FBI wants to access your online etc.

Well, once you signed up that you agreed to shut your mouth, you will get in trouble for not shutting your mouth. No difference from other agencies like CIA, military, etc. That's why he's hiding (because he violated the contract). He knows but he doesn't give a **** because he doesn't like what his ex-employer is doing. Reba, he's real since his ex-employer said so.
 
... Reba, he's real since his ex-employer said so.
I didn't mean that he doesn't exist but that he may not be exactly what he seems to be. For example, he lied about his income. He might have lied about his access, his sources, his motives, his plans, etc. Did everything really happen the way he said it did? :dunno: We really don't have the whole story, and something seems "off" about it.
 
Well, once you signed up that you agreed to shut your mouth, you will get in trouble for not shutting your mouth. No difference from other agencies like CIA, military, etc. That's why he's hiding (because he violated the contract). He knows but he doesn't give a **** because he doesn't like what his ex-employer is doing. Reba, he's real since his ex-employer said so.

I'm sure he didn't agree to hide illegal government activity. It's why we have the Whistleblower Protection Act of 1989

It "is a United States federal law that protects federal whistleblowers who work for the government and report agency misconduct."
 
Breaking News

FBI, NSA and others are in a hearing now to discuss how NSA helped FBI to prevent 50 terror plots since 9/11. Wow, if without NSA, ALOT of Americans (maybe including you) would be dead eventually.
 
FBI, NSA and others are in a hearing now to discuss how NSA helped FBI to prevent 50 terror plots since 9/11. Wow, if without NSA, ALOT of Americans (maybe including you) would be dead eventually.

No one said to get rid of the FBI or the NSA. For myself I'll take the increased risk and keep my rights thank you. And we all die "eventually"
 
FBI, NSA and others are in a hearing now to discuss how NSA helped FBI to prevent 50 terror plots since 9/11. Wow, if without NSA, ALOT of Americans (maybe including you) would be dead eventually.

it's called an exaggeration.
 
snowden have to prepare in future, since he can not go to america. i dont know what await for him...for me he is hero, because no matter what, which country is, they dont have the right to spy on us. they should discuss with us, behind the back is not good, otherwise i would feel betrayed by own ( okay i´m in germany, but big internet-business belong to US,so i´m insolved as well) country or people. there ist no privat, unless we talk person in person, and not over the internet :(
 
block NSA spy agents? ha..

Worried Who’s Watching Your Web Browsing? Adafruit’s Onion Pi Tor Proxy Project Creates A Private, Portable Wi-Fi Access Point | TechCrunch
onionpi.jpg
 
NSA spy agents can view your Videophone?...

*deleted link address has been removed*
 
Last edited:
snowden have to prepare in future, since he can not go to america. i dont know what await for him...for me he is hero, because no matter what, which country is, they dont have the right to spy on us. they should discuss with us, behind the back is not good, otherwise i would feel betrayed by own ( okay i´m in germany, but big internet-business belong to US,so i´m insolved as well) country or people. there ist no privat, unless we talk person in person, and not over the internet :(

Well, for all you fans of your "hero" - this is hardly something only one country does. It's the way of politics and governments the world over. So if you don't like what's happening in your country...move...and good luck at there in the arctic.

How Britain spies on friends and rivals alike
  • inShare
FE_PR_080923associatedpress120x31.jpg

