Edward Snowden: “Your computer is getting US property

Edward Snowden: A photo from open sources

In the latest issue of the German weekly Spiegel published an interview with fugitive CIA officer Edward Snowden. (1) Absentee interview with Snowden using encrypted Jacob Appelbaum (2) and Laura Poitras took correspondence. (3) How approved in a published comment, an interview took place yet while Snowden was living in Hawaii. Jacob Appelbaum (born 1983) is a software developer for security and encryption of electronic correspondence. Appelbaum trains international human rights defenders and journalists on the anonymous use of the Internet. For the first time became widely known to the public in 2010 when on New York Hacker Conference spoke on behalf of the founder WikiLeaks Julian Assange. Together with Assange and other co-authors Appelbaum recently released in the form of a book a collection of interviews under The title “Cyberpunk. Freedom and the future of the Internet.” In sight U.S. authorities Appelbaum hit during their investigation WikiLeaks activities. Twitter, Google and Sonic got official order of the authorities to transmit to them information about his accounts. Appelbaum himself describes his relationship with WikiLeaks as “ambiguous.” Appelbaum himself so reports on the circumstances Interview with Snowden: “In mid-May, documentary filmmaker Laura Poytras contacted me. She told me that she made contact with a possible anonymous source from the National Agency security who agreed to give her an interview … She suggested ask questions together because I thought some questions on a purely technical topic could be an important part of the process validation of the source. One of the tasks was to determine: Are we really dealing with an NSA whistleblower … We sent our securely encrypted questions to our source. At I had no knowledge of the identity of Edward Snowden before he was revealed to the world in Hong Kong. He also did not know who I was. I expected that when anonymity is removed, we will find a person in sixty years old … Published questions are taken from a large an interview that addresses numerous topics, many of which are purely technical in nature. Some of the questions were rewritten to provide the necessary context. Questions focused almost exclusively on NSA capabilities and events held by him. It is important to understand that these issues and the context is not a reaction to this week’s events or even to events of this month. They were offered in relatively calm. the period when Snowden most likely enjoyed the latter minutes of your life in a Hawaiian paradise. He abandoned paradise so that every person on the planet could come to understand the current situation, like him … At a later stage, I also had direct contact with Edward Snowden in which I showed him my own identity. At that time, he expressed his readiness and feelings for this the topic was published when I thought it was time. “Edward Snowden Interview: NSA and its volunteer assistants Interviewer: What is the purpose of the US National Security Agency (NSA), and how does its work compare with the scope of the law? Snowden: He is entrusted with learning everything important that happens behind outside of the united states. This is a serious challenge. When is it done and the situation looks the way it is, it is existential the crisis. Then you feel that breaking the rules is the norm. Once people hate you for breaking these rules, scrapping them becomes a matter of survival. Interviewer: Are German involved authorities or German politicians in the NSA intelligence system? Snowden: Yes, of course. We are in the same bed with the Germans as we are with most other western countries. For example, we warn them that the person we need is flying through their airports. We to for example, the suspect hacker’s girlfriend found out about it through the phone in a completely unrelated third country. And they pass it us. They do not ask how we learned anything. Vice versa [lat. vice versa] to protect their political leaders from understanding how much they violate global privacy. Interviewer: But if the details of this system are now known, who will carry responsibility? Snowden: In the face of US courts? I’m not sure you are serious. The investigation will identify specific people who authorized the unauthorized wiretapping of millions and millions messages that, if counted, would lead to the longest sentences in world history. But our top official would just require the investigation to be stopped. Who “may” be fined when the rule of law does not respected. Laws are for you, not for them. Interviewer: Does the NSA collaborate with other states such as Israel? Snowden: Yes. All the time. NSA has a special body, responsible for this: FAD – Directorate for Foreign Affairs. Interviewer: Did the NSA help create Stuxnet? Stuxnet is a virus a computer worm that was used against an Iranian nuclear programs. Snowden: The NSA and Israel co-wrote this