Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden - CitizenFour documentary still

Former Central Intelligence Agency (CIA) analyst Edward Snowden, known for revealing the extent of surveillance by US intelligence, has said that this form of surveillance is "more aggressive and invasive today than it was before".

Edward Snowden spoke via video feed from Russia, March 11, 2016 at the Brooklyn Academy of Music. He, and the director and journalist, Laura Poitras were interviewed by journalist Brian Lehrer.

Snowden made the statement in Moscow, where he has been granted asylum after being accused of espionage for revealing secret surveillance programmes of the US government.

The Snowden interview spanned a range of topics, including the current dispute between the FBI and Apple, which has refused to comply with a court order requiring it to help unlock an iPhone used by one of the shooters in the San Bernardino terror attack. Mr. Snowden said he was convinced that the FBI could unlock the phone on its own by “attacking” the hardware, and that it didn’t need Apple’s software.

Snowden said that not only the US has used these methods of mass surveillance, but also the Spanish, French, German and British governments because "it is cheap, easy and useful", Efe news agency reported.

“We have these programs of mass surveillance, that are monitoring everybody, everywhere, regardless of whether they have done anything wrong,” Mr. Snowden said.

“The government says this is just billing records, you shouldn’t really worry about it. But when you have a perfect record of all private lives, in aggregate, this permits intelligence agents to create what is called a pattern of life. This is when you got up … this is what you did when you got up. This is where you went to work. And how. And where you traveled. This metadata is largely the equivalent of what a private eye would know about if they were following you around and writing everything you did down.

“They couldn’t sit close enough to you at every cafe to hear everything you said. But if they hang back just a little bit, they will be able to see you without you noticing. And create a perfect record of all your associations.

“This is important … a violation of our constitution. An argument can be made for that … But the founders of this nation were concerned exactly about this kind of power.”

If that is what the country wants, Mr. Snowden said, it “should amend constitution, not do it in secret.”

According to Snowden, terrorism has been used to provide a justification for the use of this mass surveillance. "It was diplomatic manipulation, economic spying and social control. It was about power, and there is no doubt that mass surveillance increases the power of the government," he said.

He recalled that the result of an investigation ordered by US President Barack Obama on this type of surveillance found that it had not been effective in the fight against terrorism.

When asked about the possibility of returning to his country, Snowden said that he tried to reach an agreement by requesting a fair trial but the government responded with a letter promising not to torture him.

Snowden said he doubted that the Spanish government and the Spanish intelligence services (CNI) did not know about or were not involved in the mass surveillance, which he believes took place in Spain.
Yahoo: http://bit.ly/21xfatu

WSJ: http://on.wsj.com/1R1ej1p

« 'Brexit' Could Put Data Sharing in Jeopardy
Ukraine Blackout – The Future Of War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.