News Updates from CLG 03 July 2017
Previous edition: USS Reagan crew can sue Japanese company over Fukushima nuclear disaster – court
US authorities tapped 3 mln phones in single wiretap order in 2016 | 01 July 2017 | It took US authorities a single wiretap order to intercept and record over 3 million phone calls and messages last year, the Wiretap Report 2016, published by the United States Courts, revealed. The intercepts were carried out over the course of two months by an undisclosed government agency, which applied for the wiretap order in late 2015, according to the report, brought to media attention by the ZDNet website.
NSA’s use of ‘traffic shaping’ allows unrestrained spying on Americans | 22 June 2017 | A new analysis of documents leaked by whistleblower Edward Snowden details a highly classified technique that allows the National Security Agency to “deliberately divert” US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans. According to the new analysis, the NSA has clandestine means of “diverting portions of the river of internet traffic that travels on global communications cables,” which allows it to bypass protections put into place by Congress to prevent domestic surveillance on Americans. The new findings, published Thursday, follows a 2014 published paper, which theorized that the NSA, whose job it is to produce intelligence from overseas targets, was using a “traffic shaping” technique to route US internet data overseas so that it could be incidentally collected under the authority of a largely unknown executive order.
Australia to Seek Greater Powers on Encrypted Messaging at ‘Five Eyes’ Meeting | 25 June 2017 | Australia said on Sunday it will push for greater powers to tackle the use of encrypted messaging services used by terrorists and criminals at an upcoming meeting of ministers from the “Five Eyes” intelligence network. The United States, United Kingdom, Canada, Australia, and New Zealand, will meet in the Canadian city of Ottawa next week, where they will discuss tactics to combat terrorism and border protection, two senior Australian ministers said. Australia has made it clear it wants tech companies to do much more to give intelligence and law enforcement agencies access to encrypted communications.
‘Petya’ ransomware attack stems from NSA exploit – Snowden, security experts | 27 June 2017 | The Petya ransomw-re that spread across the globe Tuesday was made possible thanks to EternalBlue – a hacking tool used by the NSA to exploit a Windows vulnerability it left open for five years, Edward Snowden and security experts have said…”How many times does @NSAGov’s development of digital weapons have to result in harm to civil infrastructure before there is accountability?” Snowden tweeted. The NSA’s hacking team, Equation Group (or Tailored Access Operations), lost control of its trove of hacking exploits and, last August, a group calling themselves the Shadow Brokers announced it had access to those tools.