program. Interviewer: Are there any large programs in operation electronic espionage in which international partners provide NSA help? Snowden: In some cases, the so-called partners five eyes [US, UK, Canada, Australia and New Zealand] go beyond what the NSA itself does. For instance, The British Government Communications Center (GCHQ) has a system which is called Tempora. For electronic intelligence services in the world Tempora is the first program to fully capture the Internet buffer, which is completely not concerned about the type of content and only little attention to the Human Rights Act. She swallows everything into the current buffer to allow reverse examination, not missing a single bit. The buffer may now contain a three-day traffic, but the system is improving. Three days don’t seem to mean a lot, but remember that this is not metadata. Full capture means that she does not miss anything, but swallows everything circulating completely. If you send a single ICMP packet [Internet protocol, ie data block], and the routes will go through UK, we will get it. If you download something and CDN (content delivery) occurs from a service located in Britain, we get it. If a London clinic is undergoing medical records about your sick daughter … Well, you get the idea. Interviewer: Is there a way around this? Snowden: General rule, until as long as you have any choice whatsoever, you should never under no circumstances route through or peek into the UK. Their fibers are “radioactive”, and even all sorts of nonsense will be captured. Interviewer: Do NSA and his partners around the world a complete collection of telephone calls, texts and data? Snowden: Yes. But how much can they get, depends on the capabilities of individual collection sites. I.e, some circuits have a wide channel, but small selection systems, therefore, they must be selective. This is more of a problem for foreign collections, but not for American, which makes the internal collection is so terrifying. NSA is not limited by power, space and available equipment. Interviewer: NSA Creates Utah’s huge new data center. What is his destination? Snowden: Datastore storage. Interviewer: How How long is the collected data stored? Snowden: As of the present moment, a complete capture meeting is growing rapidly (in a few days) regardless of whether the analyst is “tasked” or connected. Received data is stored “forever” regardless of policy. because that you can always be refused. Metadata also increase, although not so fast. NSA wants to be at the point where, at least all metadata is permanently stored. In most cases the content is not as valuable as the metadata itself because you you can either retrieve data based on metadata, or if no, just set the task of all future communications, of interest to a permanent collection since metadata tell you that from the data stream you really want receive. Interviewer: Private companies help NSA? Snowden: Yes. Some evidence of this is the hardest part, because, According to the NSA, its telecommunications partners are pearls in the crown of her omniscience. Usually by American transnational corporations should not be trusted until proven otherwise. it sad because they have the ability to provide the best and the most trusted services in the world if they, in fact, wished to do it. To overcome this, civic organizations should use this exposure to push them to update their contracts, include in them the provisions that they do not spy on you, and they must make technical changes. If they can get at least one company for your game, it will forever change global communications security. If they don’t, it will be a significant start for the company. Interviewer: Are there any companies who refused to cooperate with the NSA? Snowden: Of course there, but I can’t provide any list. This category get a lot more if colaborants are punished consumers in the market. This should be a priority for everyone who believes in freedom of thought. Interviewer: Which Sites Should to avoid, so as not to be a “target” for the NSA? Snowden: Usually, you You can become a goal based, for example, on your Facebook or through content of web correspondence. One thing I personally know, forum participants on jihad is safe with regard to identification. Interviewer: What happens if the NSA makes the “target” of a network user? Snowden: They just get under control. Analyst will receive daily (or a scheduled summary based on filtering) a report that changed in the system. A captured packet cannot be understood without automated dissectors. That is all that remains to be done analytics. The target machine does not belong to her anymore, it belongs to to the US government. Sources: (1) Edward Snowden Interview: The NSA and Its Willing Helpers // http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html (2) http://en.wikipedia.org/wiki/Jacob_Appelbaum (3) http://en.wikipedia.org/wiki/Laura_Poitras

UK Time Life Israel USA

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: