India: Government Moves To Ban Google’s Gmail

India Moves to Ban Gmail (Liberty Blitzkrieg, Aug 31, 2013):

The fallout from the Snowden revelations continue. While India has already been attempting to fight economic reality with import duties on gold in an desperate move to reduce buying, they are now also trying to take further control of their technology infrastructure. Although this may appear to be a good thing on the surface, perhaps it is merely a move to further consolidate their own domestic snooping powers, which we already know they are trying to do.

In the latest news, it is being reported that the government will soon ask its employees to stop using Google’s Gmail due to the presence of the company’s servers within the U.S.

More from The Times of India:

BANGALORE/NEW DELHI: The government will soon ask all its employees to stop using Google’s Gmail for official communication, a move intended to increase security ofconfidential government information after revelations of widespread cyberspying by the US.

A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India’s National Informatics Centre.

Read moreIndia: Government Moves To Ban Google’s Gmail

GOOGLE: If You Send To Gmail, You Have ‘No Legitimate Expectation Of Privacy’

GOOGLE: If You Send To Gmail, You Have ‘No Legitimate Expectation Of Privacy’ (San Francisco Chronicle, Aug 13, 2013):

If you happen to send an email to one of the 400 million people who use Google’s Gmail service, you shouldn’t have any expectation of privacy, according to a court briefing obtained by the Consumer Watchdog website.

In a motion filed last month by Google to have a class action complaint dismissed, Google’s lawyers reference a 1979 ruling, holding that people who turn over information to third parties shouldn’t expect that information to remain private.

From the filing (emphasis added):

Read moreGOOGLE: If You Send To Gmail, You Have ‘No Legitimate Expectation Of Privacy’

NSA Loophole Allows Warrantless Search For US Citizens’ Emails And Phone Calls

NSA has secret backdoor permission to search databases for individual Americans’ communications


Detail of Section 702 of the Fisa Amendments Act (FAA), which gives the NSA authority to target without warrant the communications of foreign targets.

NSA loophole allows warrantless search for US citizens’ emails and phone calls (Guardian, Aug 9, 2013):

The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens’ email and phone calls without a warrant, according to a top-secret document passed to the Guardian by Edward Snowden.

The previously undisclosed rule change allows NSA operatives to hunt for individual Americans’ communications using their name or other identifying information. Senator Ron Wyden told the Guardian that the law provides the NSA with a loophole potentially allowing “warrantless searches for the phone calls or emails of law-abiding Americans”.

Read moreNSA Loophole Allows Warrantless Search For US Citizens’ Emails And Phone Calls

Edward Snowden’s Email Service Provider Shuts Down Following U.S. Government Pressure

Snowden’s Email Service Provider Shuts Down Following Government Pressure (ZeroHedge, Aug 8, 2013):

Secure and free web-based email service provider Lavabit shut down today. What makes Lavabit different from countless other email providers who have shuttered over the years is that according to BoingBoing, Lavabit is the email service supposedly used by Edward Snowden. Which would explain the nebulous tone in the farewell letter posted on the company’s front page by owner Ladar Levison. It also explains why Lavabit was shut down by the US government, although that was mostly inferred from the letter which due to legal limitations does not expound on the official reasons for the shut down – one can imagine. It certainly explains the following punchline in Levison’s letter: “This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States.“We wholeheartedly agree.

Lavabit’s farewell letter:

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

Read moreEdward Snowden’s Email Service Provider Shuts Down Following U.S. Government Pressure

Battle Royale On Piers Morgan: Glenn Greenwald, James Risen And Jeffrey Toobin (Video)

Battle Royale on Piers Morgan: Glenn Greenwald, James Risen and Jeffrey Toobin (Liberty Blitzkrieg, Aug 3, 2013):

“That’s the thing I don’t understand about the climate in Washington these days. People want to have debates on television and elsewhere, but then you want to throw the people that start the debates in jail.”
– James Risen, New York Times Pulitzer Prize Winning Journalist (he now faces jail time)

The above quote occurred during an excellent discussion between Glenn Greenwald, James Risen and Jeffrey Toobin on Piers Morgan’s show. While pretty much everyone on planet earth knows who Glenn Greenwald is at this point, most people do not know who James Risen is. This is a situation that must change. Mr. Risen is at the center of another very important case that threatens the future of freedom of the press in these United States.

