I&A-Foia-Request-Log-Fy2014.Pdf.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

I&A-Foia-Request-Log-Fy2014.Pdf.Pdf A B C D 1 Request ID Requester Name Request Description Received Date 2 2014-IAFO-00001 (b) (6) Request for records regarding himself. 10/2/2013 3 2014-IAFO-00002 (b) (6) Request for records regarding himself. 10/17/2013 2014-IAFO-00003 (b) (6) Request for correspondence from former US Rep. Curt Weldon. on Nov. 18th 2005, 10/21/2013 4 pertaining to, Able Danger. 2014-IAFO-00004 Morisey, Michael Request for records regarding assigning fee categories for requests filed by the website 10/17/2013 5 MuckRock.com. 6 2014-IAFO-00005 Smathers, Jason Request for all FOIA requests made in fiscal year 2013. 10/21/2013 2014-IAFO-00006 Hodai, Beau Request for records regarding currently active contracts between DHS 10/17/2013 7 offices/components and Booz Allen Hamilton. 2014-IAFO-00007 Hodai, Beau Request for records from January 1, 2011 through October 2, 2013) regarding any/all 10/17/2013 work products delivered to I&A by any employee or representative of Booz Allen 8 Hamilton 2014-IAFO-00008 Hodai, Beau Request for records (generated from January 1, 2010 through October 2, 2013) 10/17/2013 regarding: Wikileaks (or "Wiki Leaks") Julian Assange Electronic Frontier Foundation (or "EFF") Anonymous (a "hacktivist" group known as "Anonymous") Lulzsec Ant isec . 9 2014-IAFO-00009 Hodai, Beau Request for records regarding Corrections Corporation of America (CCA) -- Geo Group -- 10/17/2013 Management and Training Corporation (MTC) -- Emerald Correctional Management. 10 11 2014-IAFO-00010 (b) (6) Request for records regarding himself. 10/18/2013 2014-IAFO-00011 Hill, Melissa Request for FBI-DHS Joint Intelligence Bulletins released between 2002-2013. 10/18/2013 12 13 2014-IAFO-00012 (b) (6) Request for records regarding himself. 10/21/2013 14 2014-IAFO-00013 (b) (6) Request for records regarding himself. 10/18/2013 2014-IAFO-00014 Leopold, Jason Request for records regarding the processing FOIA request number 13-OIA-0080. 10/22/2013 15 16 2014-IAFO-00015 (b) (6) Request for records regarding himself. 10/28/2013 17 2014-IAFO-00016 (b) (6) Request for irecords regarding herself. 10/22/2013 2014-IAFO-00017 Morisey, Michael Request for all responses sent to Congressional committees between above date range. 10/3/2013 (Date Range for Record Search: From 01/01/2008 To 10/03/2013) 18 19 2014-IAFO-00018 (b) (6) Request for records regarding himself. 10/30/2013 20 2014-IAFO-00019 (b) (6) Request for records regarding himself. 1/28/2014 2014-IAFO-00020 Smathers, Jason Request for records regarding the animated TV show "Agents of S.H.I.E.L.D." All 11/3/2013 communications between the agency and ABC (American Broadcasting Company), Joss Whedon and/or the production team of the animated TV show "Agents of S.H.I.E.L.D." 21 A B C D 2014-IAFO-00021 Smathers, Jason Request for all eamils to and from an I&A contract employee, sent on 10/31/13. 11/1/2013 22 2014-IAFO-00022 Smathers, Jason Request for paper or electronic calendars kept by a specific contract employee; to-do 11/1/2013 lists of same contract employee; phone log for same contract employee. 