us_ministerium_justiz   55

« earlier    

New Surveillance Court Orders Show That Even Judges Have Difficulty Understanding and Limiting Government Spying
In the United States, a secret federal surveillance court approves some of the government’s most enormous, opaque spying programs. It is near-impossible for the public to learn details about these programs, but, as it turns out, even the court has trouble, too. According to new opinions obtained by EFF last month, the Foreign Intelligence Surveillance Court (FISC) struggled to get full accounts of the government’s misuse of its spying powers for years. After learning about the misuse, the court also struggled to rein it in. In a trio of opinions, a judge on the FISC raised questions about unauthorized surveillance and potential misuse of a request he had previously granted. In those cases, the secrecy inherent in the proceedings and the government’s obfuscation of its activities made it difficult for the court to grasp the scope of the problems and to prevent them from happening again. Although many of the newly released opinions appear to be decisions approving surveillance and searches of particular individuals, several raise questions about how well equipped FISC judges are to protect individuals’ statutory and constitutional rights when the government is less than candid with the court, underscoring EFF’s concerns with the FISC’s ability to safeguard individual privacy and free expression ... The opinion goes on to note that the government’s conduct provided additional reasons to rule that the surveillance was unauthorized. It wrote: "Moreover, the government’s failures in this case are not isolated ones. The government has exhibited a chronic tendency to mis-describe the actual scope of NSA acquisitions in its submissions to this Court. These inaccuracies have previously contributed to unauthorized electronic surveillance and other forms of statutory and constitutional deficiency" ... Although the particular concerns the court had with the government are redacted, the court appeared frustrated by the fact that it had been kept in the dark for so long: "It is troubling that, for many years, NSA failed to disclose the actual scope of its surveillance, with the result that it lacked authorization for some of the surveillance that it conducted. It is at least troubling that, once the NSA and the Department of Justice had finally recognized that unauthorized surveillance was being conducted, they failed to take prompt measures to discontinue the surveillance, or even to obtain prospective authorization for the already-ongoing collection."
eff, 11.09.2018
recht_interpretation  gericht_us_fisc  gesetz_us_fisa  geheimdienst_polizei_kontrolle  geheimdienst_us_nsa  geheimdienst_allg_desinformation  staat_politik_desinformation  überwachung_massenkontrolle  überwachung_int_sigint_comint  us_ministerium_justiz  geheimdienst_us_fbi  überwachung_itk_inhaltsdaten  überwachung_itk_verkehrs_metadaten  land_usa  recht_geheim_verdeckt 
9 weeks ago by kraven
How US authorities tracked down the North Korean hacker behind WannaCry
On September 6, the US Department of Justice formally charged a North Korean programmer for some of the biggest cyber-attacks in recent years. According to a 179-page DOJ indictment, the US believes that Park Jin Hyok, a 34-year-old North Korean, is one of the many individuals behind a long string of malware attacks and intrusions. The DOJ says Park was an active member of a government-sponsored hacking team known in the private cyber-security sector as the Lazarus Group. But in reality, officials say, he was also a government employee working for a government-owned company named Chosun Expo Joint Venture (Chosun Expo hereinafter). Investigators say that Chosun Expo was founded as a joint venture between the South and North Korean governments, and was meant to be an e-commerce and lottery website. South Korean officials pulled out of the deal, but the North Korean government continued to manage the company through various individuals, branching out in different online services, such as online gaming and gambling. US officials say that the company was only a front and money-making entity for Lab 110, a component of the DPRK military intelligence apparatus. A report published by an organization of North Korean dissidents living in South Korea, cited in the indictment, identified Chosun Expo as providing "cover for North Korean government officers."
zdnet, 06.09.2018
land_nordkorea  kriminalität_cracker_blackhat  itsicherheit_malware_spyware  geheimdienst_kp_kpa_rgb_lab110  geheimdienst_militär  geheimdienst_allg_unternehmen_tarnfirma  geheimdienst_polizei_infiltration_tech  us_ministerium_justiz  itsicherheit_botnetz_c&c  geheimdienst_polizei_tarnung_undercover  datenschutz_id_management  itsicherheit_strategie  geheimdienst_uk_nca_nccu  geheimdienst_allg_spionage  militär_allg_spezialeinheit  militär_allg_infiltration_tech  geheimdienst_uk_gchq_ncsc  geheimdienst_us_fbi 
10 weeks ago by kraven
My Life as a New York Times Reporter in the Shadow of the War on Terror
I was sitting in the nearly empty restaurant of the Westin Hotel in Alexandria, Virginia, getting ready for a showdown with the federal government that I had been trying to avoid for more than seven years. The Obama administration was demanding that I reveal the confidential sources I had relied on for a chapter about a botched CIA operation in my 2006 book, “State of War.” I had also written about the CIA operation for the New York Times, but the paper’s editors had suppressed the story at the government’s request. It wasn’t the only time they had done so.