In his book State of War, James Risen published information leaked to him by former CIA agent Jeffrey Sterling, who is currently being charged under the Espionage Act by President Transparency, Barrack Obama. While a lower court had previously ruled Mr. Risen should be afforded reporter privilege to not testify against Mr. Sterling, a federal appeals court last month saw it differently in a 2-1 decision.

Read moreBattle Royale On Piers Morgan: Glenn Greenwald, James Risen And Jeffrey Toobin (Video)

Britain: Telecoms Companies Give Spy Agency GCHQ Secret Unlimited Access To Their Undersea Cables

Flashback:

UK’s Electronic Eavesdropping And Security Agency GCHQ Also Accesses NSA’s Secret PRISM Programme


Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables


Verizon, BT and Vodafone Cable have given GCHQ secret unlimited access to their network of undersea cable

BT and Vodafone among telecoms companies passing details to GCHQ (Guardian, Aug 2, 2013):

Some of the world’s leading telecoms firms, including BT and Vodafone, are secretly collaborating with Britain’s spy agency GCHQ, and are passing on details of their customers’ phone calls, email messages and Facebook entries, documents leaked by the whistleblower Edward Snowden show.

BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables. The cables carry much of the world’s phone calls and internet traffic.

Read moreBritain: Telecoms Companies Give Spy Agency GCHQ Secret Unlimited Access To Their Undersea Cables

The NSA IS Reading Your E-mails

The NSA IS Reading Your E-mails (The New American, July 31, 2013):

The London Guardian’s Glenn Greenwald revealed in a July 31 exposé that the NSA has indeed been collecting the full text of every American’s e-mails without a warrant under the “XKeyscore” program, flatly contradicting the claims of congressional opponents of the Amash amendment last week.

The Amash amendment would have denied the NSA the ability to snoop on Americans without a warrant or National Security letter under Section 215 of the Patriot Act. The amendment by Michigan congressman Justin Amash failed by a mere seven-vote margin in the House of Representatives. In the wake of the vote, Amash has promised to sponsor legislation to ban the NSA from collecting telephone and Internet data on American citizens.

Using NSA PowerPoint presentations provided by whistleblower and former NSA contractor Edward Snowden, Greenwald explained: “One presentation claims the [XKeyscore] program covers ‘nearly everything a typical user does on the internet,’ including the content of emails, websites visited and searches, as well as their metadata.” Greenwald added: “Analysts can also use XKeyscore and other NSA systems to obtain ongoing ‘real-time’ interception of an individual’s internet activity.”

Read moreThe NSA IS Reading Your E-mails

Facebook Says Technical Flaw Exposed 6 Million Users

Facebook Says Technical Flaw Exposed 6 Million Users (New York Times, June 21, 2013):

SAN FRANCISCO — Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.

Facebook blamed the data leaks, which began in 2012, on a technical flaw in its huge archive of contact information collected from its 1.1 billion users worldwide. As a result of the problem, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have.

Read moreFacebook Says Technical Flaw Exposed 6 Million Users

Some Obama Top Political Appointees Using Secret Government Email Accounts – White House Defends Practice

Some Obama political appointees using secret email accounts; White House defends practice (Washington Post/AP, June 4, 2013):

WASHINGTON — Some of President Barack Obama’s political appointees are using secret government email accounts to conduct official business, The Associated Press found, a practice that complicates agencies’ legal responsibilities to find and turn over emails under public records requests and congressional inquiries.White House spokesman Jay Carney on Tuesday acknowledged the practice and said it made eminent sense for Cabinet secretaries and other high-profile officials to have what he called alternative email accounts that wouldn’t fill with unwanted messages. Carney said all their email accounts, public and otherwise, were subject to congressional oversight and requests by citizens under the U.S. Freedom of Information Act.

“There’s nothing secret,” Carney said.

The AP reviewed hundreds of pages of government emails released under the federal open records law and couldn’t independently find instances when material from any of the secret accounts it identified was turned over. Congressional oversight committees told the AP they were unfamiliar with the few nonpublic government addresses that AP identified so far, including one for Secretary Kathleen Sebelius of the Health and Human Services Department.

Read moreSome Obama Top Political Appointees Using Secret Government Email Accounts – White House Defends Practice

Judge Orders Google To Give Customer Data To FBI

Judge Orders Google To Give Customer Data To FBI (Huffingtion Post, June 1, 2013):

SAN FRANCISCO — A federal judge has ruled that Google Inc. must comply with the FBI’s warrantless demands for customer data, rejecting the company’s argument that the government’s practice of issuing so-called national security letters to telecommunication companies, Internet service providers, banks and others was unconstitutional and unnecessary.

