Nine out of 10 people in Edward Snowden’s NSA intercepts were not targets

Provided conversations: Former NSA contractor Edward Snowden. Photo: Reuters

Washington: Ordinary internet users far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from US digital networks.

Nine out of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided to The Washington Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.

Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, email addresses or other details that the NSA marked as belonging to US citizens or residents. NSA analysts masked, or "minimised", more than 65,000 such references to protect Americans' privacy, but nearly 900 additional email addresses were found unmasked in the files, which could be strongly linked to US citizens or residents.

There are discoveries of considerable intelligence value in the intercepted messages but also collateral harm to privacy on a scale that the Obama administration has not been willing to address.

Advertisement

Among the most valuable contents whichthe Post didnot describe in detail, to avoid harm to continuing operations are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power and the identities of aggressive intruders into US computer networks.

Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture of Pakistan-based bomb maker Muhammad Tahir Shahzadand Umar Patek, a suspect in a 2002 terrorist bombing in Bali.

Many other files, described as useless by the analysts but nonetheless retained, have an intimate quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.

About 160,000 intercepted email and instant message conversations were reviewed, along with 7900 documents taken from more than 11,000 online accounts.

Read more from the original source:
Nine out of 10 people in Edward Snowden's NSA intercepts were not targets

Ordinary people outnumber targeted foreigners in NSA data

WASHINGTON - The Washington Post said on Saturday a study of a large collection of communications intercepted by the US National Security Agency showed that ordinary Internet users, including Americans, far outnumbered legally targeted foreigners caught in the surveillance. "Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else," the Post said.

Nearly half of the files "contained names, email addresses or other details that the NSA marked as belonging to US citizens or residents," it said.

The paper said the files also contained discoveries of considerable intelligence value, including "fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into US computer networks." Tracking the communications led to the capture of some terrorism suspects, including Umar Patek, a suspect in a 2002 bombing on the Indonesian island of Bali, it said.

Many other files were retained although, described as useless by analysts, they were about intimate issues such as love, illicit sexual relations, political and religious conversions and financial anxieties, the Post said.

The paper said it reviewed about 160,000 emails and instant-message conversations and 7,900 documents taken from more than 11,000 online accounts, collected between 2009 and 2012.

US intelligence officials declined to confirm or deny in general terms the authenticity of the intercepted content provided by Snowden to the Post.

Read more here:
Ordinary people outnumber targeted foreigners in NSA data

HACKING India Summons US Diplomat To Protest NSA Spying On Ruling Party 02Jul2014 – Video


HACKING India Summons US Diplomat To Protest NSA Spying On Ruling Party 02Jul2014
How To Go To Heaven: http://www.jesus-is-savior.com/how_to_be_saved.html http://www.presstv.ir/detail/2014/07/02/369557/india-calls-in-us-envoy-over-spying/ ...

By: VexZeen

Read more:
HACKING India Summons US Diplomat To Protest NSA Spying On Ruling Party 02Jul2014 - Video

Vision+ Utility Pro V1.0 Demo Video for DJI Phantom 2 Vision + Booster Encryption – Video


Vision+ Utility Pro V1.0 Demo Video for DJI Phantom 2 Vision + Booster Encryption
Download it at http://play.google.com/store/apps/details?id=com.taco_rc.visionplusutilitypro Vision+ Utility enhances the DJI Phantom 2 Vision+ WiFi video co...

By: TACODOTTOY

Visit link:
Vision+ Utility Pro V1.0 Demo Video for DJI Phantom 2 Vision + Booster Encryption - Video

Crypto thwarts TINY MINORITY of Feds’ snooping efforts

The Essential Guide to IT Transformation

US government court-sanctioned wiretaps were sometimes defeated by encryption, according to official figures on law enforcement eavesdropping released this week.

State police were unable to circumvent the encryption used by criminal suspects in nine cases last year, while plain text was recovered in 32 of 41 cases where use of cryptography was a factor last year. By comparison, law enforcement was stymied by crypto in four cases during 2012.

Prior to two years ago, crypto had never prevented cops from snooping on a criminal suspect, Wired reports. Crypto had been used by criminal suspects in cases dating back as early as 2004 but its use had never been successful until much more recently.

Federal and state police snooped on US suspects phone calls, text messages, and other communications 3,576 times in 2013, an increase of five per cent from 2012. This means that crypto was a factor in just one in 100 cases. The vast majority of investigations (87 per cent) involved drugs.

Only one wiretap application in a domestic criminal case was denied during the whole of 2013.

Most court orders covered the interception of mobile phone or pager traffic. The average length of an order was 40 days.

US and British intel agencies and the FBI have warned that the internet was liable to "going dark" because of the wider use of cryptography by criminal and terrorist suspects in the wake of the Snowden leaks. This dystopian scenario has failed to play out as predicted, at least on the basis of these figures.

This report omits data on interceptions regulated by the Foreign Intelligence Surveillance Act of 1978, so it doesn't cover the work of the NSA. That also means that the figures are skewed towards the use of wiretaps in investigating conventional crimes rather than national security or terrorism-related investigations, where the use of crypto might be expected to figure as a factor more frequently.

The cost of surveillance is falling, possibly due to advances in technology as much as anything else. The average cost of intercept devices in 2013 was $41,119, down 18 per cent from the average cost in 2012. For federal wiretaps the average cost in reported cases was $43,361, a 25 per cent decrease from 2012.

Read more from the original source:
Crypto thwarts TINY MINORITY of Feds' snooping efforts