interception, 03.01.2018
land_usa  geheimdienst_us_cia  geheimdienst_us_nsa_stellarwind  medien_presse_gatekeeperfilter  medien_presse_nyt  medien_presse_desinformation  medien_presse_informantenschutz  medien_presse_investigativ  staat_politik_geheimhaltung  us_regierung  us_ministerium_justiz  geheimdienst_us_fbi  staat_repression_einschüchterung  staat_repression_medien_presse  staat_repression_whistleblower  staat_propaganda_staatswohl_staatsräson  staat_propaganda_sicherheit  medien_presse_recherche  zensur_presse_medien  zensur_selbstzensur  überwachung_chilling_effect  geheimdienst_polizei_kontrolle  us_kongress  staat_propaganda_krieg  medien_presse_propaganda  staat_politik_desinformation  recht_grundrecht_pressefreiheit  staat_propaganda_kriminalität_terrorismus 
january 2018 by kraven
US says it doesn't need secret court's approval to ask for encryption backdoors
The US government does not need the approval of its secret surveillance court to ask a tech company to build an encryption backdoor. The government made its remarks in July in response to questions posed by Sen. Ron Wyden (D-OR), but they were only made public this weekend. The implication is that the government can use its legal authority to secretly ask a US-based company for technical assistance, such as building an encryption backdoor into a product, but can petition the Foreign Intelligence Surveillance Court (FISC) to compel the company if it refuses. In its answers, the government said it has "not to date" needed to ask the FISC to issue an order to compel a company to backdoor or weaken its encryption. The admission comes just a few weeks before the controversial section 702 powers are set to expire. Congress has until December 31 to pass a new surveillance law, or the intelligence community risks losing its powers at the end of the annual certification cycle. Wyden, who sits on the Senate Intelligence Committee, last month opposed the committee's own proposed bill, arguing that it "leaves in place current statutory authority to compel companies to provide assistance, potentially opening the door to government mandated de-encryption without [FISC] oversight." Wyden's own bipartisan bill, supported by committee colleague Rand Paul (R-KY), would require the government to obtain approval from the FISC for each request for assistance.
zdnet, 04.12.2017
gericht_us_fisc  land_usa  gesetz_us_fisa  überwachung_backdoor_hardware  überwachung_backdoor_software  krypto_entschlüsselung_zwang  internet_zugang_anbieter  internet_dienst_anbieter  unternehmen_allg_itk_netz  us_regierung  us_kongress_senat_geheimdienstausschuss  überwachung_int_sigint_comint  geheimdienst_us_nsa_sso_cpa  geheimdienst_us_odni  us_ministerium_justiz  recht_richtervorbehalt 
december 2017 by kraven
FBI can keep secret who's in its biometrics 'mega database,' says Justice Dept.
A final rule published in the federal register by the Justice Dept. says that the Next Generation Identification (NGI) system will not be subject to several key protections and provisions covered under the Privacy Act, which allow for judicial redress and opting out of the database altogether. The decision was "necessary to avoid interference" with the FBI's law enforcement and national security operations, according to the rule. The FBI has long fought to keep who's stored in its biometrics database a secret, arguing that not doing so "could compromise ongoing, authorized law enforcement and national security efforts and may permit the record subject with the opportunity to evade or impede the investigation."
zdnet, 08.08.2017
biometrie_multimodal  datenbank_biometrie_ngi  geheimdienst_us_fbi  land_usa  gesetz_us_privacy_act  staat_politik_geheimhaltung  us_ministerium_justiz  recht_grundrecht_rechtsschutz  us_regierung_federal_register 
august 2017 by kraven
Additional Release of FISA Section 702 Documents
On May 11, 2017, we publicly posted two tranches of Section 702 documents after these documents were produced pursuant to a Freedom of Information (FOIA) case filed in the U.S. District Court, Southern District of New York, ACLU v. National Security Agency, et al. (the ACLU FOIA release April 11, 2017 and the ACLU FOIA release May 10, 2017). For purposes of transparency, we also released several other documents pertaining to the FISC Opinion Approving the 2016 Section 702 Certifications on May 11, 2017. Today’s release is the third tranche of documents related to the ACLU FOIA case (the ACLU FOIA release June 13, 2017). Additionally, opinions and orders by the Foreign Intelligence Surveillance Court concerning Section 702 have been produced in a FOIA cased filed in the U.S. District Court, Northern District of California San Francisco Division, Electronic Frontier Foundation v. United States Department of Justice (the EFF FOIA release June 13, 2017). The same opinions and orders are being posted here for purposes of transparency.
