AT&T stores details for every call, text message, Skype chat, or other communication that has passed through its infrastructure, retaining many records dating back to 1987, according to the Times 2013 Hemisphere report. The scope and length of the collection has accumulated trillions of records and is believed to be larger than any phone record database collected by the NSA under the Patriot Act, the Times reported.
The Vindication of Edward Snowden
A federal appeals court has ruled that one of the NSA programs he exposed was illegal.
(Source: The Atlantic)
Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
We all know these stories of sources who take a risk to approach an institution and that institution doesn’t publish the information. I think that the existence of the Intercept or WikiLeaks or other outlets that are willing to publish that information creates a different media landscape…
…I don’t think what we’re doing is radical. I think it’s radical to censor information because the government asks you to. That’s radical.
Laura Poitras, Director and Producer, CitizenFour, to Wired. Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible.
Context: Poitras is referring to the New York Times which withheld publication of the Bush administration’s warrantless wiretapping program for a year at the administration’s request.
The Tools: Poitras says she couldn’t have reported CitizenFour, her documentary on Edward Snowden and the NSA leaks, without a number of Open Source tools. These included, according to Wired, “the anonymity software Tor, the Tor-based operating system Tails, GPG encryption, Off-The-Record (OTR) encrypted instant messaging, hard disk encryption software Truecrypt, and Linux.”
Additionally, Poitras used the anonymizing operating system Tails on a computer dedicated solely for communicating with Snowden, according to Wired.
(via futurejournalismproject)
WIRED’s James Bamford spent three days with Edward Snowden, the most time any journalist has spent with Snowden since he arrived in Russia in June 2013.
Read Bamford’s full account of his time with the whistleblower in The Most Wanted Man in the World | WIRED
Via Glenn Greenwald / The Intercept:
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents…
…Among the core self-identified purposes of [the Joint Threat Research Intelligence Group] are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums…
The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”
Read through for source documents demonstrating how this done.
The technology exists to add people rapidly to lists, but it is harder to take people off. Adding people is automatic; subtracting people requires human beings who are otherwise occupied. This is a real consequence of an information-hungry, terrorist-fearing surveillance state. If innocents fall into the gap, so be it: There’s a better chance that bad guys won’t get in.
Why Silicon Valley’s NSA deal helps them, but not you
Ever since leaked NSA documents first started popping up this summer, the battle against NSA surveillance has proceeded on multiple fronts: legislators pushing for new laws, journalists pushing for new stories, and tech companies fighting to regain users’ trust. Yesterday, one of the major fronts closed down. Since July, tech companies had been putting pressure on the Department of Justice, fighting for the right to say more about their interactions with law enforcement. Yesterday they made peace, reaching a settlement and withdrawing a class action suit that had drawn in some of the most powerful companies in America. On this front at least, reformers have likely gotten all they’re going to get.
There are a lot more stories to come, a lot more documents that will be covered. It’s important that we understand what it is we’re publishing, so what we say about them is accurate.




