WikiLeaks and the NSA’s Hobby of Spying On Allies

Screen-shot-2015-07-01-at-2.01.00-PM.png

The intercepted communication was shared with the “Five Eyes” alliance—UK, Australia, New Zealand, and Canada.

WikiLeaks have released a new collection of documents, which give a particularly clear picture of the NSA’s spying patterns on its allies. The documents dubbed “The Euro Intercepts,” detail the systematic spying of the NSA on the economic institutions and officials of France and Germany.

Wikileaks tweeted details regarding specific spying that the NSA had conducted on government officials close to German Chancellor Angela Merkel, including her personal assistant. WikiLeaks also published a list of some of the NSA’s most high value targets in the German government and economic sectors, including their partial phone numbers and identifying.
The leaked information also details the level of collaboration between the United States’ NSA and the UK’s GCHQ. New intel discusses the duo’s efforts towards bugging closed-door meetings, including recently French President François Hollande and Merkel’s bailout plans for Greece.

The recent documents uncovering NSA spying on Germany and France have prompted outrage in Europe and created major headaches for the Obama administration.

The timing of the release is far from coincidental, earlier the Merkel administration named a former senior judge as special investigator to examine a list of NSA-provided targets that German Intelligence had been tracking. Merkel’s perceived collaboration with the United States’ intelligence gathering has caused a major hit to her administration’s popularity in recent months.

In a statement regarding the recent documents release, WikiLeaks founder Julian Assange said:
“Today’s publication further demonstrates that the United States’ economic espionage campaign extends to Germany and to key European institutions and issues such as the EU Central Bank and the crisis in Greece.”

The whistle-blowing website published a National Security Agency list of 29 Brazilian government phone numbers that the American spy group monitored. Publication of the list sheds new light on the spying scandal that first erupted in 2013 and damaged relations between America and Brazil, prompting Rousseff to cancel a state visit to Washington in an embarrassment for President Barack Obama. However Rousseff did finally visit the United States recently, but the new spying revelations did not emerge until just after her return.

According to a story on The Intercept website, which first reported the WikiLeaks data, the eavesdropping apparently began in early 2011 or even earlier. The Intercept said there was no indication the surveillance had stopped. The NSA did not respond to questions from the website.
In a statement, WikiLeaks editor-in-chief Julian Assange said the latest disclosures could impact business confidence in Brazil.

The latest disclosures come on the heels of new WikiLeaks releases that appeared to show the United States listened in on German and French government officials.
Techcrunch: http://tcrn.ch/1DbzbdH

« The Third Industrial Revolution
Cyber Threats Create Business Opportunities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.