odni, 14.06.2017
geheimdienst_us_odni  us_ministerium_justiz  gericht_us_fisc  gesetz_us_fisa  gesetz_us_foia  ngo_aclu  ngo_eff  land_usa  überwachung_int_sigint_comint  geheimdienst_us_nsa 
june 2017 by kraven
House Oversight Committee Report on Law Enforcement: Use of Cell-Site Simulation Technologies
Advances in emerging surveillance technologies like cell-site simulators – devices which transform a cell phone into a real-time tracking device – require careful evaluation to ensure their use is consistent with the protections afforded under the First and Fourth Amendments to the U.S. Constitution. After press reports alleged wide-spread use of cell-site simulation devices by federal, state, and local law enforcement, the Committee initiated a bipartisan investigation in April 2015. At the outset of the investigation, the use of these devices by federal, state, and local law enforcement agencies was not well known, and in many instances, appeared to be shrouded in secrecy. This is partly due to the use of the technology by military and intelligence agencies and the need for sensitivity in national security matters. The Federal Bureau of Investigation (FBI), for example, avoided disclosing not only its own use of the devices, but also its role in assisting state and local law enforcement agencies in obtaining and deploying these devices. Indeed, the Committee’s investigation revealed that as part of the conditions for being able to sell cell-site simulators to state and local law enforcement, the manufacturers of these devices must first notify the FBI, and those agencies in turn must sign a non-disclosure agreement with the FBI that expressly prohibits them from publicly disclosing their use of this technology, even in prosecutions where the use of the technology was at issue.
public intelligence, 20.12.2016
geheimdienst_us_fbi  geheimdienst_us_dhs  überwachung_mobilfunk_imsi_catcher  land_usa  us_ministerium_justiz  us_kongress_house_kontrollausschuss  staat_politik_geheimhaltung 
december 2016 by kraven
US Judges Can Now Sign Global Hacking Warrants
On Thursday, changes to the rules around US search warrants came into effect, meaning that magistrate judges can now authorize the hacking of computers outside of their own district. The move centers around Rule 41 of the Federal Rules of Criminal Procedure, which regulates when and under what particular circumstances judges can issues warrants for searches and seizures, including remote searches of suspects’ computers. According to the Department of Justice, the problem is that when a criminal suspect is using Tor—perhaps to post child pornography on a dark web site—it's very difficult to know where the person is currently located. What the FBI has done in response is go to one magistrate judge and ask them to authorize the hacking of computers that were used to view illegal material, “wherever located.” That's what the agency did for its 2015 investigation into dark web child pornography site Playpen. But, up until today, magistrate judges were only able to sign warrants for searches within their own district—in the Playpen case, the Eastern District of Virginia—unless the case overlapped with some exceptions, such as involving terrorism.
motherboard, 01.12.2016
gesetz_us_rea_frcrmp_rule41  geheimdienst_us_fbi_cipav_nit  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  anonymisierung_anti  überwachung_onlinedurchsuchung  recht_legalisierung  land_usa  überwachung_massenkontrolle  us_ministerium_justiz  recht_richtervorbehalt  gericht_us_bundesbezirk_amtsrichter  geheimdienst_polizei_infiltration_tech 
december 2016 by kraven
Absprache zur Terrorbekämpfung
Eine im Frühjahr unterzeichnete Übereinkunft mit den USA zur Terrorismusbekämpfung ist Thema einer Antwort der Bundesregierung (18/9132) auf eine Kleine Anfrage der Fraktion Bündnis 90/Die Grünen in einer Kleinen Anfrage (18/8866). Wie die Fraktion darin schrieb, unterzeichnete Bundesinnenminister Thomas de Maizière (CDU) in Washington mit US-Justizministerin Loretta Lynch ein sogenanntes Memorandum of Understanding und bewarb dieses Abkommen auf seinen Webseiten damit, "im Kampf gegen den Terrorismus künftig besser zusammenarbeiten sowie mehr Informationen über Verdächtige gegenseitig austauschen zu können". Wie die Regierung mit Stand vom 6. Juli weiter darlegt, wurden bisher vom Bundeskriminalamt "Daten zu 299 Personen (Gefährder/Relevante Personen)" übermittelt, unter denen 159 deutsche Staatsangehörige sind.
heute im bundestag, 15.07.2016
land_usa  land_deutschland  geheimdienst_de_bka  geheimdienst_us_fbi  de_ministerium_bmi  de_bundestag_dip  staat_politik_informell_mou_moa  geheimdienst_polizei_datenaustausch  überwachung_person_profil  us_ministerium_justiz  geheimdienst_us_fbi_tsc_tsdb  geheimdienst_us_odni_nctc  überwachung_präventiv  überwachung_person_gefährder 
july 2016 by kraven
George W. Bush Made Retroactive N.S.A. ‘Fix’ After Hospital Room Showdown
President George W. Bush sought to retroactively authorize portions of the National Security Agency’s post-9/11 surveillance and data collection program after a now-famous incident in 2004 in which his attorney general refused to certify the program as lawful from his hospital bed, according to newly declassified portions of a government investigation.
new york times, 20.09.2015
geheimdienst_us_nsa_stellarwind  land_usa  recht_geheim_verdeckt  überwachung_chat_telefonie_voip  überwachung_internet_email  überwachung_int_sigint_comint  überwachung_massenkontrolle  us_regierung  us_ministerium_justiz  überwachung_abhörsystem_us_tsp_psp  staat_politik_desinformation  staat_politik_geheimhaltung  überwachung_itk_verkehrs_metadaten  staat_propaganda_kriminalität_terrorismus 
september 2015 by kraven
How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
Newly unsealed court documents reveal the Justice Department won an order forcing Google to turn over more than one year’s worth of data from the Gmail account of Jacob Appelbaum, a developer for the Tor online anonymity project who has worked with WikiLeaks as a volunteer. The order also gagged Google, preventing it from notifying Appelbaum that his records had been provided to the government.
intercept, 20.06.2015
us_ministerium_justiz  ngo_wikileaks  überwachung_internet_email  land_usa  überwachung_medien_presse  überwachung_sozialerkontext  überwachung_itk_verkehrs_metadaten 
june 2015 by kraven
FBI betreibt eine Flotte von Überwachungsflugzeugen
Nun berichtet die Nachrichtenagentur AP, dass das FBI eine kleine Flotte von tieffliegenden Flugzeugen besitzt, die mit Kameras und zeitweise auch mit IMSI-Catchern ausgerüstet sind. Die Flugzeuge werden von fiktiven Firmen betrieben, hinter denen sich die Regierung verbirgt (Dokumente). Es geht also um verdeckte Überwachung, die offenbar weitgehend ohne richterliche Genehmigung stattfindet. In den letzten 30 Tagen seien die Flugzeuge über mehr 30 Städten in 11 Bundesstaaten eingesetzt worden. AP hat bislang 50 Flugzeuge auf das FBI zurückverfolgen und seit April mehr als 100 Flüge über Städten und dem Land ausmachen können. Es scheint sich also um ein Lauschprogramm zu handeln, das oft zum Einsatz kommt.
telepolis, 03.06.2015
geheimdienst_us_fbi  geheimdienst_allg_verdeckte_operation  us_ministerium_justiz  unternehmen_textron_cessna  überwachung_chat_telefonie_voip  überwachung_int_sigint_comint  überwachung_lokalisierung_bewegung  überwachung_mobilfunk_imsi_catcher  überwachung_video_widearea  überwachung_stadt  unternehmen_boeing_drt  geheimdienst_polizei_tarnung_undercover  geheimdienst_allg_unternehmen_tarnfirma 
june 2015 by kraven
U.S. secretly tracked billions of calls for decades
For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. The data collection began in 1992 during the administration of President George H.W. Bush, nine years before his son, President George W. Bush, authorized the NSA to gather its own logs of Americans' phone calls in 2001. It was approved by top Justice Department officials in four presidential administrations and detailed in occasional briefings to members of Congress but otherwise had little independent oversight, according to officials involved with running it. The DEA used its data collection extensively and in ways that the NSA is now prohibited from doing. Agents gathered the records without court approval, searched them more often in a day than the spy agency does in a year and automatically linked the numbers the agency gathered to large electronic collections of investigative reports, domestic call records accumulated by its agents and intelligence data from overseas. Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day. In the late 1980s and early 1990s, officials said the agency had little way to make sense of the data their agents accumulated and almost no ability to use them to ferret out new cartel connections. Some agents used legal pads. The DEA asked the Pentagon for help. The military responded with a pair of supercomputers and intelligence analysts who had experience tracking the communication patterns of Soviet military units. "What they discovered was that the incident of a communication was perhaps as important as the content of a communication," a former Justice Department official said. The military installed the supercomputers on the fifth floor of the DEA's headquarters, across from a shopping mall in Arlington, Va. The data collection was known within the agency as USTO (a play on the fact that it tracked calls from the U.S. to other countries).
usa today, 07.04.2015
geheimdienst_us_dea_usto  geheimdienst_us_dea_sod  geheimdienst_us_nsa_stellarwind  land_usa  überwachung_chat_telefonie_voip  recht_geheim_verdeckt  überwachung_massenkontrolle  überwachung_vorratsdaten_itk_meta  überwachung_lokalisierung_bewegung  überwachung_sozialerkontext  datenanalyse_graph_sna  us_ministerium_justiz  us_kongress 
april 2015 by kraven
Facebook-Profil gefälscht: US-Ministerium leistet Vergleichszahlung
Mit Fotos und persönlichen Daten einer Verdächtigen hat die US-Drogenvollzugsbehörde ein falsches Facebook-Profil erstellt - um Dealer und Kunden anzulocken und dingfest zu machen. Für die fragwürdige Methode muss das Ministerium jetzt zahlen.
spiegel, 21.01.2015
geheimdienst_allg_diskreditierung  geheimdienst_us_dea  land_usa  überwachung_itforensik  internet_soznetz_facebook  us_ministerium_justiz  geheimdienst_polizei_agent_provocateur  tech_hw_mobilfunk_gerät  geheimdienst_polizei_tarnung_undercover 
january 2015 by kraven
Documents Shed New Light on Legal Wrangling Over Spying in U.S.
