miércoles, 1 de enero de 2014

Snowden-Enthüllungen: Überwacht werden auch Internet, Smartphones und der Zahlungsverkehr | ZEIT ONLINE

Snowden-Enthüllungen: Überwacht werden auch Internet, Smartphones und der Zahlungsverkehr | ZEIT ONLINE

 Snowden Everything you need for NSA scandal

Page 2/2:

Also be monitored Internet, smartphones and payments

British intelligence agency GCHQ also uses an extremely large data vacuum cleaner , specifically to the transatlantic fiber-optic submarine cables that handle most of the European data traffic in the U.S. and back. Tenses is called the monitoring program, here also about communication content such as emails or chats can be monitored. Who uses U.S. services such as Google or Yahoo, you must expect that his emails and search queries are recorded - this is true even if the connection is encrypted.

In the mobile Internet, the British want to attain a comparable position of power. Responsible for this is according to Spiegel , the department MyNOC (My Network Operations Centre), which specializes in infiltrating networks. She has, for example, the Belgian provider Belgacom and its service providers infiltrated with the developed by the NSA method "Quantum Insert" to gain access to roaming routers. So it is the unity possible to specifically monitor individual smartphones and perhaps even to control from a distance - so they transform into listening bugs.

As with the British, there are also at NSA programs for both mass levy of data as and for specific missions: Does the NSA specific user data requested them that the secret FISA court, which in turn U.S. companies like Google, Facebook, Microsoft, Yahoo and others for the publication of the data and to secrecy about it. Prism is called the monitoring program, the name is sometimes become synonymous with the entire surveillance scandal, but is only a small part of the system. Other (sub) programs for data collection and analysis hot XKeyscore , Blarney, Marina, Oakstar, Fairway, Stormbrew, Boundless informant, Bullrun and Dropmire.

As part of the "Muscular" program , the NSA concerned, however, hundreds of millions of users data and content from Google and Yahoo customers without informing the company about it. Together with the British taps into U.S. intelligence to the fiber-optic lines, through which the international centers of the two companies are related. This form of monitoring is not specifically - here no needle in the haystack is searched, here a haystack is created.

Over 50,000 networks around the world, the NSA hackers unit is to TAO (Tailored Access Operations) a placed malicious software have to monitor communications. What is it for networks is unclear. Would be conceivable by providers and other telecommunications companies.

According to Reuters research, the NSA has the company RSA paid ten million U.S. dollars , so it's secure software provides Bsafe with a self-co-developed by the NSA and non-secure random number generator for encryption.

Other points of attack:

The reactions in the U.S.: An officially independent group of experts has taken the practices of the NSA under the microscope and has the U.S. president 46 amendments submitted. Among other things, they propose to let the NSA future conduct of a civilian boss instead of a general, to better protect the data of Europeans against access by the NSA, only make the massive collection of telephone connection data of all Americans on corporate servers, rather than all the to leave NSA itself and reform the secret Foreign Intelligence Surveillance Court meets on court (Fisc). However, the proposals are not binding. U.S. President Barack Obama will decide in January whether and how he intends to implement them.

The supreme intelligence coordinator has thousands of documents released to provide more transparency, but they are blackened in many places.

The Inspector General of the Intelligence Charles McCullough said in November that he could not telephone and Internet surveillance by the NSA - as called for by Congress - to investigate. He did not have the resources for it.

An American federal court in December, the massive collection of telephone directories in the United States by the NSA as unconstitutional likely classified. The U.S. government can still appeal against the judgment.

In Germany: The Federal Government has only reacts sharply to the revelations, when it was clear that the Chancellor is a target of the NSA. Angela Merkel called on U.S. President Barack Obama and demanded "clarification of the overall scope" of the U.S. espionage in Germany . Foreign Minister Guido Westerwelle summoned the U.S. ambassador. The Federal Government and the United States are now working on a no-Spy Agreement . But that will not preclude mutual monitoring, reports Der Spiegel . An initial draft bear the title of "cooperation agreement".

The Attorney General had first introduced an observation process for the monitoring of Merkel cell phone , Federal Attorney General Harald Range but hinted now that he will open a formal investigation against NSA Director Keith Alexander. According Strafprozesordnung can "of the Federal Attorney General, waive the prosecution of criminal offenses" if this would create a risk of "serious handicap for the Federal Republic of Germany". In this passage refers to Range apparently. Funk In Germany he said : ". I am aware that even the institution of judicial proceedings in the political and diplomatic fields could be a very serious message"

Also, because of the possible systematic monitoring of internet and telephone traffic in Germany Range will not initiate proceedings. Previously published by the media Snowden documents were "not suitable without further notice" to prove illegal activities by the NSA in Germany.

International level: The EU parliament passed a resolution , prompted by the EU Commission and the Council of Ministers to suspend the Swift agreement. It allows the U.S. government to retrieve the account data of European citizens under certain conditions. Occasionally there are also voices in Parliament and the Member States to suspend negotiations for the free trade agreement with the U.S.. The future black-red federal government only wants to renegotiate the agreement according to the coalition agreement. The EU Commission rejects the suggestion of the European Parliament and wants neither Swift nor the PNR agreement with the U.S. to stop.

The UN General Assembly has a resolution on the protection of privacy adopted. The resolution goes back to a push by Germany and Brazil and is a direct response to the espionage of the U.S. secret NSA. However, the resolution was weakened under pressure from the U.S. and the other members of the Five Eyes in advance .

Campaigns, appeals and open letters: 300 civil rights organizations from 100 countries challenge you to support a campaign to a global right to data protection and privacy, and compliance with international standards for the application of human rights to the interception of communications , the so-called "13 Principles" , calls.

560 writers from around the world, including several Nobel literature have, in 32 newspapers a joint appeal published in defense of "democracy in the digital world". You "remember the presumption of innocence as a central achievement of our civilization and appeal to the United Nations to adopt an International Convention of digital rights".

Google, Facebook, Microsoft, Apple, AOL, LinkedIn, Yahoo and Twitter demand in an open letter to the U.S. President that the control of the intelligence needed to be reformed. They require independent courts and more transparency, new laws and targeted, non-coverage monitoring.