23 2014-IAFO-00023 Smathers, Jason Request for contracts, MOU, and MOA between Advanced Government Solutions (AGS), 11/1/2013 24 Inc. and the DHS OIA. 2014-IAFO-00024 Request for records regarding the physical position of a specific telephone number 10/18/2013 25 (b) (6) 26 2014-IAFO-00025 (b) (6) Request for records pertaining to (b) (6) . 11/8/2013 2014-IAFO-00026 Request the objectives and mission statement of the program "Operation Vigilant Eagle." 11/14/2013 27 ( 28 2014-IAFO-00027 (b) (6) Request for records regarding himself. 11/25/2013 2014-IAFO-00028 (b) (6) Request for contracts, MOU's, Purchase agreements, etc. between the federal 11/26/2013 government and third parties, with various companies providing consumer data; I&A training documents pertaining to collection and analysis of onsumer data; douments pertaining to data breaches of consumer data; data retention policies; list of commercial aggregators DHS has a relationship with. 29 30 2014-IAFO-00029 Smathers, Jason Request for records regarding Amazon commercial drones 12/4/2013 2014-IAFO-00030 Musgrave, Shawn Request for training records used in connection with new employees of the Office of 3/13/2014 31 Intelligence and Analysis, from 01/01/2012 To 12/04/2013) 2014-IAFO-00031 Request for records regarding himself or company, Projectheureka, LLC. 12/6/2013 32 (b) (6) 33 2014-IAFO-00032 (b) (6) Request for records regarding himself. 11/19/2013 34 2014-IAFO-00033 (b) (6) Request for records regarding himself. 11/1/2013 35 2014-IAFO-00034 (b) (6) Request for records regarding appeal of his Immigration Status. 11/7/2013 2014-IAFO-00035 Musgrave, Shawn Request for a copy of the report on airspace restrictions for use of unmanned aerial 1/24/2014 vehicles along the border of the United States and Mexico, (Date Range for Record 36 Search: From 10/01/2011 To 09/30/2012) 2014-IAFO-00036 Smathers, Jason Request for records concerning DHS' employment of persons whom are known to have 12/13/2013 committed criminal offenses and DHS' policy on such employment. (Date Range for Record Search: From 01/20/2009 To 12/13/2013) 37 2014-IAFO-00037 Ravnitzky, Michael Request for records listing the titles of Office of I&A studies produced during Calendar 12/16/2013 Year 2010. (Date Range for Record Search: From 01/01/2010 To 12/31/2010) 38 39 2014-IAFO-00038 Smathers, Jason Request for budget requests. 11/4/2013 40 2014-IAFO-00040 Smathers, Jason Request for electronic copy of I&A sharepoint site. 12/19/2013 41 2014-IAFO-00041 (b) (6) Request for records regarding himself. 12/20/2013 A B C D 42 2014-IAFO-00042 (b) (6) Request for records regarding DHS cyber vulnerabilities 12/20/2013 2014-IAFO-00043 Request for records from DHS pertaining to the database known as "Main Core." 12/31/2013 43 (b) (6) 44 2014-IAFO-00044 (b) (6) Request for records pertaining to anarchists/anti-capitalists. 7/30/2014 45 2014-IAFO-00045 (b) (6) Request for records pertaining to animal rights activists 46 2014-IAFO-00046 (b) (6) Request for records pertaining to environmental activists. 47 2014-IAFO-00047 (b) (6) Request for records regarding himself. 