Skip to content

Edward Snowden

The Worst Snowden Revelation of Them All: Digital Cointelpro

Speaking of the media, this whole covert action program assumes easy access on the part of government agents to sympathetic contacts in the "mainstream" news and opinion outlets: it posits a ready consumer base of "journalists" hungry for a constant diet of smears, "false flags," and compromising material. And we can all guess as to who some of them might be…. Cass Sunstein, President Obama’s close advisor and head of a commission to "reform" the NSA, has long advocated infiltrating online communities devoted to supposedly dangerous "conspiracy theories," and otherwise steering online discourse in a more pro-government direction – and it looks like his ideas are being put into practice. The new documents promise a "full rollout complete by early 2013," with "500+ GCHQ analysts" on the job – and how many from the NSA and US law enforcement agencies?

Paragraphs About The NSA Began To Self Delete

Over the next few weeks these incidents of remote deletion happened several times. There was no fixed pattern but it tended to occur when I wrote disparagingly of the NSA. All authors expect criticism. But criticismbefore publication by an anonymous, divine third party is something novel. I began to leave notes for my secret reader. I tried to be polite, but irritation crept in. Once I wrote: "Good morning. I don't mind you reading my manuscript – you're doing so already – but I'd be grateful if you don't delete it. Thank you." There was no reply. A month later the mysterious reader – him, her, they? – abruptly disappeared. At a literary event in Berlin my Guardian colleague David Leigh told a journalist about my unusual computer experiences; he led with the anecdote in a piece for the leftwing daily Taz. After that, nothing. I finished The Snowden Files: The Inside Story of the World's Most Wanted Man in December.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Snowden 2.0: New Active Duty NSA Whistleblower?

What the paper reported, based on information provided by a "high-ranking NSA employee in Germany," was that the U.S. spy agency—after being outed for spying on German ChancellorAngela Merkel—responded to an order to refrain from spying directly on Merkel's phone by intensifying its monitoring of other high-level officals her government. "We have had the order not to miss out on any information now that we are no longer able tomonitor the chancellor's communication directly," the source told the newspaper. But, as journalist Glenn Greenwald pointed out in his Monday column, the fact that the revelations are based on a "high-ranking NSA employee in Germany" means that whoever spoke to the paper "is yet another NSA source to come forward to disclose the agency’s once-secret acts."

Snowden Honors Chelsea Manning, Criticizes Increasing Secrets

Imprisoned US army whistleblower Chelsea Manning - formerly known as Bradley - was on Wednesday honored in absentia for revelations of US war crimes. Manning was awarded the 2014 Sam Adams Prize for Integrity in Intelligence at a ceremony held by the Oxford University's prestigious Oxford Union Society. The event included a video address by Edward Snowden, last year’s Sam Adams Award winner, who praised Manning for bringing to spotlight a very important issue of “over-classification” – unjustified withholding from the public of information that’s not related to national security. “In the last year the White House told us that 95 million records have been created classified and withheld from the public in the year 2012. That’s more than any other year on record and shows a trend where the government is withholding more secrets than ever,” Snowden said.

NSA Documents Show How Wikileaks & Allies Were Targeted

One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google. Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.

Valentines Day: Love Letter To The NSA

Dear NSA, This is awkward. All these years, you've been a secret admirer and I never knew it! You've kept track of my phone calls, my emails; all of my communications, but now that Ed Snowden finally spilled the beans about how you feel about me . . . well, I hate to say it and break your heart, but I'm not interested. What were you thinking? There's a thin line between devotion and obsession - you've crossed it. If you're so fascinated by me, how come you never sent flowers on my birthday, hmm? Or took me to a nice restaurant? When Ed first told me how you followed my every move, I'll admit, I was flattered. You're so powerful . . .

Snowden Used Low-Cost Tool To Best NSA

Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials. Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.” The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyberattacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.

Snowden Docs: Sex And Dirty Tricks Used By British Spies

"British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.” Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications."

