snowden, the nsa, and the survillance statesept11tothepresent.weebly.com/uploads/6/6/1/4/... ·...

54
SNOWDEN, THE NSA, AND THE SURVILLANCE STATE

Upload: others

Post on 11-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

SNOWDEN, THE NSA, AND THE SURVILLANCE STATE

Page 2: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

THE NSA THE NSA AND THE

SOWDEN SOWDEN

THE SURVILLANCE STATE THE SURVILLANCE STATE

Page 3: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PARTS 7 & 8 SNOWDEN

The Other Programs The Abuses

Page 4: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PART SEVEN

THE OTHER PROGRAMS MUSCULAR, XKEYSCORE, BOUNDLESS INFORMANT, AND MYSTIC

Page 5: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

AS THE WEEKS FOLLOWED, JOURNALISTS WOULD DISCOVER MANY MORE SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA...

HERE ARE FOUR OF THEM...

Page 6: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

FOURTH AMENDMENT T

HE

Let’s Take A Look!

Page 7: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The right of the people to be secure in their persons, houses,

papers, and effects, against unreasonable searches and

seizures, shall not be violated, and no Warrants shall issue, but upon

probable cause, supported by Oath or affirmation, and particularly

describing the place to be searched, and the persons or

things to be seized.

Page 8: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PROGRAM NUMBER ONE DATA COLLECTION

Page 9: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

A program jointly administered by the NSA and Great Britain’s Government Communications HeadQuarters.

IT SECRETELY BREAKS INTO YAHOO AND GOOGLE DATA CENTERS AROUND THE WORLD.

Page 10: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

According to leaked SNOWDEN documents, the program sends Millions

of records every day from

networks to data warehouses at the agencies headquarters in Fort

Meade, Maryland.

The program operates via an access point known as DS-200B, which is

outside the United States.

AN

D

Page 11: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

According to the WASHINGTON POST the program collects more than

twice as many data points as the PRISIM program.

IT DOES NOT REQUIRE A FISA WARRENT.

GOOGLE was first made aware of the

program when a top-secret drawing on a PowerPoint slide was leaked by Snowden

The WP reported that “Two engineers with close ties to GOOGLE

exploded in profanity when they saw the drawing.”

Here is the slide they saw...

Page 12: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 13: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

UPLOADED THIS REPORT OCT. 30, 2013

Page 14: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

In November, 2013 Google announced

it was encrypting all traffic

between its data

centers.

YAHOO announced

similar encryption

plans at about the same time as Gogle.

In December, 2013 Micro-

soft referred to an

“advance persistent

threat” and announced

its own encryption

plans.

CORPORATE

Page 15: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

In November, 2013 Google announced

it was encrypting all traffic

between its data

centers.

YAHOO announced

similar encryption

plans at about the same time as Gogle.

In December, 2013 Micro-

soft referred to an

“advance persistent

threat” and announced

its own encryption

plans.

FILED THIS REPORT ON OCTOBER 31, 2013

Page 16: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 17: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PROGRAM NUMBER TWO SEARCH ENGINE

Page 18: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Formerly secret computer system used by the NSA for searching and analyzing the internet data it collects everyday. Characterized by Snowden and Greenwald as a system which enables almost unlimited surveillance of anyone, anywhere in the world...

Page 19: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On January 26, 2014, SNOWDEN gave an interview with the German radio broadcaster, Norddeutscher Rundfunk. He said the following...

“You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information. …You can tag individuals… Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”

Page 20: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

According to The Guardian's Glenn Greenwald, low-level NSA analysts can via systems like XKeyscore "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."

Page 21: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

He added that the NSA's databank of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future"

Page 22: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

ACCORDING TO THIS TOP SECRET SLIDE REVEALED

BY SNOWDEN, THE NSA USES 700 SERVERS

IN APPROXIMATELY 150 SITES THROUGHOUT

THE WORLD...

Page 23: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

ACCORDING TO THE NSA

In an official statement from July, 2013, the NSA said “Xkeyscore is used as part of the NSA’s lawful foreign signals intelligence collection system to legally obtain information about “legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. There is no “unchecked analyst access to NSA collection data. Access to Xkeyscore, as well as all of NSA’s analytic tools is limited to only those personnel who require access for their assigned tasks.” and that there are stringent oversight and compliance mechanisms built in at several levels.

