{"id":25125,"date":"2014-07-26T14:40:59","date_gmt":"2014-07-26T18:40:59","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25125"},"modified":"2014-07-26T14:40:59","modified_gmt":"2014-07-26T18:40:59","slug":"nsa-spying-cooperation-with-saudis","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/nsa-spying-cooperation-with-saudis.php","title":{"rendered":"NSA spying cooperation with Saudis"},"content":{"rendered":"<p><p>  A newly leaked document shows  that the US National Security Agency has been sharing  intelligence with Saudi Arabia.<\/p>\n<p>      The US National Security Agency (NSA) last year      significantly expanded its intelligence cooperation with      Saudi Arabia, one of the worlds most repressive and abusive      regimes, a newly leaked document shows.    <\/p>\n<p>    An April 2013 top secret memo provided to The Intercept by NSA    whistleblower Edward Snowden, details the NSAs plans to    provide direct analytic and technical support on Internal    security matters for the Saudi Ministry of Interior (MOI) and    Saudi Ministry of Defense (MOD).  <\/p>\n<p>    The memo describes a period of rejuvenation for the NSAs    relationship with the Saudis, as part of the Obama    administrations effort to enhance relations with the Saudi    regime, The Intercept reports.  <\/p>\n<p>    One secret 2007 NSA memo lists Saudi Arabia as one of four    countries where the US has [an] interest in regime    continuity, indicating that US support for Riyadh has existed    for years.  <\/p>\n<p>    However, the leaked memo shows that in December 2012, James    Clapper, the US Director of National Intelligence, authorized    the NSA to expand its third party relationship with Saudi    Arabia to include the sharing of signals intelligence, or    SIGINT, capability with the MODs Technical Affairs    Directorate (TAD).  <\/p>\n<p>    With the approval of the Third Party SIGINT relationship, the    memo reports, the NSA intends to provide direct analytic and    technical support to TAD. The goal is to facilitate the Saudi    governments ability to utilize SIGINT to locate and track    individuals of mutual interest within Saudi Arabia.  <\/p>\n<p>    Even before this new initiative in 2012, the NSA and CIA had    been working with the Saudi regime to bolster Internal    security and track alleged terrorists, the memo shows.  <\/p>\n<p>    The NSAs formal Third Party relationship with the Saudis    involves arming the Saudi Ministry of Defense with highly    advanced surveillance technology. The NSA provides technical    advice on SIGINT topics such as data exploitation and target    development to TAD, the memo says, as well as a sensitive    source collection capability.  <\/p>\n<p>    According to the document, the intelligence collaboration    between Washington and Riyadh has been like a two-way street,    with both countries sharing information they secretly collect.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.presstv.ir\/detail\/2014\/07\/26\/372871\/nsa-sharing-intelligence-with-saudis\" title=\"NSA spying cooperation with Saudis\">NSA spying cooperation with Saudis<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A newly leaked document shows that the US National Security Agency has been sharing intelligence with Saudi Arabia. The US National Security Agency (NSA) last year significantly expanded its intelligence cooperation with Saudi Arabia, one of the worlds most repressive and abusive regimes, a newly leaked document shows<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-25125","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25125"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25125"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25125\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}