International Day Of Protest: STOP WATCHING US

Never before has the level of daily monitoring been so clear to so many. With the recent revelations brought to light from former NSA security contractor Edward Snowden and the many whistle blowers before him, the world is opening its eyes to the reality that everything we do in a digital format is collected by Governmental bodies like the NSA and GCHQ, but also by private security corporations and used to form a digital fingerprint of our every keystroke, often in complete secrecy and without any oversight.

How Edward Snowden Evolved From Loyal NSAer To Whistleblower

At the time, the figure who most closely embodied Snowden's rightwing views was Ron Paul, the most famous exponent of US libertarianism. Snowden supported Paul's 2008 bid for the US presidency. He was also impressed with the Republican candidate John McCain. He wasn't an Obama supporter as such, but he didn't object to him, either. Once Obama became president, Snowden came to dislike him intensely. He criticised the White House's attempts to ban assault weapons. He was unimpressed by affirmative action. Another topic made him even angrier. The Snowden of 2009 inveighed against government officials who leaked classified information to newspapers – the worst crime conceivable, in Snowden's apoplectic view. In January of that year, the New York Times published a report on a secret Israeli plan to attack Iran. The Times said its story was based on 15 months' worth of interviews with current and former US officials, European and Israeli officials, other experts and international nuclear inspectors.

Canadian Spy Agency Got Passengers’ Data From Airport Wifi

A federal electronic spy agency tracked thousands of people who passed through a Canadian airport using information gleaned from free wireless Internet service, reports the CBC. Citing a secret document leaked by former U.S. security contractor Edward Snowden, CBC reported that Communications Security Establishment Canada (CSEC) collected data from passengers’ smartphones and laptops over a two-week period and tracked those devices for a week or longer afterward. CSEC is tasked with collecting foreign intelligence under law and can’t target Canadians, or anyone within Canada, without a warrant. CBC quoted several experts who said CSEC’s actions were “almost certainly illegal.” . . . Ontario privacy commissioner Ann Cavoukian said she was “blown away” by the document, likening CSEC’s methods to those of a “totalitarian state, not a free and open society,” according to CBC.

Greenwald On Snowden Asylum In Brazil, First Look Media

Journalist Glenn Greenwald believes the Brazilian government should offer asylum to Edward Snowden, the ex-CIA analyst currently taking refuge in Russia. In an interview with the Brasil Post, the American reporter discussed what the future should hold for Snowden, his main source of information. Snowden leaked documents revealing the espionage programs of the United States’ National Security Agency (NSA), which led to a worldwide backlash over invasions of privacy. Greenwald also praised the way the Brazilian government has dealt with the U.S. following allegations of espionage. "Brazil is doing the right thing insisting on wanting to know what the U.S. has done against the government and businesses here," he said.

Footage Released Showing Destruction Snowden Hard Drives

New video footage has been released for the first time of the moment Guardian editors destroyed computers used to store top-secret documents leaked by the NSA whistleblower Edward Snowden. Under the watchful gaze of two technicians from the British government spy agency GCHQ, the journalists took angle-grinders and drills to the internal components, rendering them useless and the information on them obliterated. The bizarre episode in the basement of the Guardian's London HQ was the climax of Downing Street's fraught interactions with the Guardian in the wake of Snowden's leak – the biggest in the history of western intelligence. The details are revealed in a new book – The Snowden Files: The Inside Story of the World's Most Wanted Man – by the Guardian correspondent Luke Harding.

Video: German Television Interviews Edward Snowden

This is a video by German television channel NDR. It is an exclusive, 30-minute interview with Edward Snowden. NDR uploaded it to LiveLeak so the rest of the world could see it. In this interview Snowden talks about various topics, including direct government threats against his life. The first question they ask is, "Do you lose sleep at night?" Watch the whole interview here.
assetto corsa mods

Urgent End Of Year Fundraising Campaign

Online donations are back! Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Urgent End Of Year Fundraising Campaign

Online donations are back! 

Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Sign Up To Our Daily Digest

Independent media outlets are being suppressed and dropped by corporations like Google, Facebook and Twitter. Sign up for our daily email digest before it’s too late so you don’t miss the latest movement news.