Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden - CitizenFour documentary still

Former Central Intelligence Agency (CIA) analyst Edward Snowden, known for revealing the extent of surveillance by US intelligence, has said that this form of surveillance is "more aggressive and invasive today than it was before".

Edward Snowden spoke via video feed from Russia, March 11, 2016 at the Brooklyn Academy of Music. He, and the director and journalist, Laura Poitras were interviewed by journalist Brian Lehrer.

Snowden made the statement in Moscow, where he has been granted asylum after being accused of espionage for revealing secret surveillance programmes of the US government.

The Snowden interview spanned a range of topics, including the current dispute between the FBI and Apple, which has refused to comply with a court order requiring it to help unlock an iPhone used by one of the shooters in the San Bernardino terror attack. Mr. Snowden said he was convinced that the FBI could unlock the phone on its own by “attacking” the hardware, and that it didn’t need Apple’s software.

Snowden said that not only the US has used these methods of mass surveillance, but also the Spanish, French, German and British governments because "it is cheap, easy and useful", Efe news agency reported.

“We have these programs of mass surveillance, that are monitoring everybody, everywhere, regardless of whether they have done anything wrong,” Mr. Snowden said.

“The government says this is just billing records, you shouldn’t really worry about it. But when you have a perfect record of all private lives, in aggregate, this permits intelligence agents to create what is called a pattern of life. This is when you got up … this is what you did when you got up. This is where you went to work. And how. And where you traveled. This metadata is largely the equivalent of what a private eye would know about if they were following you around and writing everything you did down.

“They couldn’t sit close enough to you at every cafe to hear everything you said. But if they hang back just a little bit, they will be able to see you without you noticing. And create a perfect record of all your associations.

“This is important … a violation of our constitution. An argument can be made for that … But the founders of this nation were concerned exactly about this kind of power.”

If that is what the country wants, Mr. Snowden said, it “should amend constitution, not do it in secret.”

According to Snowden, terrorism has been used to provide a justification for the use of this mass surveillance. "It was diplomatic manipulation, economic spying and social control. It was about power, and there is no doubt that mass surveillance increases the power of the government," he said.

He recalled that the result of an investigation ordered by US President Barack Obama on this type of surveillance found that it had not been effective in the fight against terrorism.

When asked about the possibility of returning to his country, Snowden said that he tried to reach an agreement by requesting a fair trial but the government responded with a letter promising not to torture him.

Snowden said he doubted that the Spanish government and the Spanish intelligence services (CNI) did not know about or were not involved in the mass surveillance, which he believes took place in Spain.
Yahoo: http://bit.ly/21xfatu

WSJ: http://on.wsj.com/1R1ej1p

« 'Brexit' Could Put Data Sharing in Jeopardy
Ukraine Blackout – The Future Of War »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.