By RAPHAEL SATTER, Associated Press
LONDON (AP) — Former NSA contractor Edward Snowden's leaks to the Guardian newspaper have thrown back the curtain on the world of diplomatic espionage, revealing — in explicit detail — how British spies monitor enemies and allies alike. So what does GCHQ, Britain's eavesdropping agency, actually do? And how does it do it? And is any of this really all that surprising?
—GCHQ targets phone calls, emails, and more
Documents quoted by the Guardian newspaper showed that GCHQ engaged in an aggressive espionage campaign against foreign diplomats, attacking their phones, their emails, and even satellite communications in a bid to give senior British leaders a real-time account of who was saying what to whom. For the first time, the newspaper aired evidence that Britain launched cyberattacks against foreign diplomats, using malicious software to steal passwords, eavesdrop on emails, and apparently even hack smartphones. The Guardian said that during the 2009 G-20 summit in London information was being gathered so quickly that a team of 45 analysts monitored the interplay of delegates' phone calls live on a 15 square meter (18 square yard) video wall of GCHQ's operations center.
—GCHQ targets enemies and allies alike
It seems logical to spy on the Russians, whose relations with Britain have long been rocky. But the Guardian says Britain also targeted South Africa and Turkey. The paper quoted one leaked document as saying that, with respect to Turkey, the analysts' "reporting requirements" were to ascertain Ankara's attitudes toward financial regulation and reform, as well as Turkish "willingness (or not) to co-operate with the rest of the G20 nations."
Why not just ask?
"No allies have 100 percent unity. There are always disputes, differences of opinion, and emphases," said William Keylor, a professor of history and international relations at Boston University. He said that knowing the mind of your negotiating partner can help you better tailor your offers or prompt you to drive a harder bargain.
Or, as his Boston University colleague Joseph Wippl put it in an email, "If you know through intelligence the bottom line of the negotiating position of your adversary, you will get a better deal — on Syria, or your car."
—None of this should come as any surprise
Spying on diplomats is as old as diplomacy itself, and the specter of electronic surveillance has hung over international meetings for the better part of the past century. In 1945, Soviet dictator Joseph Stalin received daily digests of Americans' conversations from bugged meeting rooms at the Yalta Conference. Rhodesian leader Ian Smith insisted on huddling with his advisers in the women's toilets when he visited London in 1965 because he was convinced that was the one place British spies would not have dared to install listening devices, according to an account published in Richard J. Aldrich's book, "GCHQ."
Keylor said that at a 1974 arms control summit in Vladivostok, U.S. President Gerald Ford led his shivering delegation into sub-zero temperatures outside to discuss their negotiating strategy out of range of Soviet microphones.
More recently, U.S. spies are alleged to have targeted U.N. Security Council delegates in the run-up to the 2003 invasion of Iraq.
Aldrich said in a telephone interview that it was no surprise that spooks spy on diplomats, although he was quick to add that when such spying comes to light, "it really, really annoys the intelligence agencies — and it really, really, really annoys the countries that are targets."
Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.





Pentagon: Chinese government hacking into US computers


By Jennifer Martinez - 05/07/13 09:54 AM ET

The Pentagon is directly accusing the Chinese government and military of cracking into U.S. government computer systems to steal valuable intelligence.








The Pentagon's claims, outlined in a report published on Monday, mark the strongest comments made to date by the U.S. military about the Chinese government launching cyberattacks against U.S. government computers.

The report said the attacks were aimed at culling intelligence about industrial base sectors that support U.S. defense programs. That intelligence could potentially be used to benefit China's defense and high-tech industries and help Chinese military planners spot "related military capabilities that could be exploited during a crisis," according to the report. "In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military," the report reads. "These intrusions were focused on exfiltrating information."
In the previous year's report, the Pentagon said many of the cyberintrusions against U.S. government-owned computer systems and American companies "originated within China," but stopped short of directly attributing those attacks to the Chinese government and military.
While China's cyberspying and theft of valuable data "is a serious concern," the Pentagon also noted in its recent report that "the accesses and skills required for these intrusions are similar to those necessary to conduct computer network attacks."

The Chinese Embassy in Washington could not be reached for comment. In a story about the report, China's state-run news service Xinhua said a Chinese military expert called the Pentagon's claims "groundless accusations," arguing that they could harm the trust between the two countries.

The White House has been hesitant to point fingers at the Chinese government for cyberattacks launched against the U.S. government and American companies, but has sharpened its tone to Beijing in recent months. The strongest comments from the Obama administration have come from Tom Donilon, the president's national security adviser.

