WikiLeaks | Reuters.com

TOKYO - Japanese Prime Minister Shinzo Abe asked U.S. Vice President Joe Biden on Wednesday for an investigation into possible spying on high-level Japanese government and corporate officials following WikiLeaks' release last week of a list of spying targets, Japan's top government spokesman said on Wednesday.

BERLIN - The U.S. National Security Agency tapped phone calls involving German Chancellor Angela Merkel and her closest advisers for years and spied on the staff of her predecessors, according to WikiLeaks.

BERLIN - The U.S. National Security Agency tapped phone calls involving German Chancellor Angela Merkel and her closest advisers for years and spied on the staff of her predecessors, WikiLeaks said on Wednesday.

PARIS - France swiftly rejected on Friday a request for asylum by WikiLeaks founder Julian Assange.

LONDON - U.S. and European security authorities are investigating whether a previously unknown leaker provided sensitive intelligence documents to WikiLeaks about alleged U.S. spying on French politicians, according to sources familiar with the matter.

PARIS - France will send a senior French intelligence official to the United States in the coming days to discuss a WikiLeaks report that Washington spied on three French presidents between at least 2006 and 2012.

PARIS - French Foreign Minister Laurent Fabius summoned the U.S. ambassador to France on Wednesday to explain a WikiLeaks report that the United States spied on three French presidents between at least 2006 and 2012, a French diplomatic source said.

PARIS - The United States National Security Agency spied on French presidents Jacques Chirac, Nicolas Sarkozy and Francois Hollande, WikiLeaks said in a press statement published on Tuesday, citing top secret intelligence reports and technical documents.

PARIS - French President Francois Hollande called a secret meeting of his cabinet about the potential consequences of a Greek exit from the euro zone as early as May 2012, WikiLeaks said on Tuesday, citing U.S. National Security Agency secret intelligence reports.

Read the original here:
WikiLeaks | Reuters.com

What Is Wikileaks, and Why Is It So Important?

What is Wikileaks?

If you've paid any attention to the news lately, you've probably heard about Wikileaks, especially when sensitive or extremely private governmental information has been released. What is Wikileaks? Why is Wikileaks so important? How does Wikileaks work?

Wikileaks is a site designed to receive and to broadcast sensitive information. The goal of Wikileaks is to provide a safe haven for journalists, private (and public) citizens, and anyone who might need to be protected from the information they upload to Wikileaks; in other words, if you're a whistle blower and need a go-between to communicate your information, Wikileaks is one of the best resources you can find.

How does Wikileaks work?

If you have sensitive information that you feel needs to have a broader audience, you can upload it to Wikileaks via the Submit documents page. According to the Wikileaks FAQ page, information submitted to Wikileaks is protected by a network of software, anonymous postal drops, and (worst case scenario) lawyers. Basically, Wikileaks operates on a policy of secrecy and strives to keep all its submitters safe from any possible reprisals.

Can the material on Wikileaks be trusted?

Because of the sensitive nature of most of the information available on Wikileaks, authenticity is not just assumed. The Wikileaks community carefully vets all submissions, making absolutely sure that the innocent are protected and that the information is both secure and authentic.

How can I find information on Wikileaks?

There are a number of different ways you can find information on Wikileaks:

Why is Wikileaks so important?

See the original post here:
What Is Wikileaks, and Why Is It So Important?

edward snowden: Pictures, Videos, Breaking News

We never bother to Google "Can you really delete a text message forever?" If we did, we'd discover a treasure trove of procedures for retrieving stuff we wish could vanish; some of those methods even include helpful YouTube videos to aid the technologically challenged.

Greg Schwem

Corporate comedian, Business emcee, Author, 'Text Me If You're Breathing'

In a very powerful exclusive interview, I recently had the privilege of speaking to an American hero, William Binney, NSA whistleblower.

When speaking out means sacrificing privacy, we lose points of view, and the quality of our democracy suffers. That should give all of us something to truly fear.

Brynne O'Neal

Brynne O'Neal is a Research and Program Associate at the Brennan Center for Justice at NYU School of Law.

The "security vs. liberty" strawman argument remains the rhetorical weapon of choice for National Security State officials terrified by the spread of public encryption technologies. They argue that, absent some form of technological "back door" to break into private encrypted communications, federal law enforcement and intelligence agencies will be blinded, unable to fend off potential terrorist attacks here at home.

