{"id":233221,"date":"2017-08-07T17:13:30","date_gmt":"2017-08-07T21:13:30","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-whistleblower-discusses-how-the-nsa-tracks-you-cso-online.php"},"modified":"2017-08-07T17:13:30","modified_gmt":"2017-08-07T21:13:30","slug":"nsa-whistleblower-discusses-how-the-nsa-tracks-you-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-whistleblower-discusses-how-the-nsa-tracks-you-cso-online.php","title":{"rendered":"NSA whistleblower discusses &#8216;How the NSA tracks you&#8217; &#8211; CSO Online"},"content":{"rendered":"<p><p>      Ms. Smith (not her real name) is a freelance writer and      programmer with a special and somewhat personal interest in      IT privacy and security issues.    <\/p>\n<p>    At the outdoor hacker camp and conference SHA2017, which is    taking place in the Netherlands, NSA whistleblower William    Binney gave the talk, How the NSA tracks you.  <\/p>\n<p>    As a former insider, Binney knew about this long before Snowden    dropped the documents to prove it is happening. Although he    didnt say anything new, Binney is certainly no fan of the    NSAs spying he calls the NSA the New Stasi Agency. If    you are no fan of surveillance, then his perspective from the    inside about the total invasion of the privacy rights of    everybody on the planet will fuel your fury at the NSA all    over again.  <\/p>\n<p>    In todays cable program, according to Binney, the NSA uses    corporations that run fiber lines to get taps on the lines. If    that fails, they use foreign governments to get taps on the    lines. And if that doesnt work, theyll tap the line anywhere    that they can get to it meaning corporations or    governments wont even know about the taps.  <\/p>\n<p>    The companies are involved at the next step the PRISM program, which includes collection    directly from the servers of U.S. service providers. However,    Binney said PRISM is the minor program when compared to    Upstream, which includes collecting data    from the taps on fiber-optic cables in hundreds of places    around the world. Thats where they are collecting off the    fiber lines all the data and storing it.  <\/p>\n<p>    PRISM was for show-and-tell purposes, to show Congress and    courts what the NSA was doing and to say we have warrants and    are abiding by the laws. Upstream was the one that allowed the    NSA to take everything off the line.  <\/p>\n<p>    Regarding worldwide SIGINT, CNE (computer network exploitation)    was the big one. Implants in hardware or software, lets say    switches or servers, make them do anything they want because    the NSA pwned them.  <\/p>\n<p>    That feeds the NSAs Treasure Map, which provides a map of the    entire internet in near real-time; any device, anywhere, all    the time every minute of every day. As Binney put it,    So its not just collecting what youre saying    encrypted or not but its also monitoring where    you are when you do it.  <\/p>\n<p>    Treasure Map is also how intelligence agencies use GPS from    cell phones to target drone attack victims. Binney noted there    are at least 1.2 million people on the drone hit list.  <\/p>\n<p>    He also mentioned the programs that include the input of all    phone data, fixed, mobile, satellite any kind of phone    which both the FBI and CIA can directly access so that    when they want to see who did what, they have an index, all, to    everything they ever said in their database.  <\/p>\n<p>    All the data is collected without warrants  so its a basic    violation of the rights of every human, Binney said.  <\/p>\n<p>    He also covered how other agencies can directly access the    NSAs data, Five Eyes, CIA, FBI, DEA and DIA. The police can    access it via the FBIs system.  <\/p>\n<p>    The NSA could choose to look at the right targets, but doesnt.    The NSA may collect it all, but thats not the same as    intelligence, as understanding all of what was collected. If    you use one of the hot keywords in an email, for example, it    will get flagged for review. But planned attacks happen because    analysts are so buried beneath the data they cant see the    attacks coming. Binney previously tried to convince the U.K.    that bulk data kills people.  <\/p>\n<p>    While all this data isnt helping to stop attacks, having all    the data gives the intelligence community the power to    manipulate anyone they want. Its like J. Edgar Hoover on    super steroids all the collected data gives    intelligence agencies the means to target anyone. Then parallel construction is used after the    fact to go back and build a separate basis for an investigation    to cover up the fact that the data was obtained    unconstitutionally.  <\/p>\n<p>    Before taking questions from conference attendees, Binney    pointed out an icon on a slide as a teaser to his startup,    which will advise on ways you can do privacy and security by    design. He came to Europe, since they cant get anything done    in the U.S. The U.S. and U.K. are too dense to realize it can    be done it also goes against their agenda for more    money, power and control.  <\/p>\n<p>    Can we expect more NSA employees to blow the whistle? Perhaps,    but the people in power there are corrupt, Binney said.    During the portion of the talk when attendees could ask    questions, he talked about how the NSA has employed a lot of    introverts, people with ISTJ    personalities, making them easy to threaten. Binney added that    the See Something, Say Something (about your fellow workers)    program inside the NSA is what the Stasi did. Theyre picking    up all the techniques from the Stasi and the KGB and the    Gestapo and the SS; they just arent getting violent yet    that we know of internally in the U.S.; outside    is another story.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csoonline.com\/article\/3213033\/security\/nsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html\" title=\"NSA whistleblower discusses 'How the NSA tracks you' - CSO Online\">NSA whistleblower discusses 'How the NSA tracks you' - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues. At the outdoor hacker camp and conference SHA2017, which is taking place in the Netherlands, NSA whistleblower William Binney gave the talk, How the NSA tracks you.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-whistleblower-discusses-how-the-nsa-tracks-you-cso-online.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-233221","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/233221"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=233221"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/233221\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=233221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=233221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=233221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}