domingo, 30 de julho de 2017

Edward Joseph Snowden




"No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State" is a 2014 non-fiction book by American investigative journalist Glenn Greenwald. It was first published on May 13, 2014 through Metropolitan Books and details Greenwald's role in the global surveillance disclosures as revealed by the former National Security Agency contractor Edward Snowden.

The documents from the Snowden archive cited in the book are freely available online.          
AQUI http://www.glenngreenwald.net/#BookDocuments



Snowden downloaded up to 1.5 million files, according to national intelligence officials, before jetting from Hawaii to Hong Kong to meet with journalists Glenn Greenwald and Laura Poitras.


The book consists of five chapters: Contact, Ten Days in Hong Kong, Collect It All, The Harm of Surveillance, and the Fourth Estate, plus an introduction and an epilogue.
In the introduction Greenwald explains how his background as a blogger on surveillance practices of the American government attracted Edward Snowden's attention, and he summarizes the nature, legality, and evolution of such practices. Greenwald concludes by discussing how a global surveillance network has been created with the assistance of technology companies and the unique role of the internet in human history as a facilitator of such surveillance.

In the body of the book, Greenwald discusses how he became involved with the 2013 global surveillance disclosures. He began by traveling to Hong Kong to meet Edward Snowden, who had contacted Greenwald as an anonymous source purporting to have evidence of government surveillance. As Greenwald continued to investigate he uncovered more information that he later published, to much controversy.
In the book Greenwald also discusses establishment media, which he states will traditionally avoid publishing anything that would put them at odds with the government and as such, are less helpful when it comes to the interests of the general public.





Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without authorization.
His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments.
A subject of controversy, Snowden has been variously called a hero, a whistleblower, a dissident, a traitor and a patriot. His disclosures have fueled debates over mass surveillance, government secrecy, and the balance between national security and information privacy.

Snowden left the Moscow airport on August 1 2013, after 39 days in the transit section, coming from Hong Kong. He was granted temporary asylum in Russia for one year, with extensions possible.
In the waning days of the Obama administration, former CIA Director Michael Morell suggested that Russia should extradite Snowden to the United States as a "gift" to Donald Trump. The comment drew harsh criticism by the Russian Foreign Ministry and was described as an “ideology of betrayal” by Russian Ministry spokeswoman Maria Zakharova.
Zakharova added that Snowden had been granted an extension of his stay until 2020.





On October 10, 2014, "Citizenfour", a documentary about Snowden, received its world premiere at the New York Film Festival. Earlier that year, director Laura Poitras told Associated Press she was editing the film in Berlin because she feared her source material would be seized by the government inside the U.S. The two-hour film was shot in various countries, tracing Snowden's time in Hong Kong and Moscow.
The film was released in the U.S. and Europe to wide acclaim from critics, and won the 2015 Academy Award for Best Documentary Feature.
Snowden declared in a February 2015 Reddit "AMA" (Ask Me Anything) that he had no commercial interest in the film.

Citizenfour is a 2014 documentary film directed by Laura Poitras, concerning Edward Snowden and the NSA spying scandal. The film had its US premiere on October 10, 2014, at the New York Film Festival and its UK premiere on October 17, 2014, at the BFI London Film Festival. The film features Snowden and Glenn Greenwald, and was co-produced by Poitras, Mathilde Bonnefoy, and Dirk Wilutzky, with Steven Soderbergh and others serving as executive producers. Citizenfour received critical acclaim upon release, and was the recipient of numerous accolades, including the Academy Award for Best Documentary Feature at the 2015 Oscars.





On Friday, September 16, Skyhorse Publishing celebrated the launch of "SNOWDEN: Official Motion Picture Edition", the official movie-tie book by Oliver Stone.




In March 2016, National Security Agency whistleblower Edward Snowden, has made a new controversial claim during an interview with the Moscow Tribune, saying that he possesses some classified information proving that the CIA is behind the “theory of Global Warming”.
Mr. Snowden says the CIA first orchestrated the spread of the “Global Warming scare” in the 1950s, in order to divert the attention of the scientific community, from the dangers of the weapons race and reinforce its control over research institutes.

 “I have documents showing that the CIA invented the whole thing,” claims Edward Snowden. “Global Warming was invented to both scare people, and divert their attention from other human-made dangers like nuclear weapons. The CIA gave millions of dollars to any scientist who would confirm the theory, so many unscrupulous scientists did what they were told in order to get the money. Now, there is so much fake data to confirm that Global Warming “exists”, that they actually convinced everyone that it was real.”