Page 24: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On August 1, 2013, RT filed this report,

explaining the system...

Page 25: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PROGRAM NUMBER THREE VISUALIZATION TOOL

Page 26: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Is a big data analysis and visualization tool used by the NSA to show summaries of world-wide data collection. When the tool was revealed to the public it served as a direct contradiction to assurances from the NSA that it does not collect any type of data on millions of Americans

Page 27: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The existence of the tool was revealed in THE GUARDIAN on June 8, 2013.

Leaked documents contained a Top Secret

“heat map” summarizing data records from 504 separate DNI (Digital Network

Intelligence, or INTERNET records) and DNR (Dialed Number Recognition or

TELEPHONE records).

The map also documented massive spying on other countries...

Page 28: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The map shows almost 3 BILLION data elements from inside the United States for a 30 day period ending March, 2013.

The map also showed massive surveillance in German, France, Spain, Norway, Italy, and the Netherlands.

Page 29: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

NSA DIRECTOR

KEITH ALEXANDER

On October 29th 2013 Keith Alexander declared that accusations in French, Spanish, and Italian media about NSA intercepting millions of phone calls from these countries are “completely false.”

He added that “This is not information that we collected on European citizens.” It represents information that we and our NATO allies have collected in defense of our countries.”

Page 30: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PROGRAM NUMBER FOUR DATA COLLECTION

Page 31: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The program was revealed by Barton Gelman in the Washington Post on March 18, 2014. The scope and size of the NSA’s data collection program proved to be much larger than anyone had ever imagined...

Page 32: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The program allows the NSA to record 100% of an ENTIRE NATION’S

telephone calls. It can then rewind and replay the conversations

for as long as a month after they have taken place.

When the story was first revealed

the target nation was not identified...

WATCH THE NEWS SUMMARY...

Page 33: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 34: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On May 19, 2014 the

revealed that the nation being spied on was the BAHAMAS

Page 35: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The INTERCEPT published this chart, suggesting another unnamed nation was also targeted. The audio program was

called SOMALGET. The program also scoops up massive metadata from 3 other countries as listed.

Page 36: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The NSA used this cover slide as

the logo for the program.

Page 37: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On MAY 27th 2014, Julian Assange, founder of WIKKILEAKS

revealed the identity of the nation marked with an “X” on

the INTERCEPT graphic...

Page 38: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Watch the summary from RT...

Page 39: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 40: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

VIDEO BREAK

THE NBC INTERVIEW brian williams and edward snowden

Page 41: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On May 28,2014 Brian Williams of NBC Nightly News

flew to Moscow to meet with Edward Snowden for the

first major network TV interview

Page 42: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

In it, he would attempt to explain his motivations to a national audience.

Page 43: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

PART EIGHT

THE ABUSES AUDIT REPORTS – SPYING ON AMERICANS

Page 44: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Although James Clapper, Director of Natl. Intel. suggested that none of

the programs you have just seen exist, we know they do, and that there have been abuses in the past...

Page 45: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

WATCH THIS REPORT

FROM NBC NEWS, 9-23-2013

Page 46: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 47: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

On Aug. 16, 2013, Barton Gellman published details of a classified internal audit

that showed the NSA violated it’s own rules thousands of times...

Page 48: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

For a period of about a year, there were 2,776 VIOLATIONS. Most involved “unauthorized

surveillance of Americans or foreign intelligence targets in the U.S.” and most were accidental.

Page 49: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Less than 1 year after the previous

story (9-11-2013)

ran this story about more violations...

Page 50: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

Documents also reveal that the NSA spies on gamers,

including X-BOX live connections and games like

“WORLD OF WARCRAFT”

For some, this seems to be an abuse of government power... Watch the report...

Page 51: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 52: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

The NSA also had an unusually high interest

on specific games...

WATCH THE NEWS REPORT...

Page 53: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE
Page 54: SNOWDEN, THE NSA, AND THE SURVILLANCE STATEsept11tothepresent.weebly.com/uploads/6/6/1/4/... · SPYING TOOLS AND PROGRAMS EMPLOYED BY THE NSA... HERE ARE FOUR OF THEM... FOURTH THE

THE END SNOWDEN / THE NSA AND THE SURVEILLANCE STATE