1/2/2014 2014-IAFO-00048 Smathers, Jason Request for a copy of all documents pertaining to DHS Watchlisting Enterprise Working 11/27/2013 Group, that took place on Wednesday, October 23, 2013 at NAC18 02-202. 48 2014-IAFO-00049 Smathers, Jason Request for records regarding the meeting that took place on Thursday, October 24, 11/27/2013 2013 via teleconference concerning the New Chief of Privacy Offcer Introduction 49 Meeting. 2014-IAFO-00050 Smathers, Jason Request for a copy of all documents pertaining to the Biweekly ILD/FOIA meeting that 1/16/2014 50 took place on Friday, October 29, 2013 at NAC19 01-125. 51 2014-IAFO-00051 Bauer, Shane Request for records relating to (b) (6) . 1/9/2014 2014-IAFO-00052 Center for Constitutional Request for information regarding the U.S. Immigration and Customs Enforcement 12/4/2013 agency (ICE) and DHS Detention Bed Mandate. 52 Rights 2014-IAFO-00053 Smathers, Jason Request for all emails received by DHS which were sent to (b) (6) 1/30/2014 between March 1, 2012 and the date this request is processed. 53 54 2014-IAFO-00054 O'Brien, Alexa Request for records regarding how I&A expedites requests. 11/13/2013 2014-IAFO-00055 (b) (6) Request for records regarding "criminal terrorist act" occuring on February 14-15, 2008 1/16/2014 after a Dead Prez hip-hop concert on the Evergreen State College Campus in Olympia, 55 Washington. 56 2014-IAFO-00056 (b) (6) Request for records regarding Dr. Nabi Raza Mir. 1/15/2014 2014-IAFO-00057 Dunagan, Sean Request for records regarding the reported arrest of seven members of the al-Nusra 1/15/2014 terrorist organization in Turkey on or about May 29, 2013; all records regarding, the reported seizure of 2 kilograms of sarin gas from members of the al-Nusra terrorist organization in Turkey on or about May 29, 2013. 57 2014-IAFO-00058 Smathers, Jason Request for records concerning the processing of FOIA request 14-IAFO-0023. 11/14/2013 58 2014-IAFO-00059 Ravnitzky, Michael Request a copy of each written response or letter from DHS to any of the following 2/4/2014 Members of Congress in calendar years 2011, 2012, and 2013 to date: Rep. Michael McCaul, Rep. Candice Miller, Rep. Peter King, Rep. Patrick Meehan, Rep. Susan Brooks, Rep. Jeffrey Duncan, and Rep. Richard Hudson. (Date Range for Record Search: From 59 01/01/2011 To 12/31/2013) A B C D 2014-IAFO-00060 (b) (6) Request regarding all 911 calls made in the area of Kent Washington on September 21- 1/10/2014 22, 2011 between 11:30PM and 1:00AM from landline and cell phones. (Date Range for Record Search: From 09/21/2011 To 09/22/2011) 60 61 2014-IAFO-00061 (b) (6) Request for information about Bishop Joseph Zuk who died in 1932. 1/13/2014 2014-IAFO-00062 (b) (6) Request for records regarding the Columbia University Department of Public Safety, 1/30/2014 officers in Public Safety, or the Columbia University General Counsel from January 2008 - February 2014. And Reports that were published in cooperation with the Columbia University Department of Public Safety, the Columbia University General, Columbia University Student Affairs, or Columbia University Information Technology from January 2008 to February 2014.