In a March speech, Donilon urged China to acknowledge the "urgency and scope" of cyberattacks against U.S. computer systems stemming from hackers based within their borders. Donilon urged China to take "serious steps" to stop the hackers, though he did not accuse the Chinese government of being responsible for the attacks.

Reports of Chinese hacker attacks against U.S. companies have grabbed headlines this year. Information security firm Mandiant released a report earlier this year that said more than 100 U.S. companies have been targeted by an elite Chinese hacking unit based in Shanghai.



http://ec.tynt.com/b/rf?id=bNYbpAvBir4Pxiacwqm_6l&u=TheHill
 
Well, for all you fans of your "hero" - this is hardly something only one country does. It's the way of politics and governments the world over. So if you don't like what's happening in your country...move...and good luck at there in the arctic.
Oh well... BTW, good job! All I can say is that internet is too powerful. Want privacy? Don't use internet! (or move to the arctic as you said) :laugh2:
 
LONDON — British spies are running an online eavesdropping operation so vast that internal documents say it even outstrips the United States' international Internet surveillance effort, the Guardian newspaper reported Friday.
The paper cited British intelligence memos leaked by former National Security Agency contractor Edward Snowden to claim that U.K. spies were tapping into the world's network of fiber optic cables to deliver the "biggest internet access" of any member of the Five Eyes – the name given to the espionage alliance composed of the United States, Britain, Canada, Australia, and New Zealand.
That access could in theory expose a huge chunk of the world's everyday communications – including the content of people's emails, calls, and more – to scrutiny from British spies and their American allies. How much data the Brits are copying off the fiber optic network isn't clear, but it's likely to be enormous. The Guardian said the information flowing across more than 200 cables was being monitored by more than 500 analysts from the NSA and its U.K. counterpart, GCHQ.
"This is a massive amount of data!" the Guardian quoted a leaked slide as boasting. The paper said other leaked slides, including one labeled "Collect-it-all," gave hints as to the program's ambition.
"Why can't we collect all the signals all the time?" NSA chief Lt. Gen. Keith Alexander was quoted as saying in another slide. "Sounds like a good summer project for Menwith" – a reference to GCHQ's Menwith Hill eavesdropping site in northern England.
The NSA declined to comment on Friday's report. GCHQ also declined to comment on the report, although in an emailed statement it repeated past assurances about the legality of its actions.
"Our work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary, and proportionate," the statement said.
The Guardian, whose revelations about America and Britain's globe-spanning surveillance programs have reignited an international debate over the ethics of espionage, said GCHQ was using probes to capture and copy data as it crisscrossed the Atlantic between Western Europe and North America.
It said that, by last year, GCHQ was in some way handling 600 million telecommunications every day – although it did not go into any further detail and it was not clear whether that meant that GCHQ could systematically record or even track all the electronic movement at once.

Fiber optic cables – thin strands of glass bundled together and strung out underground or across the oceans – play a critical role in keeping the world connected. A 2010 estimate suggested that such cables are responsible for 95 percent of the world's international voice and data traffic, and the Guardian said Britain's geographic position on Europe's western fringe gave it natural access to many of the trans-Atlantic cables as they emerged from the sea.
The Guardian said GCHQ's probes did more than just monitor the data live; British eavesdroppers can store content for three days and metadata – information about who was talking to whom, for how long, from where, and through what medium – for 30 days.
The paper quoted Snowden, the leaker, as saying that the surveillance was "not just a US problem. The U.K. has a huge dog in this fight ... They (GCHQ) are worse than the U.S."
Snowden, whose whereabouts are unknown, faces the prospect of prosecution in the United States over his disclosures, and some there have called on him to be tried for treason. Snowden has expressed interest in seeking asylum in Iceland, where a local businessman said he was prepared to fly the leaker should he request it.
Attempts by The Associated Press to reach Snowden have so far been unsuccessful.
 
Back
Top