documents on distinctly different operations.
Barton Gellman and Jerry Markon JUN 10, 2013
The NSA contractor “wanted to expose the “surveillance state.”
Barton Gellman JUN 9, 2013
The leaker, at times eloquent and at times jittery, took the code name “Verax,” or “truth teller” in Latin.
Ellen Nakashima JUN 9, 2013
Daniel Ellsberg praises NSA leaker while others condemn him for revealing surveillance programs.
Barton Gellman, Aaron Blake and Greg Miller JUN 9, 2013
Edward Snowden, a 29-year-old Booz Allen Hamilton employee, says
he’s done nothing wrong in revealing government surveillance programs.
http://www.washingtonpost.com/nsa-secrets/
No comments:
Post a Comment