March 4, 2015
By David Fischer
EXCLUSIVE: (click here) GCSB collects phone calls, emails and internet data from NZ's closest and most vulnerable neighbours, secret papers reveal.
New Zealand's spies are targeting the entire email, phone and social media communications of the country's closest, friendliest and most vulnerable neighbours, according to documents supplied by United States fugitive and whistleblower Edward Snowden.
Snowden's files reveal a heavy focus on "full-take collection" from the Pacific with nearly two dozen countries around the world targeted by our Government Communications Security Bureau.
Information from across the Pacific is collected by New Zealand's GCSB but sent onto the United States' National Security Agency to plug holes in its global spying network, the documents show....
Hacking is okay, but, leaking is not. Edward Snowden is a whistleblower and for that he is potentially facing treason, but in contrast, an invasive individual continues his hacking with impunity.
March 19, 2013
By Adrian Chen
By David Fischer
EXCLUSIVE: (click here) GCSB collects phone calls, emails and internet data from NZ's closest and most vulnerable neighbours, secret papers reveal.
New Zealand's spies are targeting the entire email, phone and social media communications of the country's closest, friendliest and most vulnerable neighbours, according to documents supplied by United States fugitive and whistleblower Edward Snowden.
Snowden's files reveal a heavy focus on "full-take collection" from the Pacific with nearly two dozen countries around the world targeted by our Government Communications Security Bureau.
Information from across the Pacific is collected by New Zealand's GCSB but sent onto the United States' National Security Agency to plug holes in its global spying network, the documents show....
Hacking is okay, but, leaking is not. Edward Snowden is a whistleblower and for that he is potentially facing treason, but in contrast, an invasive individual continues his hacking with impunity.
March 19, 2013
By Adrian Chen
An Illuminati-obsessed hacker (click here) is breaking into the email accounts of
Washington, D.C.'s political elite, and sharing what he finds. Who is
Guccifer, and what's his motive?
This weekend, the hacker who goes by the handle "Guccifer" reportedly leaked confidential memos
longtime confidant Sidney Blumenthal sent to Hillary Clinton regarding
the September 11, 2012 attacks on the U.S. diplomatic mission in
Benghazi, Libya. According to the Smoking Gun, the cache consists of
four emails, recreated in Comic Sans font to apparently maximize the
humiliation. Guccifer sent the emails to dozens of politicians and
journalists this weekend, after he'd broken into Blumenthal's AOL email
account last week. (Nobody has published the emails yet; this might be another effect of the Comic Sans.)...
The problem with lying under oath; case in point:
March 5, 2015
By Nicky Hager, Ryan Gallagher
...The documents, (click here) provided by US whistleblower whistleblower Edward Snowden, reveal that most of the targets are not security threats to New Zealand, as has been suggested by the Government.
Instead, the GCSB directs its spying against a surprising array of New Zealand's friends, trading partners and close Pacific neighbours. These countries' communications are supplied directly to the NSA and other Five Eyes agencies with little New Zealand oversight or decision-making, as a contribution to US worldwide surveillance.
The New Zealand revelations mirror what the Snowden documents showed in Europe, where the US and Britain were found to be spying on supposedly close and friendly neighbouring nations in the European Union....
If the leaked documents by Edward Snowden were of no consequence to national security, there can be no charges suggesting same in the face of FULL TAKE collections.
How does the NSA spy on nearly everyone with a handheld or computer? There is a name for the program:
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'(click here)
Whoever builds the wall to this program and others like it will be a trillionaire over night. Wall Street alone with love her.
It is the no legislation necessary end of government surveillance of this nature; it one can afford it. This technology should not be accessible to criminal or terrorist organizations if it is to be considered a legitimately serious security program. If there is a breach the program becomes worthless. I still don't believe there exists or will exist a program that can withstand any breaches. I don't believe there is anything that secure in computer programming.
The problem with lying under oath; case in point:
March 5, 2015
By Nicky Hager, Ryan Gallagher
...The documents, (click here) provided by US whistleblower whistleblower Edward Snowden, reveal that most of the targets are not security threats to New Zealand, as has been suggested by the Government.
Instead, the GCSB directs its spying against a surprising array of New Zealand's friends, trading partners and close Pacific neighbours. These countries' communications are supplied directly to the NSA and other Five Eyes agencies with little New Zealand oversight or decision-making, as a contribution to US worldwide surveillance.
The New Zealand revelations mirror what the Snowden documents showed in Europe, where the US and Britain were found to be spying on supposedly close and friendly neighbouring nations in the European Union....
If the leaked documents by Edward Snowden were of no consequence to national security, there can be no charges suggesting same in the face of FULL TAKE collections.
How does the NSA spy on nearly everyone with a handheld or computer? There is a name for the program:
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'(click here)
Whoever builds the wall to this program and others like it will be a trillionaire over night. Wall Street alone with love her.
It is the no legislation necessary end of government surveillance of this nature; it one can afford it. This technology should not be accessible to criminal or terrorist organizations if it is to be considered a legitimately serious security program. If there is a breach the program becomes worthless. I still don't believe there exists or will exist a program that can withstand any breaches. I don't believe there is anything that secure in computer programming.