How the NSA spies on you overseas
The NSA has tapped internet lines worldwide
The internet connects different continents via undersea fiber optic cables that carry truly massive amounts of data. In some places, the NSA has deals with local intelligence agencies to tap into these cables; in others, it does so on its own. The NSA even uses submarines to attach snooping bugs to wires deep beneath in the ocean.
The NSA hacks foreign companies
In Brazil, Germany and other countries, the NSA has broken into the internal networks of major telecommunications providers, intercepting the data they gather and weakening the security of their systems. It collects every email and phone call it can.
The NSA knows exactly what you own and buy
The NSA has access, through agreements and hacking, to major credit card networks, payment gateways, and wire transfer facilities. This allows it to follow every cent of your money, where it comes from, and what you are spending it on.
The British government's program of mass surveillance, revealed by US whistleblower Edward Snowden, has been ruled unlawful by the European Court of Human Rights.
The judges ruled by five to two that the mass interception of phone and internet data violated Article 8 of the European Convention on Human Rights, which guarantees the right to privacy, thanks to 'inadequate' safeguards.[s5]
They also voted six to one that the program was 'not in accordance with the law'. However, they decided, sharing the information that was gathered with foreign governments was not in itself a breach of human rights.
Documents leaked by Snowden revealed that the UK's GCHQ intelligence agency was engaging in 'population-scale' interception of communications. This included Tempora, a bulk data store of all internet traffic; Karma Police - 'a web browsing profile for every visible user on the internet' - and Black Hole, a database containing more than a trillion events including internet histories, email and instant messenger records, search engine queries and social media activity.
The Court expressed concern that this mass data collection 'could be capable of painting an intimate picture of a person through the mapping of social networks, location tracking, internet browsing tracking, mapping of communication patterns, and insight into who a person interacted with'.
The case was brought by a group of human rights organisations, who have welcomed the judgement.
"Under the guise of counter-terrorism, the UK has adopted the most authoritarian surveillance regime of any Western state, corroding democracy itself and the rights of the British public," comments Silkie Carlo, director of Big Brother Watch.
"This judgment is a vital step towards protecting millions of law-abiding citizens from unjustified intrusion. However, since the new Investigatory Powers Act arguably poses an ever-greater threat to civil liberties, our work is far from over."
|
Since Snowden's revelations, the legal landscape in the UK has changed somewhat, with the passing of the Investigatory Powers Act in 2016. This effectively legitimized the mass surveillance under UK law.
However, while the UK is still apparently planning to leave the EU, its surveillance activities are still subject to European law for the time being - and will to an extent remain so, as any data-sharing agreement will require the UK to give adequate protection to EU citizens.
"What is at stake is the future of mass surveillance of European citizens, not only by UK secret services. The lack of accountability is not acceptable when the GCHQ penetrates Europe’s communication data with their mass surveillance techniques," says Dr Constanze Kurz, spokeswoman for the German Chaos Computer Club.
"We all have to demand now that our human rights and more respect of the privacy of millions of Europeans will be acknowledged by the UK government and also by all European countries."
[s1]
общ.
| Закон США "Об объединении и укреплении государства путём соблюдения прав человека, прекращения сбора персональных данных, передаваемых по сетям электросвязи, запрета на отслеживание перемещения граждан и отмены упрощённого порядка получения ордеров на сбор такой информации органами национальной безопасности США" (The USA FREEDOM Act or Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection and Online Monitoring Act // Несмотря на то, что названия законов в США нередко "подгоняются" под "красивый" акроним, переводить название закона таким акронимом мне лично кажется не совсем верным. Можно перевести по сути, а перевод смыслового акронима дать в скобках. // Кроме того, мне кажется, что слово "Америка" в переводе лучше заменить словом "государство" 4uzhoj) |
|
[s2] PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies.[1][2][3] The program is also known by the SIGAD US-984XN.[4][5]PRISM collects stored internet communications based on demands made to internet companies such as Google LLCunder Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6]The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[7][8] and to get data that is easier to handle, among other things.[9]
[s3]операция по оперативному проникновению в компьютерные сети противника
he Office of Tailored Access Operations (TAO), now Computer Network Operations,[1] is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least circa 1998.[2][3] TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.[4][5][6][7]
TAO is reportedly "now the largest and arguably the most important component of the NSA's huge Signals Intelligence Directorate (SID)[8] (SIGINT), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers".[2]
[s4]система ограничения доступа
[s5]меры предосторожности