78 of 84Image
November 19, 2013
FISA court order that allowed NSA surveillance is revealed for first time
The secret FISA court, which authorizes U.S. government surveillance actions, released on the instructions of U.S. intelligence community chief James Clapper a legal opinion that allowed the NSA to collect even more data on Americans, despite finding the agency exceeding its powers and capabilities.
Even though one of the FISA judges recounted a number of problems with the smaller NSA programs, wider scale programs were nonetheless approved. According to the documents, metadata -- the information around messages but not the messages themselves, did not enjoy Fourth Amendment protections
- Read more: FISA court order that allowed NSA surveillance is revealed for first time (The Guardian)
Image: White House/Flickr
November 20, 2013
U.S. and U.K. struck secret deal with U.K. to monitor British citizen data
Fresh information suggested what the NSA was telling the Brits might not have been all it was letting on. According to the Snowden-leaked documents, the "Five Eyes" group of countries, including the two superpowers, Canada, Australia, and New Zealand, may not have been as binding as first thought.
A 2005 secret draft directive said the NSA could spy on its allies without informing them -- though, it's not clear if it was ever enacted. A 2007 NSA memo provided, according to The Guardian, the "first explicit confirmation" that Brits were caught up in the U.S. surveillance dragnet.
- Read more: NSA's BFFs not necessarily immune to spying eyes (CNET)
Image via The Guardian
Source: The Guardian
November 23, 2013
NSA malware infected over 50,000 computer networks worldwide
The NSA infected more than 50,000 computer networks worldwide with malware, according to new slides leaked by Snowden to Dutch media outlet NRC. A presentation dated 2012 showed a spiderweb map dubbed "Computer Network Exploitation," citing more than 50,000 locations globally.
The division of the intelligence agency, Tailored Access Operations (TAO), describes the operation in which includes, "enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks."
- Read more: NSA malware infected over 50,000 computer networks worldwide (ZDNet)
Image via NRC