Recommended publications
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • TAZ, Ontological Anarchy, Poetic Terrorism.Pdf
    T. A. Z. The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism By Hakim Bey Autonomedia Anti-copyright, 1985, 1991. May be freely pirated & quoted-- the author & publisher, however, would like to be informed at: Autonomedia P. O. Box 568 Williamsburgh Station Brooklyn, NY 11211-0568 Book design & typesetting: Dave Mandl HTML version: Mike Morrison Printed in the United States of America Part 1 T. A. Z. The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism By Hakim Bey ACKNOWLEDGMENTS CHAOS: THE BROADSHEETS OF ONTOLOGICAL ANARCHISM was first published in 1985 by Grim Reaper Press of Weehawken, New Jersey; a later re-issue was published in Providence, Rhode Island, and this edition was pirated in Boulder, Colorado. Another edition was released by Verlag Golem of Providence in 1990, and pirated in Santa Cruz, California, by We Press. "The Temporary Autonomous Zone" was performed at the Jack Kerouac School of Disembodied Poetics in Boulder, and on WBAI-FM in New York City, in 1990. Thanx to the following publications, current and defunct, in which some of these pieces appeared (no doubt I've lost or forgotten many--sorry!): KAOS (London); Ganymede (London); Pan (Amsterdam); Popular Reality; Exquisite Corpse (also Stiffest of the Corpse, City Lights); Anarchy (Columbia, MO); Factsheet Five; Dharma Combat; OVO; City Lights Review; Rants and Incendiary Tracts (Amok); Apocalypse Culture (Amok); Mondo 2000; The Sporadical; Black Eye; Moorish Science Monitor; FEH!; Fag Rag; The Storm!; Panic (Chicago); Bolo Log (Zurich); Anathema; Seditious Delicious; Minor Problems (London); AQUA; Prakilpana. Also, thanx to the following individuals: Jim Fleming; James Koehnline; Sue Ann Harkey; Sharon Gannon; Dave Mandl; Bob Black; Robert Anton Wilson; William Burroughs; "P.M."; Joel Birroco; Adam Parfrey; Brett Rutherford; Jake Rabinowitz; Allen Ginsberg; Anne Waldman; Frank Torey; Andr Codrescu; Dave Crowbar; Ivan Stang; Nathaniel Tarn; Chris Funkhauser; Steve Englander; Alex Trotter.
    [Show full text]
  • “Guía Metodológica De Uso Seguro De Internet Para Personas Y Empresas Utilizando La Red Tor”
    PONTIFICIA UNIVERSIDAD CATÓLICA DEL ECUADOR FACULTAD DE INGENIERÍA ESCUELA DE SISTEMAS DISERTACIÓN DE GRADO PREVIA A LA OBTENCIÓN DEL TÍTULO DE INGENIERO EN SISTEMAS Y COMPUTACIÓN “GUÍA METODOLÓGICA DE USO SEGURO DE INTERNET PARA PERSONAS Y EMPRESAS UTILIZANDO LA RED TOR” NOMBRES: Javier Andrés Vicente Alarcón Verónica Cristina Guillén Guillén DIRECTOR: Msc. Luis Alberto Pazmiño Proaño QUITO, 2015 “GUÍA METODOLÓGICA DE USO SEGURO DE INTERNET PARA PERSONAS Y EMPRESAS UTILIZANDO LA RED TOR” TABLA DE CONTENIDO RESUMEN .......................................................................................................................... 3 INTRODUCCIÓN ................................................................................................................ 6 0. ANTECEDENTES ......................................................................................................... 8 0.1. Internet .............................................................................................................. 8 0.1.1. Definición .................................................................................................... 8 0.1.2. Historia........................................................................................................ 9 0.1.3. Evolución .................................................................................................. 12 0.2. Ciberataque ...................................................................................................... 13 0.2.1. Definición .................................................................................................
    [Show full text]
  • Digital Security for Activists
    Training the Motivated: Digital Security for Activists Glencora Borradaile Kelsy Kretschmer Abstract School of Electrical Engineering School of Public Policy The state of global surveillance and the political and Computer Science Sociology Program environment has many activists caring more about their Oregon State University Oregon State University online security culture. We report on the initiation of a Corvallis, OR 97331, USA Corvallis, OR 97331, USA Digital Security for Activists program and a pilot study of an [email protected] [email protected] introductory seminar. Pre- and post-surveys of the seminar will form an initial assessment of what kind of intervention might increase the security practices of activists and to inform the design of program offerings. We report on the pre-surveys from three offerings of the seminar. Introduction In collaboration with the Civil Liberties Defense Center (CLDC), the first author had been offering informal digital security trainings for activists and their lawyers. After the fall elections in the U.S., requests for these trainings increased dramatically and shortly thereafter we launched a Digital Security for Activists (DSA) program. The DSA program’s intent is to align with the CLDC mission (“to defend and uphold civil liberties through education, outreach, litigation, legal support, and assistance”) and enable citizen activists to assert their constitutional rights while organizing online. Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Poster In order to provide trainings that are useful and effective, we presented at the 13th Symposium on Usable Privacy and Security (SOUPS 2017).
    [Show full text]
  • Jus Algoritmi: How the NSA Remade Citizenship
    Extended Abstract Jus Algoritmi: How the NSA Remade Citizenship John Cheney-Lippold 1 1 University of Michigan / 500 S State St, Ann Arbor, MI 48109, United States of America / [email protected] Introduction It was the summer of 2013, and two discrete events were making analogous waves. First, Italy’s Minister for Integration, Cécile Kyenge was pushing for a change in the country’s citizenship laws. After a decades-long influx of immigrants from Asia, Africa, and Eastern Europe, the country’s demographic identity had become multicultural. In the face of growing neo-nationalist fascist movements in Europe, Kyenge pushed for a redefinition of Italian citizenship. She asked the state to abandon its practice of jus sanguinis, or citizenship rights by blood, and to adopt a practice of jus soli, or citizenship rights by landed birth. Second, Edward Snowden fled the United States and leaked to journalists hundreds of thousands of classified documents from the National Security Agency regarding its global surveillance and data mining programs. These materials unearthed the classified specifics of how billions of people’s data and personal details were being recorded and processed by an intergovernmental surveillant assemblage. These two moments are connected by more than time. They are both making radical moves in debates around citizenship, though one is obvious while the other remains furtive. In Italy, this debate is heavily ethnicized and racialized. According to jus sanguinis, to be a legitimate part of the Italian body politic is to have Italian blood running in your veins. Italian meant white. Italian meant ethnic- Italian. Italian meant Catholic.
    [Show full text]
  • PRISM/US-984XN Overview
    TOP SFCRF.T//SI//ORCON//NOFORX a msn Hotmail Go« „ paltalk™n- Youffl facebook Gr-iai! AOL b mail & PRISM/US-984XN Overview OR The SIGAD Used Most in NSA Reporting Overview PRISM Collection Manager, S35333 Derived From: NSA/CSSM 1-52 April 20L-3 Dated: 20070108 Declassify On: 20360901 TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK ® msnV Hotmail ^ paltalk.com Youi Google Ccnmj<K8t« Be>cnö Wxd6 facebook / ^ AU • GM i! AOL mail ty GOOglC ( TS//SI//NF) Introduction ILS. as World's Telecommunications Backbone Much of the world's communications flow through the U.S. • A target's phone call, e-mail or chat will take the cheapest path, not the physically most direct path - you can't always predict the path. • Your target's communications could easily be flowing into and through the U.S. International Internet Regional Bandwidth Capacity in 2011 Source: Telegeographv Research TOP SECRET//SI// ORCON//NOFORN TOP SECRET//SI//ORCON//NOEQBN Hotmail msn Google ^iïftvgm paltalk™m YouSM) facebook Gm i ¡1 ^ ^ M V^fc i v w*jr ComnuMcatiw Bemm ^mmtmm fcyGooglc AOL & mail  xr^ (TS//SI//NF) FAA702 Operations U « '«PRISM/ -A Two Types of Collection 7 T vv Upstream •Collection of ;ommujai£ations on fiber You Should Use Both PRISM • Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google Facebook, PalTalk, AOL, Skype, YouTube Apple. TOP SECRET//SI//ORCON//NOFORN TOP SECRET//SI//ORCON//NOEÛEK Hotmail ® MM msn Google paltalk.com YOUE f^AVi r/irmiVAlfCcmmjotal«f Rhnnl'MirBe>coo WxdS6 GM i! facebook • ty Google AOL & mail Jk (TS//SI//NF) FAA702 Operations V Lfte 5o/7?: PRISM vs.
    [Show full text]
  • NSA) Office of Inspector General (OIG), 2003-2006
    Description of document: Semi-annual reports for Congress produced by the National Security Agency (NSA) Office of Inspector General (OIG), 2003-2006 Requested date: 14-April-2008 Release date: 09-March-2020 Posted date: 30-March-2020 Source of document: FOIA Request National Security Agency Attn: FOIA/PA Office 9800 Savage Road, Suite 6932 Ft. George G. Meade, MD 20755-6932 Fax: 443-479-3612 Online FOIA Request Form The governmentattic.org web site (“the site”) is a First Amendment free speech web site, and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. ,. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE I~ FORT GEORGE G.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • PRIVACY INTERNATIONAL Claimant
    IN THE INVESTIGATORY POWERS TRIBUNAL BETWEEN: PRIVACY INTERNATIONAL Claimant -and- (1) SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Defendants AMENDED STATEMENT OF GROUNDS INTRODUCTION 1. Privacy International is a leading UK charity working on the right to privacy at an international level. It focuses, in particular, on challenging unlawful acts of surveillance. 2. The Secretary of State for the Foreign and Commonwealth Office is the minister responsible for oversight of the Government Communication Headquarters (“GCHQ”), the UK’s signals intelligence agency. 3. These proceedings concern the infection by GCHQ of individuals’ computers and mobile devices on a widespread scale to gain access either to the functions of those devices – for instance activating a camera or microphone without the user’s consent – or to obtain stored data. Recently-disclosed documents suggest GCHQ has developed technology to infect individual devices, and in conjunction with the United States National Security Agency (“NSA”), has the capability to deploy that technology to potentially millions of computers by using malicious software (“malware”). GCHQ has also developed malware, known as “WARRIOR PRIDE”, specifically for infecting mobile phones. 4. The use of such techniques is potentially far more intrusive than any other current surveillance technique, including the interception of communications. At a basic level, the profile information supplied by a user in registering a device for various purposes may include details of his location, age, gender, marital status, income, 1 ethnicity, sexual orientation, education, and family. More fundamentally, access to stored content (such as documents, photos, videos, web history, or address books), not to mention the logging of keystrokes or the covert and unauthorised photography or recording of the user and those around him, will produce further such information, as will the ability to track the precise location of a user of a mobile device.
    [Show full text]
  • Installare Tor
    / DARK WEB / TECNOLOGIA 11 13 14 12 15 16 INSTALLARE TOR sicurezza riducendo al minimo (specialmente file .doc e .pdf) la navigazione Web è solo uno (client di posta elettronica), la superficie di attacco e quindi mentre si è ancora online. degli strumenti di comunica- ProtonMail (Webmail). Tails, la possibilità che l’indirizzo IP Tor non è una rete ottimizzata zione anonima a sistema operativo reale dell’utente venga smasche- per le prestazioni, quindi l’e- disposizione del Sicurezza: il team open source basato rato, il team di Tor suggerisce sperienza di navigazione può pubblico. Fra i di Tor suggerisce su kernel Linux, è tra l’altro di non usare un client variare anche molto e magari tool progetta- preconfigurato per BitTorrent facendolo passare richiedere la selezione di un ti per sfruttare di non usare un client ridirigere tutto il dalla darknet, non installare o nuovo circuito se un sito (pub- Tor segnalia- BitTorrent facendolo traffico di rete attra- abilitare plug-in esterni sul Tor blico o nascosto che sia) non mo OnionShare passare dalla darknet verso la rete di Tor. Browser, usare sempre la ver- vuole proprio saperne di cari- (condivisione In tutti questi casi sione https di un sito Web lad- carsi. La darknet di Tor suppor- file), Tor Mes- lasciamo all’utente dove disponibile e di non aprire ta tutti i flussi di rete basati su senger, TorChat, Ricochet (mes- il piacere della scoperta e della documenti scaricati tramite Tor protocolli Tcp e socks, quindi saggistica istantanea), Mailpile sperimentazione. PC Professionale / Novembre
    [Show full text]