In January 2007, Judge Malcolm Howard issued an extraordinary order on behalf of the nation’s secret surveillance court. He interpreted the Foreign Intelligence Surveillance Act, which requires individual warrants to wiretap on domestic soil, in a way that authorized the Bush administration’s warrantless wiretapping program, according to documents [NB:,-2001] declassified on Friday. The revelations included the identities of the judges and aspects of the legal theory that they disagreed about. In December 2005, The Times revealed the existence of one component of StellarWind. In January 2007, Attorney General Alberto Gonzales said the program had been brought under the court’s authority under a legal theory he described as “innovative” and “complex,” but did not detail. Essentially, Judge Howard accepted a theory that reinterpreted a word in the law, “facility,” which in FISA had always been understood to mean a phone number or email address a foreign agent was using to communicate. But the Bush administration argued that “facility” could instead mean entire network switches used by large numbers of people, some of whom were members of Al Qaeda.
new york times, 13.12.2014
gesetz_us_fisa  gericht_us_fisc  geheimdienst_us_nsa_upstream  geheimdienst_us_nsa_stellarwind  überwachung_abhörsystem_us_tsp_psp  überwachung_internet_email  überwachung_chat_telefonie_voip  überwachung_massenkontrolle  überwachung_int_sigint_comint  überwachung_itk_netzknoten  überwachung_itk_inhaltsdaten  geheimdienst_us_odni  us_ministerium_justiz  ngo_eff  medien_presse_nyt  land_usa  gesetz_us_foia  recht_geheim_verdeckt  recht_legalisierung  gericht_allg_geheimjustiz  überwachung_itk_verkehrs_metadaten 
december 2014 by kraven
CIA-Folter-Bericht: Wieviel wusste die Regierung?
Der Senatsauschuss hat heute trotz aller gegenläufigen Versuche die Zusammenfassung des Berichts über die Behandlung von Gefangenen durch die CIA veröffentlicht. Es sind über 500 Seiten, der gesamte Bericht soll über 6.000 Seiten haben. Ob er jemals in Gänze veröffentlicht wird, ist noch unbekannt. Glenn Greenwald bewertet den Bericht als "den bei weitem umfassendsten offiziellen Bericht über das offizielle Folterregime des Kampfes gegen den Terror".
telepolis, 09.12.2014
geheimdienst_allg_desinformation  geheimdienst_allg_manipulation_propaganda  geheimdienst_allg_verdeckte_operation  geheimdienst_us_odni_nctc  land_usa  medien_presse_desinformation  medien_presse_propaganda  militär_allg_kriegsverbrechen  militär_allg_kriegsführung_irregulär  partei_us_demokraten  partei_us_republikaner  recht_geheim_verdeckt  recht_menschenrecht_folterverbot  geheimdienst_polizei_repression_einschüchterung  staat_propaganda_krieg  staat_propaganda_sicherheit  staat_repression_einschüchterung  us_kongress_house_geheimdienstausschuss  us_kongress_senat_geheimdienstausschuss  us_ministerium_außen  us_regierung  us_ministerium_justiz  us_nsc  zensur_staat  geheimdienst_us_cia_do_ncs  us_ministerium_verteidigung  geheimdienst_polizei_kontrolle  geheimdienst_polizei_folter  geheimdienst_us_cia_do_ncs_ctc  geheimdienst_us_cia_do_ncs_sad  staat_politik_desinformation  staat_politik_geheimhaltung  staat_propaganda_kriminalität_terrorismus  terror_bekämpfung  recht_willkür  staat_repression_verschleppung 
december 2014 by kraven
Live Coverage of the Senate Torture Report
One of the worst myths official Washington and its establishment media have told itself about the torture debate is that the controversy is limited to three cases of waterboarding at Guantánamo and a handful of bad Republican actors. In fact, a wide array of torture techniques were approved at the highest levels of the U.S. Government and then systematically employed in lawless US prisons around the world - at Bagram (including during the Obama presidency), CIA black sites, even to US citizens on US soil. So systematic was the torture regime that a 2008 Senate report concluded that the criminal abuses at Abu Ghraib were the direct result of the torture mentality imposed by official Washington.
