Sie sind auf Seite 1von 3

JULY 10th-The Washington Post picks up on the existence of an NSA program called Upstream that collects information from

the fiber er optic cables that carry most Internet and phone traffic. Upstream. In contrast to Prism, "Upstream" collection involves the collection of communications both their metadata and their content JULY 31st-The Guardian reveals PowerPoint slides that give intimate details of XKeyscore, They reveal a network of 500 servers scattered across the globe that collect "nearly everything a user does on the Internet" and store it in databases searchable by name, email, IP address, region and language. Snowden hinted d at XKeyscore in his first interview, and said it was so powerful that he could have wiretapped "anyone, from you or your accountant, to a federal judge, or even the president, if I had a personal email." AUG.1st-The Guardian reveals that the NSA paid GCHQ HQ at least $155 million between 2010 and 2013. Documents show that the NSA invested in GCHQ in part because British law allows for surveillance that American law does not. For its part, GCHQ insisted on "an appropriate level of contribution ... from the NSA SA perspective" in setting its priorities and ensuring continued funding.

A TIME LINE OF THE NSA LEAKS RELEASE ALL THE INFO.

AUG.8th- Two small encrypted webmail service companies, Lavabit and Silent Circle, tried to protect their users data from the US government, based on statements from company owners owners.(Lavabit was Snowdens e-mail mail provider.) Lavabit and Silent Circle close down citing pressure from the U.S. government to reveal user data. Mike Janke, one of the companys founders, tells the Washington Post he estimates Silent JUNE 5th-The Guardian publishes first leak, revealing a secret court Circles customer base had grown by some 400 percent over the summer after reports surfaced about named Foreign Intelligence Surveillance Court (FISA) had forced the PRISM, the NSAs domestic email and phone monitoring program. telecoms giant Verizon to hand over the phone records of millions of Americans indiscriminately and in AUG 8TH - Part of a secret NSA glossary published by The Guardian reveals a change to data minimization bulk regardless of whether they are suspected of any wrongdoing. rules that could allow the NSA to view American citizens' data without a warrant under section 702 of the Ore.) e explains, "Once Americans' communications are JUNE 6th- A second story reveals the existence of programme Prism, which NSA documents say it gives 2008 FISA Amendmen t Act. Senator Ron Wyden (D-Ore.) collected, a gap in the law ... allows the government to potentially go through these communications and the agency "direct access" to data held by Google, Facebook, Apple and other US internet giants. Tech conduct warrant-less less searches for the phone calls or emails of law law-abiding Americans." companies deny they have set up "back door access" to their systems for the US government. ngton Post publishes two documents that reveal how the NSA violated U.S. laws and JUNE 8th- Another leaks reveals the existence of an internal NSA tool Boundless Informant that allows AUG.15th-The Washington follow-up report by the it to record and analyse where its data comes from. Three billion pieces of intelligence were collected in its own internal regulations 2,776 times between March 2011 and March 2012. A follow Wall Street Journal reveals incidents of NSA employees spying on love in interests outside the U.S. The the U.S. during a one month period, email or phone call would constitute as a piece of intelligence. program is called LOVEINT in agency parlance. he Guardian show how US judges have signed off on JUNE 20th-Top secret documents published by the AUG.21th-The National Security Agency declassifies three secret court opinions showing how in one of its broad orders letting the NSA to use the information "inadvertently" collected from domestic US surveillance programs it scooped up as many as 56,000 emails - annually over three years - by citizens not communications without a warrant. connected to terrorism. German daily Der Spiegel, details America's electronic surveillance and bugging of European JUNE 29th-German AUG.29th-The Washington Post reveals that the NSA spends $278 million to major US companies for Union offices in New York, Washington D.C. and Brussels. The next day, The Guardian reports that access to their communication networks that scoop up large volumes of both foreign and domestic bound America also performed surveillance on the embassies of France, Italy, aly, Greece, Japan, Mexico, South Korea, India and Turkey. Another report by Poitras and others gives details about the NSA's surveillance of data. Corporate Partner Access Project funded under the NSAs Special Source Operations in which the US government sets the financial terms for companies handing over data. the E.U., U.N. and International Atomic Energy Agency. JULY 6th-An article in the Brazilian daily O Globo co-authored hored by Guardian journalist Glenn Greenwald reveals how the NSA has been using the "Fairview. Fairview is the NSAs project to own the Internet. an umbrella program. incorporates many different operations that intercept massive amounts of international Internet traffic by various means. AUG.31ST-Der Spiegel reports that the NSA spied on the Al Jazeera Media Network. The intelligence agency hacked hacked into Al-Jazeera Jazeera TVs encrypted e e-mails, as well as Russian airline Aeroflots ticketing system.

SEP.5th-The Guardian, The New York Times and ProPublica reveals that the NSA has cracked methods of lions of people ever day for secure email, e e-commerce, financial transactions and Globo revealing NSA surveillance on citizens of many Latin American countries:the agency also encryption used by millions JULY 9th-Globo sought information on oil, energy and trade. The same day, O Globo explicitly reveals the presence of NSA more. According to these reports, the NSA maintains a database of common decryption keys - some possibly stolen from private companies. Also revealed: The NSA collaborates wi with the tech industry to and CIA stations in four Latin American capitals: Bogot, Colombia; Caracas, Venezuela; Mexico City, implant security back doors into consumer products; the U.S. works to weaken international encryption Mexico; and Panama City, Panama. standards; and the British spy agency GCHQ implanted covert agents in technology companies.

Laugh at me because of how i see my life, without money You say im a fool well i say your a tool devouring as much as you can possibly consume Incoherent chaos icant even hear my thoughts Disproportionate values you cant connect the dots ecurity Agencys spying targeted the private computer network of Google, SEP.9th-The National Security Why has it gone to shit, our world Petrobras and the Society for Worldwide Interbank Financial Telecommunication, better known as SWIFT, has fallen, but if your not a part of the solutio solution the Belgium-based based company that facilitates most international bank transfers in what w are thought to be your part of the problem secure transactions. The report said in a NSA training manual for new agents on how to target the private Take away your debt for which you sweat computer networks of big companies.According to Fantstico, this new report contradicts earlier claims throw away your greed for which you'll bleed. Alter your mentality, that gives birth to brutality . by the NSA that it does not engage in corporate espionage. Now tell me what is left You may not be able to change the world SEP.11th-The Guardian publishes an information-sharing sharing agreement between the NSA and the Israeli But you can rearrange yo your reality SIGINT National Unit (ISNU). documents which revealed top-secret secret policies in place since 2009 that are Trigger the revolution within yourselves not in others used to share personal l phone and Internet data. The agreement requires Israel to handle American By:Nick Sir Nachos citizens' data according to U.S. law; however, that requirement is not legally binding. ci SEP.28th-New York Times Reveals The US National Security Agency has been exploiting US citizens' personal information drawn from its large collection of metadata to create complex graphs of social connections for foreign intelligence purposes, the practice has been going on since November 2010.Reported data sources were Facebook profiles, bank codes, insurance information, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data. The sophisticated graphs provide the agents with direct and indirect contact chains between an unspecified number of Americans. OCT.4th-security documents disclosed by The Guardian by show United States and British intelligence have long attempted to crack the Tor anonymizer network used by Tor, a program that routes traffic through multiple nodes es in an effort to help mask the identities of its users. One technique, codenamed QUANTUM, exists to degrade, deny and disrupt Tor access, according to the documents. Another, QUANTUMCOOKIE, forces client to divulge stored cookies which could then further f aid investigators attempting to hone in on targets otherwise protected by Tor. Tor itself has proved to be invincible to government attacks thus far. LUCID DREAMER A Lucid Dreamer found a way to escape his nightmare and into its fantasy which it only would see as a dream within his dream. Lost in apparel mirages of its imagination,became reality. It's way was taken away to his desire, but at then in that point it intertwined with a lucid thinker, seeing for what was its goal to achieve glee to a mere thought of its fantasy....the lucid Dreamer was awoken...unknowingly restored its memory... freed to be aware there its eternal nightmare was forever always, ITS LIVING FANTASY. By:Ruben Ramos

SEP.7th-Der Spiegel reveals the NSA can spy on smartphone data - from all the major smart phones using the worlds most popular systems including iOS, Android, and BlackBerry.The agency can access contact lists, SMS traffic, notes, and users current and past location.

Literary Visions

By: Jaycob Diaz of The Offended

Perspectives, Reflections ,and Insights From An Outsider. Outsider


Greetings fellow men and women, participants, founder, and contributors to this zine.

I will beginthe introduction of this segment by stating the very obvious. This world around you is of your own making. The very world that is presented to us from the moment of conception and forced upon us till the moment weseemingly expire into nothingness. What world is this you ask?....If you so possess a mind of your ownto question anything and i question everything and wouldnt hesitate to give an admission of guilt of possibly knowing absolutely nothing at all. So feel free to dismiss what I have to say or give critique to. The world we livein is a mass, collective, systematic hypnosis. We are all automated machines responding to a stimulus. timulus. Followinga set pattern enforced by a specific set of beliefs. Never questioning, critiquing, or constructively critiquingthe world around us and those that seem to hold us back. We fear or dismiss the idea of change or any ideacontrary to the established blished norms or mainstream popular beliefs. we are subservient, passive and complacent units. The time to awaken from this seemingly never ending cycle is NOW!!! Take the time right now to ask yourselves thisvery moment...Am I am who I think I am or believe myself to be?? Am I living the life I wish for myself. Are mymost cherished thoughts and viewpoints vie on life really my own?? Have I been possibly been living a lie since birth?Is this all their is to life. the answers to to all our existential nightmares and doubts can only be answered byYOU! The world revolves around YOU!! The world can conform to your own reality. YOU ARE REALITY!! and reality iscompletely up to your own making. To conclude this segment, I want to say thank you for taking the time to listento absolutely nothing I had to say, and re-read re the segment to gain a more clear, conscious, and better under-standing standing of MY REALITY!

Stay tune for the next issue and contribute to the zine in any way shape or form. If you are in favor of my segment then rest assure I will continue to reflect on things in hopes of gathering anyinsights that may y contribute to you and I and all of the exceptional individuals contributing to PROJEKT DISCHORD!!! Your visions are all you need in a world that lacks sight!!! sight!!

Das könnte Ihnen auch gefallen