He is talking of “High Frequency Active Auroral Research Program”, which is known as HAARP, most dangerous and Self Destructing weather control measure.
Mr. Snowden says that the documents proving that the CIA invented the whole thing will be integrally reproduced in his new book.



Margaret Thatcher can also get part of the global warming scare credit.
She was having trouble with unionized coal mines in the UK and decided to threaten them with replacement by nuclear, supposedly to decrease CO2 emissions that were just then be demonized as a “greenhouse gas.”

The average volcanic eruption puts more than 10,000 times more CO2 into the atmosphere than mankind has done in our entire time on earth. This is used by the UN to gain greater control on countries, fleece them of billions of dollars and pave the way for a one world government socialist dictatorship.




The Biggest Revelations From Edward Snowden's Leaks:


  1. Secret court orders allow NSA to sweep up Americans' phone records.
  2. PRISM The existence of PRISM was the second NSA bombshell, coming less than 24 hours after the first one. Initially, reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others.
  3. Britain's version of the NSA taps fiber optic cables around the world
  4. The British spy agency, the Government Communications Headquarters (GCHQ), taps fiber optic cables all over the world to intercept data flowing through the global Internet, we learned. The GCHQ works closely with the NSA, sharing data and intelligence in a program that's codenamed Tempora. Tempora is one of the key NSA/GCHQ programs, allowing the spy agencies to collect vasts troves of data, but for some reason, it has sometimes been overlooked. After a couple of months from the Tempora revelation, a German newspaper revealed the names of the companies that collaborate with the GCHQ in the Tempora program: Verizon Business, British Telecommunications, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute.
  5.  NSA spies on foreign countries and world leaders
  6. XKeyscore, the program that sees everything XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" through data it intercepts across the world. In leaked documents, the NSA describes it as the "widest-reaching" system to search through Internet data.
  7. NSA efforts to crack encryption and undermine Internet security
  8. Even as the NSA demands more powers to invade our privacy in the name of cybersecurity, it is making the Internet less secure and exposing us to criminal hacking, foreign espionage, and unlawful surveillance. The NSA's efforts to secretly defeat encryption are recklessly shortsighted and will further erode not only the United States' reputation as a global champion of civil liberties and privacy but the economic competitiveness of its largest companies.
  9. NSA elite hacking team techniques revealed
  10. The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
  11. NSA cracks Google and Yahoo data center links When bulk collection or PRISM fails, the NSA had other tricks up its sleeve: It could infiltrate links connecting Yahoo and Google data centers, behind the companies' backs.
  12. NSA collects text messages
  13. It's not just about Internet data though. The NSA, following its unofficial motto of "collecting it all," intercepts 200 million text messages every day worldwide through a program called Dishfire. In leaked documents, the agency described the collected messages as a "goldmine to exploit" for all kinds of personal data. NSA can "easily" crack cellphone encryption, allowing the agency to more easily decode and access the content of intercepted calls and text messages.
  14. NSA intercepts all phone calls in two countries
  15. The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo. The NSA also collects all phone calls' metadata in Mexico, Kenya and the Philippines.
  16. An 18-page presidential memo shows Obama ordering intelligence officials to draw up a list of overseas targets for cyberattacks.
  17. The NSA was hacking computers in Hong Kong and mainland China, few of which were military systems.
  18. Britain's GCHQ (its intelligence agency) intercepted phone and internet communications of foreign politicians attending two G-20 meetings in London in 2009. Britain's GCHQ taps fiber-optic cables to collect and store global email messages, Facebook posts, internet histories, and calls, and then shares the data with the NSA.
  19. Until 2011, the Obama administration permitted the NSA's continued collection of vast amounts of Americans' email and internet metadata under a Bush-era program called Stellar Wind.
  20. The US government bugged the offices of the European Union in New York, Washington, and Brussels.
  21. The US government spies on at least 38 foreign embassies and missions, using a variety of electronic surveillance methods.
  22. The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens.Using a program called Fairview, the NSA intercepts internet and phone-call data of Brazilian citizens.Monitoring stations set up in Australia and New Zealand help feed data back to NSA's XKeyscore program. The NSA conducts surveillance on citizens in a number of Latin American countries, including Venezuela, Colombia, Argentina, Panama, Ecuador, Peru, and others. The agency also sought information on oil, energy, and trade.