intercept, 09.12.2014
geheimdienst_allg_desinformation  geheimdienst_allg_manipulation_propaganda  geheimdienst_allg_verdeckte_operation  geheimdienst_us_odni_nctc  land_usa  medien_presse_desinformation  medien_presse_propaganda  militär_allg_kriegsverbrechen  militär_allg_kriegsführung_irregulär  partei_us_demokraten  partei_us_republikaner  recht_geheim_verdeckt  recht_menschenrecht_folterverbot  geheimdienst_polizei_repression_einschüchterung  staat_propaganda_krieg  staat_propaganda_sicherheit  staat_repression_einschüchterung  us_kongress_house_geheimdienstausschuss  us_kongress_senat_geheimdienstausschuss  us_ministerium_außen  us_regierung  us_ministerium_justiz  us_nsc  zensur_staat  geheimdienst_us_cia_do_ncs  us_ministerium_verteidigung  geheimdienst_polizei_kontrolle  geheimdienst_polizei_folter  geheimdienst_us_cia_do_ncs_ctc  geheimdienst_us_cia_do_ncs_sad  staat_politik_desinformation  staat_politik_geheimhaltung  staat_propaganda_kriminalität_terrorismus  terror_bekämpfung  recht_willkür  staat_repression_verschleppung 
december 2014 by kraven
U.S. threatened massive fine to force Yahoo to release data
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program [NB: and]. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. At issue in the original court case was a recently passed law, the Protect America Act of 2007, that allowed the government to collect data for significant foreign intelligence purposes on targets “reasonably believed” to be outside of the United States. Individual search warrants were not required for each target. That law has lapsed but became the foundation for the FISA Amendments Act of 2008, which created the legal authority for some of the NSA programs later revealed by Snowden. The order requiring data from Yahoo came in 2007, soon after the Protect America Act passed. The order also went beyond “metadata” — records of communications but not their actual content — to include the full e-mails.
washington post, 11.09.2014
unternehmen_yahoo  gesetz_us_patriot_act  gesetz_us_fisa  gericht_us_fisc  überwachung_chat_telefonie_voip  überwachung_internet_email  geheimdienst_us_odni  us_ministerium_justiz  staat_repression_einschüchterung  überwachung_int_sigint_comint  überwachung_massenkontrolle  überwachung_itk_inhaltsdaten  überwachung_vorratsdaten_itk_inhalt  überwachung_vorratsdaten_itk_meta  datenanalyse_graph_sna  überwachung_sozialerkontext  us_regierung_eo12333  gericht_allg_geheimjustiz  land_usa  geheimdienst_us_nsa_sso_cpa_blarney_prism  überwachung_person_profil  staat_politik_geheimhaltung  überwachung_itk_verkehrs_metadaten 
september 2014 by kraven
Blacklisted: The Secret Government Rulebook For Labeling You a Terrorist
The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place “entire categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of “reasonable suspicion” as a standard for determining whether someone is a possible threat. Because the government tracks “suspected terrorists” as well as “known terrorists,” individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity.
intercept, 23.07.2014
land_usa  geheimdienst_us_odni_nctc  us_selectee_ssss_liste  us_nofly_liste  geheimdienst_us_fbi_tsc_tsdb  us_ministerium_justiz  staat_propaganda_sicherheit  überwachung_präventiv  sicherheitsarchitektur  recht_geheim_verdeckt  datenanalyse_graph_sna  überwachung_sozialerkontext  überwachung_verhalten  überwachung_int_osint_socmint  staat_repression_ngo_kriminalisierung  geheimdienst_us_dhs  us_ministerium_außen_usaid  geheimdienst_us_nsa_ras  gericht_allg_geheimjustiz  recht_grundrecht_rechtsschutz  us_sar_programm  geheimdienst_polizei_datenaustausch  data_fusion  geheimdienst_us_odni_nctc_dti_tide  überwachung_person_kontakt_begleit  überwachung_person_profil  überwachung_person_gefährder  staat_politik_geheimhaltung  geheimdienst_polizei_tarnung_undercover  staat_propaganda_kriminalität_terrorismus  datenbank_antiterror  datenanalyse_prognose_vorhersage 
july 2014 by kraven
Court Rules No Fly List Process Is Unconstitutional and Must Be Reformed
In a landmark ruling, a federal judge struck down as unconstitutional the government’s procedures for people on the No Fly List to challenge their inclusion. The decision came in an American Civil Liberties Union lawsuit brought on behalf of 13 Americans who found themselves on the list without any notice, reasons, or meaningful way to get off it. The judge ordered the government to create a new process that remedies these shortcomings, calling the current process “wholly ineffective” and a violation of the Fifth Amendment's guarantee of due process. The ruling also granted a key request in the lawsuit, ordering the government to tell the ACLU’s clients why they are on the No Fly List and give them the opportunity to challenge their inclusion on the list before the judge.
