Posted by: Chuck | June 9, 2013

BREAKING NEWS FOR YOU – the world situation


Obama orders US to draw up overseas target list for cyber-attacks Top-secret directive steps up offensive cyber capabilities to ‘advance US objectives [corpora-terrorism] around the world’ – Directive also contemplates the possible use of cyber actions inside the US

07 Jun 2013 Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”. The directive also contemplates the possible use of cyber actions inside the US, though it specifies that no such domestic operations can be conducted without the prior order of the president, except in cases of emergency.

Obama tells intelligence chiefs to draw up cyber target list – full document text

07 Jun 2013 An eighteen-page presidential memo reveals how Barack Obama has ordered intelligence officials to draw up a list of potential overseas targets for US cyber attacks.

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

07 Jun 2013 The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post. The program, code-named PRISM, has not been made public until now. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube, and Apple.” London’s Guardian newspaper reported Friday that GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. (Previously: U.S. intelligence mining data from nine U.S. Internet companies in broad secret program 06 Jun 2013.)

NSA slides explain the PRISM data-collection program

07 Jun 2013 Through a top-secret program authorized by federal judges working under the Foreign Intelligence Surveillance Act (FISA), the U.S. intelligence community can gain access to the servers of nine Internet companies for a wide range of digital data. Documents describing the previously undisclosed program, obtained by The Washington Post, show the breadth of U.S. electronic surveillance capabilities in the wake of a widely publicized controversy over warrant less wiretapping of U.S. domestic telephone communications in 2005.

NSA whistleblowers say agency casts wide net  Former NSA employee: NSA collects records on 3 billion calls per day

 06 Jun 2013 Former employees of the National Security Agency say the publishing of a court order asking Verizon to hand over all its phone calling records for a three-month period opens a new window on an operation that has been in place for years and involves all major U.S. phone companies. “NSA has been doing all this stuff all along, and it’s been all these companies, not just one” William Binney told news program Democracy Now! on Thursday. “They’re just continuing the collection of this data on all U.S. citizens.” Binney, who worked at the NSA for almost 40 years, left the agency after the attacks of 9/11 because he objected to the expansion of its surveillance of U.S. citizens.

America’s surveillance state: anger swells after data revelations

06 Jun 2013 The scale of America’s surveillance state was laid bare on Wednesday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years. After the revelation by the Guardian of a sweeping secret court order that authorized the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued. Former vice-president Al Gore described the “secret blanket surveillance” as “obscenely outrageous”.

Dept. of Homeland Security: Laptops, Phones Can Be Searched Based on Hunches

05 Jun 2013 U.S. border agents should continue to be allowed to search a traveler’s laptop, cell phone or other electronic device and keep copies of any data on them based on no more than a hunch, according to an internal Homeland Security Department study. It contends limiting such searches would prevent the U.S. from detecting child pornographers or terrorists and expose the government to lawsuits. The 23-page report was obtained by The Associated Press and the American Civil Liberties Union under the U.S. Freedom of Information Act.

Advertisements

Responses

  1. I’m gone to convey my little brother, that he should also visit this blog on regular basis to obtain updated from most up-to-date information.


Categories

%d bloggers like this: