Prism, Tempora, Xkeyscore, ... Wie Gefährdet Ist Mein Unternehmen?

Total Page:16

File Type:pdf, Size:1020Kb

Prism, Tempora, Xkeyscore, ... Wie Gefährdet Ist Mein Unternehmen? Prism, Tempora, XKeyscore, ... Wie gefährdet ist mein Unternehmen? Workshop zum Thema Kommunikationsüberwachung Die Enthüllungen des Whistleblowers Edward Snowden, des Guardian und der Washington Post haben gezeigt, dass die Überwachung, Speicherung und Rasterung von Daten im Internet wesentlich größere Ausmaße angenommen haben, als bisher wahrgenommen. Beinahe der gesamte Internetverkehr ist hiervon betroffen. SIND IHRE DatEN NOCH SICHER? WAS WIRD ÜBERWacht? Seit Sommer 2013 ist auch öffentlich be- Die Such- und Filterfunktionen von PRISM, kannt, dass über die transatlantische XKeyscore und Co. liefern interessierten Glasfaserkabelverbindung versandte In- Mächten die „Kronjuwelen“ deutscher und formationen flächendeckend abgeschöpft anderer europäischer Unternehmen auf werden. Die großen Cloud-Anbieter ge- dem Silbertablett. währen diversen Diensten direkten Zugriff Jegliche Nutzung von auf ihre Datenmassen, und entscheidende Backbone- und Netzbetreiber, nicht zuletzt E-Mail auch im Mobilfunkbereich, helfen aktiv bei VoIP der Sammlung mit. Mobilfunk oder Telefon Cloud-Diensten In der Öffentlichkeit werden Ausmaß, und sonstiger Internetkommunikation Verantwortung und Gegenmaßnahmen heiß diskutiert – doch bisher bleiben mehr kann automatisch überwacht werden. Fragen als Gewissheiten. Selbst aktuell nicht im gezielten Fokus stehende Informationen, vor allem Verbin- WER IST BETROFFEN? dungsdaten, häufig aber auch Kommunika- tionsinhalte, landen zum Zweck der zukünf- Neben der Privatsphäre der Bürger sind tigen Auswertung in Datenbanken – gerade vor allem auch Unternehmen betroffen. dann, wenn sie verschlüsselt sind. Nicht nur Staaten wie China und Russland versuchen mit hohem finanziellem und Die Gefährdungslage ist komplex, und technischem Aufwand möglichst viele Infor- täglich kommen neue Informationen hinzu. mationen über Geschäfts- und Betriebsge- Machen Sie sich ein Bild Ihrer eigenen heimnisse zu sammeln und auszuwerten. Risikosituation! HiSolutions AG Bouchéstraße 12 12435 Berlin PRISM Marina Pinwale UTT Tempora [email protected] www.hisolutions.com XKeyscore NSA Mainway Printaura GHCQ Nucleon FISA Tel.: +49 30 533 289 0 Fax: +49 30 533 289 900 DER WORKSHOP DIE GEFAHREN KENNEN Wir analysieren gemeinsam den Bezug Profitieren Sie von unserem Sachverstand des Themas zu Ihrem Unternehmen und und unserer langjährigen Erfahrung im erörtern, was Sie tun können, um sich vor Schutz von Informationen in Unternehmen der Überwachung Ihrer Kommunikation zu aus nahezu allen Branchen: schützen. Informationssicherheitsmanagement Der Workshop besteht aus drei Teilen: auf allen Ebenen Bekämpfung echter Cyberangriffe im 1. Vortrag zum Thema Umfassende Über- Auftrag unserer Kunden wachung durch (westliche) Dienste Allein im letzten Jahr weit über 100 Wir erläutern die verschiedenen Über- durchgeführte Penetrationstests wachungsprogramme und was diese für Risikoanalyen in kritischen Infrastruk- Ihr Unternehmen bedeuten – anschau- turen lich, praxisnah und zielgruppengerecht. Eigene Forschungslabore für Forensik 2. Diskussion über die Auswirkungen für und für Automatisierungstechnik Ihr Unternehmen Gemeinsam erarbeiten wir ein Lagebild der spezifischen Bedrohung. 3. Handlungsempfehlungen Auf Grundlage der Ergebnisse des Workshops erhalten Sie ein Dossier, INFORmatIONEN UND welches im Nachgang konkrete Hand- ANMELDUNG lungsempfehlungen und nächste Schrit- te hin zu einer besseren Absicherung Ihrer Unternehmensdaten bereitstellt. Gern beraten wir Sie persönlich zu einem individuell auf Ihr Auf Wunsch wird zusätzlich das Thema Unternehmen zugeschnittenen „Advanced Persistent Threats“ (APT) – auf- Workshopangebot. wändig an Ihren Einzelfall angepasste, lang- fristige Attacken – im Workshop behandelt. Schreiben Sie uns eine E-Mail an [email protected] Zielgruppe: Der Workshop richtet sich primär an Ent- oder rufen Sie an scheider, Geschäftsleitung, CIOs , IT-Mana- ger sowie IT-Sicherheitsmanager. +49 30 533 289 0 Veranstaltungsort: Ihr Ansprechpartner David Fuhr, Die Veranstaltung kann in den Räumlich- keiten der HiSolutions AG in Berlin, Mün- Senior Consultant System Security, chen, Frankfurt oder Köln, gerne aber auch hilft Ihnen gern weiter. Inhouse bei Ihnen stattfinden. ÜBER DIE HISOLUTIONS ag Seit mehr als 20 Jahren engagieren wir Wir beschäftigen mehrere ISO 27001 Lead uns in der Planung, Umsetzung und Über- Auditoren, Auditteamleiter auf Basis von IT- Ihr Ansprechpartner: prüfung technischer und organisatorischer Grundschutz, IS-Revisoren, CISAs, CISSPs, David Fuhr Informationssicherheitsmaßnahmen für ISO 22301 Lead Auditoren etc. Kunden aus nahezu allen Branchen sowie Aktuell (August 2013) ist HiSolutions als ein- Senior Consultant aus der öffentlichen Verwaltung. ziges Unternehmen vom BSI zertifizierter IT- System Security Die Vielzahl der erfolgreich durchgeführ- Sicherheitsdienstleister gleichzeitig in den ten Kundenprojekte hat uns zu einem der beiden Bereichen IS-Revision/IS-Beratung [email protected] Marktführer in Deutschland gemacht. und Penetrationstests. Tel.: +49 30 533 289 0.
Recommended publications
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • PRIVACY INTERNATIONAL Claimant
    IN THE INVESTIGATORY POWERS TRIBUNAL BETWEEN: PRIVACY INTERNATIONAL Claimant -and- (1) SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Defendants AMENDED STATEMENT OF GROUNDS INTRODUCTION 1. Privacy International is a leading UK charity working on the right to privacy at an international level. It focuses, in particular, on challenging unlawful acts of surveillance. 2. The Secretary of State for the Foreign and Commonwealth Office is the minister responsible for oversight of the Government Communication Headquarters (“GCHQ”), the UK’s signals intelligence agency. 3. These proceedings concern the infection by GCHQ of individuals’ computers and mobile devices on a widespread scale to gain access either to the functions of those devices – for instance activating a camera or microphone without the user’s consent – or to obtain stored data. Recently-disclosed documents suggest GCHQ has developed technology to infect individual devices, and in conjunction with the United States National Security Agency (“NSA”), has the capability to deploy that technology to potentially millions of computers by using malicious software (“malware”). GCHQ has also developed malware, known as “WARRIOR PRIDE”, specifically for infecting mobile phones. 4. The use of such techniques is potentially far more intrusive than any other current surveillance technique, including the interception of communications. At a basic level, the profile information supplied by a user in registering a device for various purposes may include details of his location, age, gender, marital status, income, 1 ethnicity, sexual orientation, education, and family. More fundamentally, access to stored content (such as documents, photos, videos, web history, or address books), not to mention the logging of keystrokes or the covert and unauthorised photography or recording of the user and those around him, will produce further such information, as will the ability to track the precise location of a user of a mobile device.
    [Show full text]
  • NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • Download Legal Document
    Case 1:15-cv-00662-TSE Document 168-33 Filed 12/18/18 Page 1 of 15 Wikimedia Foundation v. NSA No. 15-cv-0062-TSE (D. Md.) Plaintiff’s Exhibit 29 12/16/2018 XKEYSCORE: NSA's Google for the World's Private Communications Case 1:15-cv-00662-TSE Document 168-33 Filed 12/18/18 Page 2 of 15 XKEYSCORE NSA’s Google for the World’s Private Communications Morgan Marquis-Boire, Glenn Greenwald, Micah Lee July 1 2015, 10:49 a.m. One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden. The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.
    [Show full text]
  • SSO Corporate Portfolio Overview
    SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 What is SSO's Corporate Portfolio? What data can we collect? Where do I go for more help? Agenda 2 What is SSO's Corporate Portfolio? What is SSO Corporate access collection? (TS//SI//NF) Access and collection of telecommunications on cable, switch network, and/or routers made possible by the partnerships involving NSA and commercial telecommunications companies. 3 Brief discussion of global telecommunications infrastructure. How access points in the US can collect on communications from "bad guy" countries (least cost routing, etc.) 4 Unique Aspects Access to massive amounts of data Controlled by variety of legal authorities Most accesses are controlled by partner Tasking delays (TS//SI//NF) Key Points: 1) SSO provides more than 80% of collection for NSA. SSO's Corporate Portfolio represents a large portion of this collection. 2) Because of the partners and access points, the Corporate Portfolio is governed by several different legal authorities (Transit, FAA, FISA, E012333), some of which are extremely time-intensive. 3) Because of partner relations and legal authorities, SSO Corporate sites are often controlled by the partner, who filters the communications before sending to NSA. 4) Because we go through partners and do not typically have direct access to the systems, it can take some time for OCTAVE/UTT/Cadence tasking to be updated at site (anywhere from weekly for some BLARNEY accesses to a few hours for STORMBREW). 5 Explanation of how we can collect on a call between (hypothetically) Iran and Brazil using Transit Authority.
    [Show full text]
  • Protecting Personal Data, Electronic Communications, and Individual
    Hastings Constitutional Law Quarterly Volume 42 Article 4 Number 3 Spring 2015 1-1-2015 The ewN Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment Megan Blass Follow this and additional works at: https://repository.uchastings.edu/ hastings_constitutional_law_quaterly Part of the Constitutional Law Commons Recommended Citation Megan Blass, The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment, 42 Hastings Const. L.Q. 577 (2015). Available at: https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol42/iss3/4 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Constitutional Law Quarterly by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance Through a Return to a Property-Based Approach to the Fourth Amendment by MEGAN BLASS* I. Mass Surveillance in the New Millennium: Edward Snowden Versus The National Security Agency A. Watergate Fears Realized: National Security Agency Programs Exposed in 2013 Edward Snowden is now a household name.' He garnered global attention in 2013 when he claimed responsibility for leaking government documents that revealed unprecedented levels of domestic surveillance conducted by the National Security Agency ("NSA" or "the Agency"). 2 The information leaked by Mr.
    [Show full text]
  • The Unofficial XKEYSCORE User Guide
    TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 The Unofficial XKEYSCORE User Guide E92 - ADET Consultant, Booz Allen Hamilton The Unofficial XKEYSCORE User Guide 1 Creating Queries 2 Classic Queries 2 Multisearch: 2 Classic Searches (A-Z) 6 Creating a WorkFlow 18 Searching - Tips and Tricks 24 Which Query Is best for Me? 25 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 Creating Queries Clicking on Search at the top of the screen will bring up a list of searches in the Navigation Menu: £ Home ¿j Users Workflow CeiWral Search gyi jfesults HI Statistics «j Navigation 3 Si Search Classic QQ Mult ¡Search Fields • Advanced Features • 5\ ;•• ¡2 IP Addresses ;•• ¡2 Mac Address Search; Full Log • ¡S Username 0 S) Classic A-M Query ;-S ASF and WMV Metadata Justif b ¡2 Alert ; • ¡2 DlackBerry Additional Justif H CNE ;•• [J] Call Logs Miranda N -¡2 Category DNI | -13 Cellular DNI Da ;•• ^ Cisco Passwords iS Document Metadata ¡2 Document Tagging Client IP (X-Fowarde ¡2 Email Addresses Use ¡2 Extracted Files 2 Full Log DNI Attn bui g HTTP Activf ^IRCC^Geolocation '-[§3 Logins and Passwords IP Ac 0 • Classic N-Z TP Ar The Search screen has cascading menus of different Searches: Classic, Common, Dictionary Hits, File Transfer, Multisearch, Network Management, User Activity, VoIP, and Wireless. Classic Queries: Within the Classic Menu there are three folders: MultiSearch, Classic A-M, and Classic N-Z.
    [Show full text]
  • SSO FAIRVIEW Overview
    TOP SECRET//SI/OC//NOFORN SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN AGENDA • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING DATA WE COLLECTED • (U) FAIRVIEW WAY AHEAD AND WHAT IT MEANS FOR YOU • (U) QUESTIONS TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN International Cables (TS//SI//NF) (TS//SI//NF) TOP SECRET//SI/OC//NOFORN Brief discussion of global telecommunications infrastructure. How access points in the US can collect on communications from “bad guy” countries (least cost routing, etc.) TOP SECRET//SI/OC//NOFORN WHERE SSO IS ACCESSING YOUR TARGET (TS//SI//NF) SSO TARGET UNILATERAL PROGRAMS CABLE MAIL, VOIP, TAP CLOUD SERVICES CORP PARTNER RAM-A RAM-I/X RAM-T RAM-M DGO SSO WINDSTOP BLARNEY SSO CORP MYSTIC AND PRISM FAIRVIEW STORMBREW OAKSTAR TOPI PINWALE XKEYSCORE TURMOIL (TS//SI//NF) TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN FAIRVIEW DEFINED • (TS//SI//NF) Large SSO Program involves NSA and Corporate Partner (Transit, FAA and FISA) • (TS//SI//REL FVEY) Cooperative effort associated witH mid- point collection (cable, switch, router) • (TS//SI//NF) THe partner operates in tHe U.S., but Has access to information tHat transits tHe nation and tHrougH its corporate relationships provide unique accesses to otHer telecoms and ISPs (TS//SI//NF) 5 (TS//SI//NF) TOP SECRET//SI/OC//NOFORN TOP SECRET//SI/OC//NOFORN Unique Aspects (C) Access to massive amounts of data (C) Controlled by variety of legal authorities (C) Most accesses are controlled by partner (C) Tasking delays TOP SECRET//SI/OC//NOFORN (TS//SI//NF) Key Points: 1) SSO provides more than 80% of collection for NSA.
    [Show full text]
  • NSA Surveillance: Exploring the Geographies of Internet Interception
    NSA Surveillance: Exploring the Geographies of Internet Interception Andrew Clement1 1 Faculty of Information, University of Toronto Abstract The National Security Agency’s various surveillance programs recently revealed by Edward Snowden are collectively arguably the largest personal data collection and analysis operation in history. While the foremost exemplar of a fine-grained, global information system, they also represent among the most serious contemporary challenges to democratic governance and civil liberties. Based on media coverage and leaked secret documents, this paper analyses the main NSA data interception programs and their geographic characteristics. This research also draws on IXmaps.ca, a crowd-sourced, interactive mapping application to show internet users where their personal traffic may be intercepted by the NSA. In particular, it demonstrates that internet surveillance facilities located in relatively few strategic locations enable a nearly comprehensive collection of domestic U.S. internet traffic. Keywords: NSA surveillance, warrantless wiretapping, internet surveillance, privacy Citation: Clement, A. (2014). NSA Surveillance: Exploring the Geographies of Internet Interception. In iConference 2014 Proceedings (p. 412–425). doi:10.9776/14119 Copyright: Copyright is held by the author. Acknowledgements: The IXmaps project is the work of a research team that currently includes Jonathan Obar, Colin McCann and Antonio Gamba. David Phillips, Steve Harvey, Gabby Resch, Erik Stewart, Nancy Paterson, Misha Snyder and Lauren DiMonte have made invaluable contributions at earlier stages of the project. We are also grateful to those individuals, largely anonymous, who have contributed to the database by installing and running TRgen, or have provided feedback that has helped improve the application. This research has received funding from Canada’s Social Sciences and Humanities Research Council and the Office of the Privacy Commissioner of Canada.
    [Show full text]
  • Protecting Fundamental Rights in a Digital Age Proceedings, Outcome and Background Documents
    Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013 – 2014 Inquiry on electronic mass surveillance of EU citizens Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013-2014 1 2 Introduction by Claude Moraes MEP, Rapporteur of the Inquiry on electronic mass surveillance of EU citizens.................................................................................................................................................................5 European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs (2013/2188(INI))...................................................................................9 Explanatory statement (A7-0139/2014).............................................................................................................49 European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ privacy (2013/2682(RSP))........57 Working document on the US and EU Surveillance programmes and their impact on EU citizens fundamental rights by Claude Moraes...............................................................................................................65 Working document on the relation between the surveillance practices in the
    [Show full text]
  • Global Surveillance Network
    GCHQ and UK Mass Surveillance Chapter 4 4 A Global Surveillance Network 4.1 Introduction The extent of the collaboration between British and American signal intelligence agencies since World War II was long suspected, but it has been incontrovertibly exposed by Edward Snowden. The NSA and GCHQ operate so closely that they resemble a single organisation in many aspects, with an extremely close relationship with the other three members of the Five Eyes pact: Canada, Australia, New Zealand. Since the end of the Cold War, the network of collaboration around the Five Eyes has grown to the point where we can speak of a global surveillance complex with most countries willing to be part of the club. According to security experts, this is driven by the same network effects that create the Google monopoly.i Given that many details of these arrangements remain secret, it is hard to see how parliament and courts in one country can ever hope to rein them in. This creates practical problems for understanding the extent of intrusiveness of any surveillance, because we do not know who has access to the information. It is possible that US agencies that work closely with the NSA, such as the FBI, have access to more information from GCHQ than British police. In the other direction, the UK intelligence services are not constrained by any publicly available legislation in obtaining unsolicited intercepted material from other countries, even where the communications in question belong to people within the UK. But despite these levels of collaboration, the US takes an exceptionalist approach to rights, where citizens from other countries are not given sufficient legal protections from surveillance.
    [Show full text]