Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden - CitizenFour documentary still

Former Central Intelligence Agency (CIA) analyst Edward Snowden, known for revealing the extent of surveillance by US intelligence, has said that this form of surveillance is "more aggressive and invasive today than it was before".

Edward Snowden spoke via video feed from Russia, March 11, 2016 at the Brooklyn Academy of Music. He, and the director and journalist, Laura Poitras were interviewed by journalist Brian Lehrer.

Snowden made the statement in Moscow, where he has been granted asylum after being accused of espionage for revealing secret surveillance programmes of the US government.

The Snowden interview spanned a range of topics, including the current dispute between the FBI and Apple, which has refused to comply with a court order requiring it to help unlock an iPhone used by one of the shooters in the San Bernardino terror attack. Mr. Snowden said he was convinced that the FBI could unlock the phone on its own by “attacking” the hardware, and that it didn’t need Apple’s software.

Snowden said that not only the US has used these methods of mass surveillance, but also the Spanish, French, German and British governments because "it is cheap, easy and useful", Efe news agency reported.

“We have these programs of mass surveillance, that are monitoring everybody, everywhere, regardless of whether they have done anything wrong,” Mr. Snowden said.

“The government says this is just billing records, you shouldn’t really worry about it. But when you have a perfect record of all private lives, in aggregate, this permits intelligence agents to create what is called a pattern of life. This is when you got up … this is what you did when you got up. This is where you went to work. And how. And where you traveled. This metadata is largely the equivalent of what a private eye would know about if they were following you around and writing everything you did down.

“They couldn’t sit close enough to you at every cafe to hear everything you said. But if they hang back just a little bit, they will be able to see you without you noticing. And create a perfect record of all your associations.

“This is important … a violation of our constitution. An argument can be made for that … But the founders of this nation were concerned exactly about this kind of power.”

If that is what the country wants, Mr. Snowden said, it “should amend constitution, not do it in secret.”

According to Snowden, terrorism has been used to provide a justification for the use of this mass surveillance. "It was diplomatic manipulation, economic spying and social control. It was about power, and there is no doubt that mass surveillance increases the power of the government," he said.

He recalled that the result of an investigation ordered by US President Barack Obama on this type of surveillance found that it had not been effective in the fight against terrorism.

When asked about the possibility of returning to his country, Snowden said that he tried to reach an agreement by requesting a fair trial but the government responded with a letter promising not to torture him.

Snowden said he doubted that the Spanish government and the Spanish intelligence services (CNI) did not know about or were not involved in the mass surveillance, which he believes took place in Spain.
Yahoo: http://bit.ly/21xfatu

WSJ: http://on.wsj.com/1R1ej1p

« 'Brexit' Could Put Data Sharing in Jeopardy
Ukraine Blackout – The Future Of War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.