aclu, 24.06.2014
us_nofly_liste  ngo_aclu  gericht_us_bundesbezirk  recht_grundrecht_rechtsschutz  gesetz_us_5verfassungszusatz  geheimdienst_us_fbi_tsc_tsdb  land_usa  überwachung_präventiv  überwachung_flugpassagier  geheimdienst_us_dhs  us_ministerium_justiz  überwachung_person_profil 
june 2014 by kraven

« earlier    

related tags

abkommen_datenaustausch  anonymisierung_anti  anonymisierung_pseudonym  bezahlsystem_bargeldlos  biometrie_multimodal  data_fusion  data_mining  datenanalyse_echtzeit  datenanalyse_graph_sna  datenanalyse_multisource  datenanalyse_prognose_vorhersage  datenanalyse_raster_muster  datenbank_antiterror  datenbank_biometrie_ngi  datenbank_vernetzung_zentralisierung  datenschutz  datenschutz_id_management  de_bundestag_dip  de_ministerium_bmi  eu_kommission  eu_minister_rat_der_eu  eu_parlament_ausschuss_libe  geheimdienst_abkommen_ukusa_5eyes  geheimdienst_allg_desinformation  geheimdienst_allg_diskreditierung  geheimdienst_allg_manipulation_propaganda  geheimdienst_allg_spionage  geheimdienst_allg_unternehmen_tarnfirma  geheimdienst_allg_verdeckte_operation  geheimdienst_de_bka  geheimdienst_kp_kpa_rgb_lab110  geheimdienst_militär  geheimdienst_polizei_agent_provocateur  geheimdienst_polizei_datenaustausch  geheimdienst_polizei_folter  geheimdienst_polizei_infiltration_tech  geheimdienst_polizei_kontrolle  geheimdienst_polizei_repression_einschüchterung  geheimdienst_polizei_tarnung_undercover  geheimdienst_polizei_zusammenarbeit  geheimdienst_uk_gchq_ncsc  geheimdienst_uk_nca_nccu  geheimdienst_us_analyse_datenzentrum  geheimdienst_us_cia  geheimdienst_us_cia_do_ncs  geheimdienst_us_cia_do_ncs_ctc  geheimdienst_us_cia_do_ncs_sad  geheimdienst_us_dea  geheimdienst_us_dea_sod  geheimdienst_us_dea_usto  geheimdienst_us_dhs  geheimdienst_us_dhs_nsa_einstein_ncps  geheimdienst_us_fbi  geheimdienst_us_fbi_cipav_nit  geheimdienst_us_fbi_nsletter  geheimdienst_us_fbi_otd  geheimdienst_us_fbi_otd_ecsu_ditu  geheimdienst_us_fbi_tsc_tsdb  geheimdienst_us_nsa  geheimdienst_us_nsa_ces  geheimdienst_us_nsa_db_capricorn  geheimdienst_us_nsa_db_fourscore  geheimdienst_us_nsa_db_soapopera  geheimdienst_us_nsa_db_zap  geheimdienst_us_nsa_fad_fpa_sso  geheimdienst_us_nsa_ras  geheimdienst_us_nsa_sigad_roc_station  geheimdienst_us_nsa_smd424_spcma  geheimdienst_us_nsa_sso  geheimdienst_us_nsa_sso_cpa  geheimdienst_us_nsa_sso_cpa_blarney  geheimdienst_us_nsa_sso_cpa_blarney_prism  geheimdienst_us_nsa_sso_cpa_blarney_ragtime  geheimdienst_us_nsa_sso_cpa_fairview  geheimdienst_us_nsa_sso_cpa_stormbrew  geheimdienst_us_nsa_sso_oakstar  geheimdienst_us_nsa_stellarwind  geheimdienst_us_nsa_upstream  geheimdienst_us_nypd_intelligence_division  geheimdienst_us_odni  geheimdienst_us_odni_nctc  geheimdienst_us_odni_nctc_dti_tide  gericht_allg_geheimjustiz  gericht_allg_gesinnungsjustiz  gericht_us_appellationsgericht  gericht_us_bundesbezirk  gericht_us_bundesbezirk_amtsrichter  gericht_us_fisc  gericht_us_supreme_court  gesellschaft_kontrolle_steuerung  gesetz_us_1verfassungszusatz  gesetz_us_4verfassungszusatz  gesetz_us_5verfassungszusatz  gesetz_us_calea  gesetz_us_coica_pipa  gesetz_us_ectra_usc18_2703  gesetz_us_espionage  gesetz_us_fisa  gesetz_us_foia  gesetz_us_patriot_act  gesetz_us_privacy_act  gesetz_us_rea_frcrmp_rule41  gesetz_us_sca  gesetz_us_wiretap_act_usc18_2511  internet_alternativ_p2p_dezentral  internet_dienst_anbieter  internet_dienst_dns  internet_dienst_voip  internet_regulierung  internet_soznetz_facebook  internet_soznetz_twitter  internet_zugang_anbieter  itsicherheit_botnetz_c&c  itsicherheit_exploit_flaw  itsicherheit_malware_spyware  itsicherheit_strategie  kriminalität_cracker_blackhat  krypto_backdoor  krypto_crypto_war  krypto_entschlüsselung  krypto_entschlüsselung_zwang  krypto_regulierung  krypto_verschlüsselung  krypto_verschlüsselung_datenträger  krypto_verschlüsselung_kommunikation  krypto_verschlüsselung_transport  land_deutschland  land_europa  land_nordkorea  land_usa  medien_presse_ap  medien_presse_desinformation  medien_presse_gatekeeperfilter  medien_presse_informantenschutz  medien_presse_investigativ  medien_presse_nachrichtenagentur  medien_presse_nyt  medien_presse_propaganda  medien_presse_recherche  