  23. Germany's Federal Intelligence Service, BND, helps contribute data to the NSA's XKeyscore program.
  24. The US government paid Britain's GCHQ roughly $155 million over three years to gain access and influence over its spying programs.
  25. Seven of the world's leading telecommunications companies provide GCHQ with secret, unlimited access to their network of undersea cables.
  26. Internal NSA document reveals an agency "loophole" that allows a secret backdoor for the agency to search its databases for US citizens' emails and phone calls without a warrant.
  27. The top-secret US intelligence "black budget" is revealed for 2013, with 16 spy agencies having a budget of $52.6 billion.
  28. The US carried out 231 offensive cyberattacks in 2011.
  29. The NSA hacked into Qatar-based media network Al Jazeera's internal communications system.
  30. Using a "man in the middle" attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society for Worldwide Interbank Financial Telecommunications, and the Brazilian oil company Petrobras.
  31. A joint investigation by ProPublica, The New York Times, and The Guardian finds the NSA is winning its war against internet encryption with supercomputers, technical know-how, and court orders.
  32. The NSA has the ability to access user data for most major smartphones on the market, including Apple iPhones, BlackBerrys, and Google Android phones.
  33. The NSA shares raw intelligence data (with information about American citizens) to Israel with an information-sharing agreement.
  34. The NSA monitors banks and credit institutions for a comprehensive database that can track the global flow of money.
  35. Britain's GCHQ launched a cyberattack against Belgacom, a partly state-owned Belgian telecommunications company.
  36. The NSA spies on Indian diplomats and other officials in an effort to gain insight into the country's nuclear and space programs.
  37. The NSA stores a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina.
  38. Canada's signals intelligence agency, CSEC, spied on phone and computer networks of Brazil's Ministry of Mines and Energy and shared the information with the "Five Eyes" intelligence services of the US, Canada, Britain, Australia, and New Zealand.
  39. The NSA spied on French citizens, companies, and diplomats, and monitored communications at France's embassy in Washington and its UN office in New York.
  40. The NSA tapped the mobile phone of German Chancellor Angela Merkel.
  41. The NSA spied on Italian citizens, companies, and government officials. Spied Spanish leaders and citizens.
  42. The NSA stations surveillance teams at 80 locations around the world.
  43. A joint program between the NSA and Britain's GCHQ called Muscular infiltrates and copies data flowing out of Yahoo and Google's overseas data centers. One slide boasted of "SSL added and removed here!" with a smiley face.
  44. The NSA spied on the Vatican.
  45. Strategic missions of the NSA are revealed, which include combatting terrorism and nuclear proliferation, as well as pursuing US diplomatic and economic advantage.
  46. Australia's Defense Signals Directorate and the NSA worked together to spy on Indonesia during a UN climate change conference in 2007.Australia's DSD spied on the cellphones of top Indonesian officials, including the president, first lady, and several cabinet ministers.
  47. A NSA strategy document reveals the agency's goal to acquire data from "anyone, anytime, anywhere" and expand its already broad legal powers.
  48. The NSA infected more than 50,000 computer networks worldwide with malware designed to steal sensitive information.
  49. Swedish intelligence was revealed to be spying on Russian leaders, then passing it on to the NSA.  
  50. The NSA has the ability to decrypt the common A5/1 cellphone encryption cipher.
  51. A document reveals how Britain's GCHQ spied on Germany, Israel, the European Union, and several nongovernmental organizations.
  52. With a $79.7 million research program, the NSA is working on a quantum computer that would be able to crack most types of encryption.
  53. Using radio transmitters on tiny circuit boards or USB drives, the NSA can gain access to computers not connected to the internet.
  54. A GCHQ program called Squeaky Dolphin monitors YouTube, Facebook, and Blogger for "broad real-time monitoring of online activity."
  55. The NSA spied on negotiators during the 2009 UN climate change conference in Copenhagen, Denmark.
  56. NSA developed sophisticated malware "implants" to infect millions of computers worldwide. In one example, the NSA posed as a fake Facebook server to infect a target's computer and steal files.
  57. The NSA closely monitored the Chinese technology firm Huawei in attempt to reveal ties between the company and the Chinese military. The agency also spied on Chinese banks and other companies, as well as former President Hu Jintao.
  58. Malaysia's political leadership is a high-priority intelligence target for the US and Australia in 2014.
  59. There are hundreds of leaks that have come to light thus far.






Fontes:  World News Daily Report
                Skyhorse Publishing
                Wikipedia
                Biography
                The Guardian
                BBC News
                Business Insider




Sem comentários:

Enviar um comentário