Merkel Bugged While Pondering Greece Crisis

Tsipras_Merkel.jpg

The United States National Security Agency has been massively targeting phone numbers of top German ministers and public officials responsible for commerce, finances, economics and agriculture – including even Angela Merkel's personal assistant.

WikiLeaks published a list of 69 German government telephone numbers from a high-priority NSA target interception list demonstrating economic and political espionage against Germany for almost two decades. WikiLeaks is also publishing classified interception reports resulting from the surveillance, showing the US and UK spying on German officials discussing their positions and disagreements on the solution to the Greek financial crisis.

Discussing the Greek financial crisis with her personal assistant on 11 October, German Chancellor Angela Merkel professed to be at a loss as to which option--another haircut or a transfer union--would be best for addressing the situation. (The term "haircut" refers to the losses that private investors would incur on the current net value of their Greek bond holdings.) 

Merkel's fear was that Athens would be unable to overcome its problems even with an additional haircut, since it would not be able to handle the remaining debt. Furthermore, she doubted that sending financial experts to Greece would be of much help in bringing the financial system there under control. 

Within the German cabinet, Finance Minister Wolfgang Schnaeuble alone continued to strongly back another haircut, despite Merkel's efforts to rein him in, while France and European Commission President Jose Manuel Barroso were seen to be in favor of a gentler approach. European Central Bank President Jean-Claude Trichet was solidly opposed, with IMF Managing Director Christine Lagarde described as undecided on the issue. 

Finally, Merkel believed that action must be taken to enact a Financial Transaction Tax (FTT); doing so next year, she assessed, would be a major step toward achieving some balance in relief for banks. In that regard, the Germans thought that pressure could be brought to bear on the US and British governments to help bring about an FTT.

Wikileaks

 

« Court Briefly Returns NSA Surveillance Program
Police campaign: UK Cybercrime Surges 27% in 2015 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

4Securitas

4Securitas

4Securitas is an innovative cyber security firm focused on protecting critical data at the core of every organisation.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.