militär_allg_bewaffneter_konflikt  militär_allg_infiltration_tech  militär_allg_kriegsführung_irregulär  militär_allg_kriegsverbrechen  militär_allg_spezialeinheit  militär_allg_verdeckte_operation  militär_us_jsoc_socom_special_forces  ngo_aclu  ngo_eff  ngo_epic  ngo_wikileaks  partei_us_demokraten  partei_us_republikaner  polizei_iacp  polizei_us_nypd  privatsphäre  recht_berufsgeheimnisträgerschutz  recht_eu_vo_dsgvo  recht_geheim_verdeckt  recht_grundrecht_pressefreiheit  recht_grundrecht_rechtsschutz  recht_interpretation  recht_legalisierung  recht_menschenrecht_folterverbot  recht_menschenrecht_unschuldsvermutung  recht_rechtshilfe  recht_richtervorbehalt  recht_strafrecht_aussageverweigerung  recht_strafrecht_freiheitsentzug  recht_urheberrecht_drm  recht_völkerrecht  recht_whistleblowing  recht_whistleblowing_informantenschutz  recht_willkür  sicherheitsarchitektur  software_chat_messenger_voip  software_krypto_truecrypt_veracrypt  staat_aufstandsbekämpfung  staat_geheimnisverrat  staat_gezielte_tötung_exekution  staat_politik_aktionismus_symbolisch  staat_politik_desinformation  staat_politik_diplomatie  staat_politik_geheimhaltung  staat_politik_informell_mou_moa  staat_propaganda_itsicherheit  staat_propaganda_kinderpornografie  staat_propaganda_krieg  staat_propaganda_kriminalität_terrorismus  staat_propaganda_krit_infrastruktur  staat_propaganda_rechtspositivismus  staat_propaganda_sicherheit  staat_propaganda_sicherheit_going_dark  staat_propaganda_staatswohl_staatsräson  staat_propaganda_transparenz  staat_repression_einschüchterung  staat_repression_medien_presse  staat_repression_ngo_kriminalisierung  staat_repression_verschleppung  staat_repression_whistleblower  tech_hw_chip_geo  tech_hw_mobilfunk_gerät  terror_bekämpfung  uas_ugv_killer_laws  unternehmen_allg_bank  unternehmen_allg_itk_netz  unternehmen_allg_lobbyismus  unternehmen_allg_medienindustrie  unternehmen_att  unternehmen_boeing_drt  unternehmen_british_telecom  unternehmen_hushmail  unternehmen_lavabit  unternehmen_level3_communications  unternehmen_sprint  unternehmen_telekom  unternehmen_textron_cessna  unternehmen_verizon  unternehmen_yahoo  us_cnci  us_kongress  us_kongress_house_geheimdienstausschuss  us_kongress_house_kontrollausschuss  us_kongress_house_rechtsausschuss  us_kongress_senat_geheimdienstausschuss  us_kongress_senat_rechtsausschuss  us_ministerium_außen  us_ministerium_außen_usaid  us_ministerium_verteidigung  us_nofly_liste  us_nsc  us_regierung  us_regierung_eo12333  us_regierung_fbo  us_regierung_fcc  us_regierung_federal_register  us_sar_programm  us_selectee_ssss_liste  zensur_infrastruktur  zensur_internet  zensur_internet_web  zensur_presse_medien  zensur_selbstzensur  zensur_staat  überwachung_abhörschnittstelle  überwachung_abhörschnittstelle_penregister_traptrace  überwachung_abhörsystem_us_tia  überwachung_abhörsystem_us_tsp_psp  überwachung_backdoor_hardware  überwachung_backdoor_software  überwachung_chat_telefonie_voip  überwachung_chilling_effect  überwachung_demonstration_großereignis  überwachung_finanzen  überwachung_flugpassagier  überwachung_identifizierung_gruppe  überwachung_identifizierung_itk_nutzer  überwachung_int_finint  überwachung_int_osint_socmint  überwachung_int_sigint_comint  überwachung_internet_email  überwachung_internet_p2p  überwachung_internet_trafficanalyse  überwachung_itforensik  überwachung_itk_bestandsdaten  überwachung_itk_inhaltsdaten  überwachung_itk_netzknoten  überwachung_itk_netzwerkleitung  überwachung_itk_verkehrs_metadaten  überwachung_kunden  überwachung_kunden_kundenkarte  überwachung_lokalisierung_bewegung  überwachung_massenkontrolle  überwachung_medien_presse  überwachung_mobilfunk  überwachung_mobilfunk_imsi_catcher  überwachung_ngo_npo  überwachung_onlinedurchsuchung  überwachung_person_gefährder  überwachung_person_identifizierung  überwachung_person_kontakt_begleit  überwachung_person_profil  überwachung_präventiv  überwachung_sozialerkontext  überwachung_stadt  überwachung_verhalten  überwachung_video_widearea  überwachung_vorratsdaten_itk_inhalt  überwachung_vorratsdaten_itk_meta  überwachung_vorratsdaten_quick_freeze  überwachung_vorratsdaten_sozialdaten 

Copy this bookmark: