Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden - CitizenFour documentary still

Former Central Intelligence Agency (CIA) analyst Edward Snowden, known for revealing the extent of surveillance by US intelligence, has said that this form of surveillance is "more aggressive and invasive today than it was before".

Edward Snowden spoke via video feed from Russia, March 11, 2016 at the Brooklyn Academy of Music. He, and the director and journalist, Laura Poitras were interviewed by journalist Brian Lehrer.

Snowden made the statement in Moscow, where he has been granted asylum after being accused of espionage for revealing secret surveillance programmes of the US government.

The Snowden interview spanned a range of topics, including the current dispute between the FBI and Apple, which has refused to comply with a court order requiring it to help unlock an iPhone used by one of the shooters in the San Bernardino terror attack. Mr. Snowden said he was convinced that the FBI could unlock the phone on its own by “attacking” the hardware, and that it didn’t need Apple’s software.

Snowden said that not only the US has used these methods of mass surveillance, but also the Spanish, French, German and British governments because "it is cheap, easy and useful", Efe news agency reported.

“We have these programs of mass surveillance, that are monitoring everybody, everywhere, regardless of whether they have done anything wrong,” Mr. Snowden said.

“The government says this is just billing records, you shouldn’t really worry about it. But when you have a perfect record of all private lives, in aggregate, this permits intelligence agents to create what is called a pattern of life. This is when you got up … this is what you did when you got up. This is where you went to work. And how. And where you traveled. This metadata is largely the equivalent of what a private eye would know about if they were following you around and writing everything you did down.

“They couldn’t sit close enough to you at every cafe to hear everything you said. But if they hang back just a little bit, they will be able to see you without you noticing. And create a perfect record of all your associations.

“This is important … a violation of our constitution. An argument can be made for that … But the founders of this nation were concerned exactly about this kind of power.”

If that is what the country wants, Mr. Snowden said, it “should amend constitution, not do it in secret.”

According to Snowden, terrorism has been used to provide a justification for the use of this mass surveillance. "It was diplomatic manipulation, economic spying and social control. It was about power, and there is no doubt that mass surveillance increases the power of the government," he said.

He recalled that the result of an investigation ordered by US President Barack Obama on this type of surveillance found that it had not been effective in the fight against terrorism.

When asked about the possibility of returning to his country, Snowden said that he tried to reach an agreement by requesting a fair trial but the government responded with a letter promising not to torture him.

Snowden said he doubted that the Spanish government and the Spanish intelligence services (CNI) did not know about or were not involved in the mass surveillance, which he believes took place in Spain.
Yahoo: http://bit.ly/21xfatu

WSJ: http://on.wsj.com/1R1ej1p

« 'Brexit' Could Put Data Sharing in Jeopardy
Ukraine Blackout – The Future Of War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.