FBI counter-terrorism agents began issuing the secret letters, which don’t require a judge’s approval, after Congress passed the USA Patriot Act in the wake of the Sept. 11, 2001, attacks.

Read moreJudge Orders Google To Give Customer Data To FBI

DOJ Confirms: Eric Holder Vetted Search Warrant For James Rosen Emails

Eric Holder Vetted Search Warrant For James Rosen Emails, DOJ Confirms (Huffington Post, May 24, 2013):

Attorney General Eric Holder signed off on the decision to seek the personal emails of a Fox News reporter by suggesting he was a “co-conspirator” in a criminal leak case, the Department of Justice confirmed in a statement on Friday.

The department “took great care in deciding that a search warrant was necessary in the Kim matter, vetting the decision at the highest levels of the Department, including discussions with the Attorney General,” the DOJ said in a statement about the search warrant seeking James Rosen’s emails.

Read moreDOJ Confirms: Eric Holder Vetted Search Warrant For James Rosen Emails

IRS: We Do Not Need Warrants To Read People’s Emails

IRS: We can read emails without warrant (The Hill, April 10, 2013):

The Internal Revenue Service (IRS) has claimed that agents do not need warrants to read people’s emails, text messages and other private electronic communications, according to internal agency documents.

The American Civil Liberties Union (ACLU), which obtained the documents through a Freedom of Information Act request, released the information on Wednesday.

In a 2009 handbook, the IRS said the Fourth Amendment does not protect emails because Internet users “do not have a reasonable expectation of privacy in such communications.” A 2010 presentation by the IRS Office of General Counsel reiterated the policy.

Read moreIRS: We Do Not Need Warrants To Read People’s Emails

U.S. Government Plan Calls For More Scanning Of Private Web Traffic, Email

US plan calls for more scanning of private Web traffic, email (Reuters, March 22, 2103):

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

Under last month’s White House executive order on cybersecurity, the scans will be driven by classified information provided by U.S. intelligence agencies — including data from the National Security Agency (NSA) — on new or especially serious espionage threats and other hacking attempts. U.S. spy chiefs said on March 12 that cyber attacks have supplanted terrorism as the top threat to the country.

The Department of Homeland Security will gather the secret data and pass it to a small group of telecommunication companies and cyber security providers that have employees holding security clearances, government and industry officials said. Those companies will then offer to process email and other Internet transmissions for critical infrastructure customers that choose to participate in the program.

DHS as the middleman

By using DHS as the middleman, the Obama administration hopes to bring the formidable overseas intelligence-gathering of the NSA closer to ordinary U.S. residents without triggering an outcry from privacy advocates who have long been leery of the spy agency’s eavesdropping.

Read moreU.S. Government Plan Calls For More Scanning Of Private Web Traffic, Email

Hacker Reveals George W. Bush’s Naked Self-Portraits

Hacker reveals George W. Bush’s naked self-portraits (The Raw Story, Feb 8, 2013):

Personal information stolen from several email accounts belonging to people close to the Bush family reveals the nation’s 43rd president has developed an affinity for painting himself bathing, of all things.

Photos included in an information dump turned over to The Smoking Gun include President George H.W. Bush in the hospital, the elder Bush posing with President Bill Clinton, a family photo of former Florida Gov. Jeb Bush and even President George W. Bush posing with a cardboard cutout of himself wearing a mustache and beret.

Three of the images also show paintings Bush created, including one of himself in the shower, another of himself in a bath, and a third of him crouched over a canvas depicting a church.

A hacker going by the name “Guccifer” claimed the stolen messages include addresses, phone numbers and email addresses that go directly to both former presidents and their families, along with a security code for a gate outside the younger Bush’s home in Dallas.

Read moreHacker Reveals George W. Bush’s Naked Self-Portraits

Bush Family Emails Hacked, Posted Online

Investigation launched into how Guccifer posted photos and personal emails of ex-US president George HW Bush online


George HW Bush: the emails were said to contain details of the state of the ex-president’s health and his family’s phone numbers. Photograph: Getty Images

George Bush’s family emails hacked (Guardian, Feb 8, 2013):

An investigation has been launched into how a hacker managed to access the email accounts of the former US president George HW Bush and members of his family.

A number of Bush family photographs and personal emails were posted online by the hacker, who goes by the name of Guccifer.

Read moreBush Family Emails Hacked, Posted Online