More here:
edward snowden: Pictures, Videos, Breaking News

Statue of Edward Snowden – Wikipedia, the free encyclopedia

Coordinates: 404130N 735832W / 40.6918N 73.9756W / 40.6918; -73.9756

The statue of Edward Snowden, called by its creators Prison Ship Martyrs' Monument 2.0,[1] was an ephemeral, illegally-installed public statue of Edward Snowden, an American whistleblower who leaked classified information from the National Security Agency (NSA) and was charged with federal crimes as a result.[A] The bronze-like statue was placed in Fort Greene Park in Fort Greene, Brooklyn, New York City, on April 6, 2015. It was attached to a Doric column on the perimeter of the park's Prison Ship Martyrs' Monument,[B] a memorial and crypt which honors and inters the more than 11,500 American prisoners of war who died in the American Revolution while housed on British prison ships.[3][4][C]

Affixed atop an existing column, the statue was mounted by three anonymous artists and their helpers, who were dressed in white construction helmets and reflective vests in imitation of Parks Department workers,[6] early in the morning of April 6, then covered and taken down by NYC Parks officials later that day.[2][7] A hologram tribute to Snowden was subsequently installed after the statue was removed.[8]

The piece was conceived in 2014 by two artists from New York City and a sculptor from the West Coast. The sculptor volunteered his time and skill in creating the statue, with the piece eventually costing thousands of dollars to create over six months.[1][D] The artwork consisted of a 4-foot (1.2m) high, 100-pound (45kg) bust of Snowden on top of a Doric column, with a Plexiglas stand with Snowden's name on it.[2][9]

The piece was fused to Fort Greene Park's Prison Ship Martyrs' Monument[2] in the pre-dawn hours of April 6, 2015.[3] The sculptor recommended that the two artists create a bust after they had suggested a life-size statue of Snowden. The bust was made from Hydrocal, a plaster-like substance resembling bronze in appearance, which was then fixed to the pre-existing column with a non-damaging adhesive.[1] The piece was designed to be similar in style to other sculptures in the park.[E]

While it was very important to the artists that the piece be more than just a prop or papier-mache effigy, they also wished not to damage the surface to which the bust would be bound. After some debate, they decided on an adhesive that would firmly hold the head in place, yet could be removed without marring the monument.[1] The statue had Snowden's name at its base, consistent with the names on the bases of other sculptures in the park.[10]

The Guardian newspaper expressed the view that it also looked like the former White House press secretary Jay Carney and some people thought it looked more like him than Snowden (see image).[11][12]

Prison Ship Martyrs' Monument 2.0 is one of at least six sculptures and monuments to Snowden that have appeared around the world.[F] In October 2014, a statue of Snowden appeared in Union Square, Manhattan, near Henry Kirke Brown's Abraham Lincoln statue.[13] It was shown in conjunction with the Art in Odd Places festival and was sculpted by Jim Dessicino, a Delaware artist. One observer of that statue compared Snowden to Daniel Ellsberg, who leaked the Pentagon Papers to the New York Times.[G]

The creators of the statue, who were dubbed "guerrilla artists" by some in the media,[15][16] released a statement to the Animal New York website detailing their motivations and documenting the statue's installation[1] in exchange for anonymity.[H] In their statement, the artists said:

We have updated this monument to highlight those who sacrifice their safety in the fight against modern-day tyrannies. It would be a dishonor to those memorialized here to not laud those who protect the ideals they fought for, as Edward Snowden has by bringing the NSA's 4th-Amendment-violating surveillance programs to light. All too often, figures who strive to uphold these ideals have been cast as criminals rather than in bronze...Our goal is to bring a renewed vitality to the space and prompt even more visitors to ponder the sacrifices made for their freedoms. We hope this inspires them to reflect upon the responsibility we all bear to ensure our liberties exist long into the future."[3][18][19]

See original here:
Statue of Edward Snowden - Wikipedia, the free encyclopedia

Using Cryptography to Store Credentials Safely | Android …

Posted by Trevor Johns, Android Developer Relations team

Following our talk "Security and Privacy in Android Apps" at Google I/O last year, many people had specific questions about how to use cryptography in Android. Many of those revolved around which APIs to use for a specific purpose. Let's look at how to use cryptography to safely store user credentials, such as passwords and auth tokens, on local storage.

A common (but incorrect) pattern that we've recently become aware of is to use SecureRandom as a means of generating deterministic key material, which would then be used to encrypt local credential caches. Examples are not hard to find, such as here, here, here, and elsewhere.

In this pattern, rather than storing an encryption key directly as a string inside an APK, the code uses a proxy string to generate the key instead similar to a passphrase. This essentially obfuscates the key so that it's not readily visible to attackers. However, a skilled attacker would be able to easily see around this strategy. We don't recommend it.

The fact is, Android's existing security model already provides plenty of protection for this kind of data. User credentials should be stored with the MODE_PRIVATE flag set and stored in internal storage, rather than on an SD card, since permissions aren't enforced on external storage. Combined with device encryption, this provides protection from most types of attacks targeting credentials.

However, there's another problem with using SecureRandom in the way described above. Starting with Android 4.2, the default SecureRandom provider is OpenSSL, and a developer can no longer override SecureRandoms internal state. Consider the following code:

The old Bouncy Castle-based implementation allowed overriding the internally generated, /dev/urandom based key for each SecureRandom instance. Developers which attempted to explicitly seed the random number generator would find that their seed replaces, not supplements, the existing seed (contrary to the reference implementations documentation). Under OpenSSL, this error-prone behavior is no longer possible.

Unfortunately, applications who relied on the old behavior will find that the output from SecureRandom changes randomly every time their application starts up. (This is actually a very desirable trait for a random number generator!) Attempting to obfuscate encryption keys in this manner will no longer work.

A more reasonable approach is simply to generate a truly random AES key when an application is first launched:

Note that the security of this approach relies on safeguarding the generated key, which is is predicated on the security of the internal storage. Leaving the target file unencrypted (but set to MODE_PRIVATE) would provide similar security.

See the rest here:
Using Cryptography to Store Credentials Safely | Android ...

Justice for Assange

Latest:

On 11 May 2015 the Supreme Court of Sweden issued a split decision in the Assange case. Judge Svante O. Johanssons dissenting opinion argued that the detention order should be revoked because the actual harm and intrusion outweighed the reasons for a continued detention. Swedens Court of Appeal had previously rebuked the prosecutor in November 2014 for breaching her duty to progress the preliminary investigation. Read more. The Supreme Court accepted that the prosecutor had breached her duty for stalling for so long. However, the majority of judges argued that Julian Assange would continue to be detained in absentia without charge. The reasoning was that the court could overlook the fact that the preliminary investigation had been frozen for over four years now that the prosecutor had announced that she would accept to take Mr. Assanges statement in the embassy of Ecuador in London, where he has asylum.

Whats next?

The United Nations adjudicating body on arbitrary detention, the Working Group on Arbitrary Detention, is currently considering Julian Assanges filing, and a verdict is expected imminently.

Julian Assange, editor-in-chief of WikiLeaks, has detained without charge in one form or another since 7 December 2010. He is under the protection of the Ecuadorian embassy in London which has granted him asylum and recognised that he risks extradition to the United States for his publishing activities with WikiLeaks.

The US periodically confirms that a criminal national security investigation into Julian Assange and WikiLeaks is ongoing for example to a US court on 4 March 2015, and to the Washington Post on 28 January 2015.

In Sweden, Julian Assange is not charged with a crime. But in a highly unusual move, Sweden issued an Interpol Red Notice and a European Arrest Warrant, immediately after WikiLeaks began publishing a cache of 250,000 US Diplomatic Cables on 29 November 2010. Such warrants are usually issued for persons whose whereabouts are unknown. But Julian Assanges whereabouts were known (he had given a press conference and hundreds of interviews in London). His lawyers were in communication with the prosecutor and had communicated that he was available to answer questions from the Swedish prosecutor through standard means.

Questioning people within European borders is a routine and uncomplicated process, which is standardised throughout the European Union. Sweden often uses these means to question people.

In the initial ten days after 20 August 2010, the police opened the preliminary investigation, it was assigned to three different prosecutors in quick succession. The penultimate prosecutor found that the case had no basis, and that there were no grounds to place Julian Assange under a criminal investigation.

The final prosecutor however, Marianne Ny, took over on 1 September 2010 and reopened the investigation. The Swedish investigation has been frozen since 2010. In November 2014, Swedens Svea Court of Appeal ruled that the prosecutor had failed her professional duty to progress the investigation against Julian Assange.

Originally posted here:
Justice for Assange

Julian Assange Wikipdia

Un article de Wikipdia, l'encyclopdie libre.

Julian Paul Assange, n le 3 juillet 1971 Townsville en Australie[1], est un informaticien et cybermilitant australien. Il est surtout connu en tant que fondateur, rdacteur en chef et porte-parole de WikiLeaks.

Sous le coup dune extradition demande par la Sude, il vit rfugi lambassade dquateur Londres depuis juin 2012.

Julian Assange affirme tre n sur Magnetic Island (l'le Magntique)[2],[3], au large de Townsville en Australie, o il passe une grande partie de son enfance. Alors qu'il a un an, sa mre, Christine, se marie avec le directeur de thtre ambulant Brett Assange[4],[5] qui, bien que n'tant pas son pre biologique, le reconnat lgalement et lui donne son nom. Son pre biologique serait un jeune homme, rencontr Sydney, lors d'une manifestation contre la guerre au Vietnam[6].

En 1979, sa mre se remarie avec un musicien, fils prsum d'Anne Hamilton-Byrne[7], fondateur de la secte New Age Kia Lama[8],[9],[10], fonde par Anne Hamilton-Byrne. Le 12 dcembre 2010, au cours de lmission Mise au Point[11] diffuse par la Tlvision suisse romande Julian Assange voque son enfance, ainsi que les constantes prgrinations qui lont amen lui-mme, sa mre et son demi-frre devoir fuir ce quil appelle: La secte dAnne Hamilton-Byrne (Association du parc Santiniketan)[12],[11],[7].

En 1982, le couple divorce aprs la naissance du demi-frre de Julian. Les parents se disputent sa garde. Sa mre s'enfuit avec ses enfants et les cache pendant 5 ans. Cette vie d'errance conduit Julian Assange frquenter successivement 37 coles diffrentes[13],[11].

l'ge de 18 ans, Julian Assange emmnage avec sa compagne qui donne naissance leur fils, Daniel[3],[14].

En 1993, Assange participe au lancement de l'un des premiers fournisseurs de services Internet grand public en Australie, Suburbia Public Access Network. partir de 1994, Assange exerce des activits en tant que programmeur et dveloppeur de logiciels libres. En 1995, Assange crit le logiciel Strobe, un scanner de port. En 1996, il contribue lcriture de plusieurs correctifs pour le projet PostgreSQL[15]. Assange a particip la rdaction du livre Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier(en) (Dans la clandestinit: contes du piratage, de la folie et de lobsession la frontire lectronique) (1997), qui relate son histoire avec le groupe des International Subversives. Il coinvente, partir de 1997, le systme de chiffrement niable (deniable encryption) Rubberhose, un concept de cryptographie labor dans un progiciel pour GNU/Linux conu pour fournir un dni plausible contre la cryptanalyse du tuyau de caoutchouc (rubber-hose cryptanalysis). lorigine, dans lesprit de Julian Assange, ce systme devait constituer un outil au service des personnes uvrant en faveur des droits de lhomme, et qui avaient besoin de protger des donnes sensibles dans ce domaine. Parmi les autres logiciels quil a crits ou cocrits, on compte le logiciel de mise en cache NNTPCache pour Usenet et Surfraw, une interface en ligne de commande pour les moteurs de recherche Web. En 1999, Assange enregistre le nom de domaine leaks.org, mais, dit-il, ensuite, je nen ai rien fait.

Le 4 novembre 2010, dans un entretien tlvis accord la Radio tlvision suisse, il dcrit ses premiers pas d'informaticien, grce au Commodore 64 offert par sa mre[16].

Il utilise comme pseudo de hackers: "Mendax" puis "Proff". Ce dernier nom ferait allusion au roman Cryptonomicon de l'auteur de science-fiction amricain Neal Stephenson[17].

More here:
Julian Assange Wikipdia

WikiLeaks – Collateral Murder video

Political language is designed to make lies sound truthful and murder respectable, and to give the appearance of solidity to pure wind. -- George Orwell

Update: On July 6, 2010, Private Bradley Manning, a 22 year old intelligence analyst with the United States Army in Baghdad, was charged with disclosing this video (after allegedly speaking to an unfaithful journalist). The whistleblower behind the Pentagon Papers, Daniel Ellsberg, has called Mr. Manning a 'hero'. He is currently imprisoned in Kuwait. The Apache crew and those behind the cover up depicted in the video have yet to be charged. To assist Private Manning, please see bradleymanning.org.

5th April 2010 10:44 EST WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad -- including two Reuters news staff.

Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded.

The military did not reveal how the Reuters staff were killed, and stated that they did not know how the children were injured.

After demands by Reuters, the incident was investigated and the U.S. military concluded that the actions of the soldiers were in accordance with the law of armed conflict and its own "Rules of Engagement".

Consequently, WikiLeaks has released the classified Rules of Engagement for 2006, 2007 and 2008, revealing these rules before, during, and after the killings.

WikiLeaks has released both the original 38 minutes video and a shorter version with an initial analysis. Subtitles have been added to both versions from the radio transmissions.

WikiLeaks obtained this video as well as supporting documents from a number of military whistleblowers. WikiLeaks goes to great lengths to verify the authenticity of the information it receives. We have analyzed the information about this incident from a variety of source material. We have spoken to witnesses and journalists directly involved in the incident.

WikiLeaks wants to ensure that all the leaked information it receives gets the attention it deserves. In this particular case, some of the people killed were journalists that were simply doing their jobs: putting their lives at risk in order to report on war. Iraq is a very dangerous place for journalists: from 2003- 2009, 139 journalists were killed while doing their work.

See more here:
WikiLeaks - Collateral Murder video

Edward Snowden, after months of NSA revelations, says his …

Post reporter Barton Gellman discusses how his exclusive interview with Edward Snowden came about and whether the former NSA contractor would ever want to return to the United States. (Jeff Simon/The Washington Post)

MOSCOW The familiar voice on the hotel room phone did not waste words.

What time does your clock say, exactly? he asked.

He checked the reply against his watch and described a place to meet.

Ill see you there, he said.

Edward Joseph Snowden emerged at the appointed hour, alone, blending into a light crowd of locals and tourists. He cocked his arm for a handshake, then turned his shoulder to indicate a path. Before long he had guided his visitor to a secure space out of public view.

During more than 14 hours of interviews, the first he has conducted in person since arriving here in June, Snowden did not part the curtains or step outside. Russia granted him temporary asylum on Aug.1, but Snowden remains a target of surpassing interest to the intelligence services whose secrets he spilled on an epic scale.

Late this spring, Snowden supplied three journalists, including this one, with caches of top-secret documents from the National Security Agency, where he worked as a contractor. Dozens of revelations followed, and then hundreds, as news organizations around the world picked up the story. Congress pressed for explanations, new evidence revived old lawsuits and the Obama administration was obliged to declassify thousands of pages it had fought for years to conceal.

Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. One of the leaked presentation slides described the agencys collection philosophy as Order one of everything off the menu.

Six months after the first revelations appeared in The Washington Post and Britains Guardian newspaper, Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation, fueled by burgers, pasta, ice cream and Russian pastry.

Read the original post:
Edward Snowden, after months of NSA revelations, says his ...

Edward Snowden Wikipedia

Edward Joseph Ed Snowden (* 21. Juni 1983 in Elizabeth City, North Carolina)[1] ist ein US-amerikanischer Whistleblower. Seine Enthllungen gaben Einblicke in das Ausma der weltweiten berwachungs- und Spionagepraktiken von Geheimdiensten berwiegend der Vereinigten Staaten und Grobritanniens. Diese lsten so im Sommer 2013 die NSA-Affre aus.

Er wurde dafr mehrfach von nichtstaatlichen Organisationen ausgezeichnet und fr den Friedensnobelpreis nominiert. Am 8. Mai 2014 beschloss der NSA-Untersuchungsausschuss des Deutschen Bundestags im Auftrag aller Fraktionen, ihn als Zeugen zu laden. Offen blieb, wo er aussagen wird.[2]

Edward Snowden ist ein ehemaliger Agent, der als technische Fachkraft fr die US-amerikanischen Geheimdienste CIA, NSA und DIA gearbeitet hat.[3] Bis Mai 2013 arbeitete er im Auftrag der NSA als Systemadministrator fr das Beratungsunternehmen Booz Allen Hamilton im Kunia Regional SIGINT Operations Center. Im Rahmen seiner Ttigkeit hatte er Zugang zu Informationen, die als streng geheim eingestuft waren, u.a. ber US-amerikanische Programme zur berwachung der weltweiten Internetkommunikation (PRISM und Boundless Informant) sowie das noch umfassendere britische berwachungsprogramm Tempora. Snowden bermittelte diese Informationen an die Filmemacherin Laura Poitras und an den Guardian-Journalisten Glenn Greenwald, der sie im Juni 2013 ohne Angabe einer Quelle in Teilen verffentlichte.[4][5]

Am 9.Juni 2013 gab Snowden in Hongkong seine Identitt gegenber der ffentlichkeit preis.[6] Am 14.Juni 2013 erwirkte das FBI mit einer Strafanzeige u.a. wegen Spionage einen Haftbefehl gegen ihn.[7][8] Snowden konnte Hongkong verlassen, sa dann aber geraume Zeit im Transitbereich eines internationalen Flughafens in Moskau fest. Whrend seines dortigen Aufenthalts wurde auf diplomatischer Ebene um sein weiteres Schicksal gestritten.

Am 1. August 2013 vermeldete die Presse, dass Snowden von Russland Asyl erhalten habe[9]. Nach Ablauf von fnf Jahren knne er einen Antrag auf die russische Staatsangehrigkeit stellen.[10] Am 7. August 2014 gab Snowdens Anwalt Anatolij Kutscherena bekannt, dass Snowden eine Aufenthaltserlaubnis fr drei Jahre in Russland bekommen werde, diese gelte seit dem 1. August 2014.[11] In Deutschland wird Snowden von dem Menschenrechtsanwalt Wolfgang Kaleck vertreten.[12]

Edward Snowden wuchs zunchst in Wilmington, North Carolina, auf.[13] 1999 zog er mit seiner Familie nach Ellicott City, Maryland. Snowden, der noch eine ltere Schwester hat, ist der Sohn eines ehemaligen Beamten der US-Kstenwache und einer leitenden Angestellten des United States District Court des Bundesstaates Maryland.[1] Bis zu seiner Flucht nach Hongkong Ende Mai 2013 lebte er mit seiner Freundin auf der zum US-Bundesstaat Hawaii gehrenden Insel Oahu.[14]

Von 1999 bis 2001 und 2004 bis 2005 studierte Snowden Informatik am Anne Arundel Community College in Maryland. Zwischen den beiden Phasen seines Studiums meldete er sich im Jahr 2003 fr die U.S.Army, um im Irak-Krieg zu dienen.[15] Snowden verbrachte vier Monate in der United States Army Reserve, wo er als Rekrut der US-amerikanischen Special Forces einen 14-wchigen Trainingskurs absolvierte. Diesen konnte er nicht beenden, da er ausgemustert wurde, nachdem er sich bei einem Trainingsunfall beide Beine gebrochen hatte. Whrend der zweiten Phase seines Studiums arbeitete er ab 2004 als Wachmann fr eine NSA-Einrichtung an der University of Maryland. 2005 brach er sein Informatikstudium ab.[1]

Noch im Jahr 2005 wechselte Snowden zum Geheimdienst CIA, bei dem er als Techniker im Bereich der IT-Sicherheit aufgrund seines Talents relativ schnell aufsteigen konnte.[15] 2007 entsandte ihn die CIA im Rahmen dieser Ttigkeit an die diplomatische Vertretung der USA in Genf.[16] Wegen seiner Sicherheitseinstufung habe er, so Snowden, bereits zu dieser Zeit in groem Umfang Zugriff auf geheime Dokumente und Informationen gehabt. Da diese aber vor allem Menschen und nicht Systeme betrafen und er keine Menschenleben habe gefhrden wollen, habe er von einer Verffentlichung abgesehen.[13][6] Nach Angaben von US-Regierungsvertretern vom Oktober 2013 fiel Snowdens Verhalten seinem Vorgesetzten bereits 2009 auf, als er im Rahmen seiner Arbeit fr die CIA in Genf versuchte, Zugriff auf geheime Computerdateien zu erlangen. Demnach entschloss sich die CIA daraufhin, Snowden in die USA zurckzuschicken, was jedoch ansonsten keine weiteren Konsequenzen hatte.[17][18]

Anschlieend arbeitete er zunchst als freier technischer Mitarbeiter bei Dell[19] in einer NSA-Einrichtung auf einer Basis der U.S.Army in Japan.[4]

Noch im Jahr 2009 wechselte Snowden zu der Beratungsfirma Booz Allen Hamilton, ber die er als externer Mitarbeiter in einem NSA-Bro auf Hawaii als Systemadministrator ttig war.[20][21] Sein dortiges Leben vor der Verffentlichung der PRISM-Dokumente bezeichnet Snowden als sehr komfortabel. Er habe einen sicheren Job und ein Haus auf Hawaii gehabt sowie ein Jahresgehalt von etwa 122.000 US-Dollar (ca. 90.000 Euro) erhalten. Sein Spitzenverdienst in der Zeit davor habe bei 200.000 US-Dollar (ca.153.000 Euro) pro Jahr gelegen.[22]

Go here to see the original:
Edward Snowden Wikipedia