NSA leaker, Edward Snowden, is a finalist for this year's Sakharov Prize, awarded annually by the European Parliament to those who "combat fanatacism, intolerance or oppression."
Also in the running this year are "a group of jailed Belarusian political activists representing “all Belarusian political prisoners,” and Malala Yousafzai,
the 16-year-old Pakistani girl from Swat Valley who survived Taliban
assassins who had marked her after she advocated education for girls.
The winner will be picked by Oct. 10 by the Parliament’s president and
the leaders of the body’s political groups.
Snowden's nomination and shortlisting are enough to rile Washington. The Euros knew that when they let him through to the finals.
The European Parliament is the only directly elected body within the
European Union setup, and its selection of Snowden provides an insight
into how his revelations are viewed in Europe, even as he faces criminal
charges in the United States.
Dominique Moisi,
an expert on European-American relations at the French Institute for
International Relations, cautioned that the nomination says more about
the nominating parties than about a broader European view. But even he
acknowledged that the inclusion of Snowden in the final three
underscores a major difference between the United States and Europe.
“Perhaps it says that with the NSA scandal, the United States has isolated itself among democratic countries,” he said.
My guess is that Malala will win. It's hard to imagine the Euros wanting to goad the Americans badly enough to award the prize to Snowden. Then again, who knows?
Showing posts with label Snowden. Show all posts
Showing posts with label Snowden. Show all posts
Tuesday, October 01, 2013
Wednesday, September 04, 2013
America's Cyber Guerrilla Army
They don't wear boots or carry assault rifles but they're far more dangerous to America's adversaries. They're machines situated in key spots around the world that have been covertly captured by America's spy agencies, an estimated 85,000 so far and growing rapidly. Thanks Edward Snowden for the heads up.
U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents obtained by The Washington Post.
Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed “covert implants,” sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions.
The documents provided by Snowden and interviews with former U.S. officials describe a campaign of computer intrusions that is far broader and more aggressive than previously understood. The Obama administration treats all such cyber-operations as clandestine and declines to acknowledge them.
The administration’s cyber-operations sometimes involve what one budget document calls “field operations” abroad, commonly with the help of CIA operatives or clandestine military forces, “to physically place hardware implants or software modifications.”
...Much more often, an implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets.
...The implants that TAO creates are intended to persist through software and equipment upgrades, to copy stored data, “harvest” communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others.
Sometimes an implant’s purpose is to create a back door for future access. “You pry open the window somewhere and leave it so when you come back the owner doesn’t know it’s unlocked, but you can get back in when you want to,” said one intelligence official, who was speaking generally about the topic and was not privy to the budget. The official spoke on the condition of anonymity to discuss sensitive technology.
Under U.S. cyberdoctrine, these operations are known as “exploitation,” not “attack,” but they are essential precursors both to attack and defense.
The NSA appears to be planning a rapid expansion of those numbers, which were limited until recently by the need for human operators to take remote control of compromised machines. Even with a staff of 1,870 people, GENIE made full use of only 8,448 of the 68,975 machines with active implants in 2011.
For GENIE’s next phase, according to an authoritative reference document, the NSA has brought online an automated system, code-named TURBINE, that is capable of managing “potentially millions of implants” for intelligence gathering “and active attack.”
Subscribe to:
Posts (Atom)