Home » Posts tagged 'gchq'

Tag Archives: gchq

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Business is Booming for the U.K.’s Spy Tech Industry

Aerial photograph of the GCHQ, Government Communications Headquarters.
Photo: David Goddard/Getty Images

BUSINESS IS BOOMING FOR THE U.K.’S SPY TECH INDUSTRY

DRIVING INTO CHELTENHAM from the west, it is hard to miss the offices of Government Communications Headquarters, or GCHQ, the United Kingdom’s surveillance agency. The large, doughnut-shaped building sits behind high-perimeter fencing with barbed wire and many levels of security. The facility – used to eavesdrop on global emails and phone calls – is located on the edge of the sleepy Gloucestershire town, which feels like an incongruous location for one of the world’s most aggressive spy agencies.

Cheltenham has a population of just 117,000 people, and GCHQ’s presence has turned the area into one of Europe’s central hubs for companies working in the fields of cybersecurity and surveillance. GCHQ says it employs almost 6,000 people in Cheltenham and at some smaller bases around the U.K., although the agency has in recent years secretly expanded its workforce, reportedly employing thousands more staff.

People in the area are now talking of a cyber “corridor” that stretches for 50 miles from Malvern, just north of Cheltenham, all the way to Bristol, where the Ministry of Defence has its equipment and support headquarters at Abbey Wood. Many quaint English towns, known for their farming and country pubs, have seen an influx of companies dealing in cybersecurity and electronic spying. Even office space on former farms is being used for this burgeoning industry.

Chris Dunning-Walton, the founder of a nonprofit called Cyber Cheltenham, or Cynam, organizes quarterly events in the town attended by politicians and entrepreneurs. “Historically, there has been a need for the companies that are working here to be very off the radar with their relationships with GCHQ and to some extent, that does exist,” says Dunning-Walton. But since Edward Snowden leaked information in 2013 about GCHQ’s sweeping surveillance activities, the agency has been forced to come out of the shadows and embrace greater transparency.

…click on the above link to read the rest of the article…

To Stop War, Do What Katharine Gun Did

To Stop War, Do What Katharine Gun Did

Legendary whistleblower Daniel Ellsberg’s advice to stop current and future wars is simple: do what Katharine Gun did, writes Norman Solomon.


Daniel Ellsberg has a message that managers of the warfare state don’t want people to hear.

“If you have information that bears on deception or illegality in pursuing wrongful policies or an aggressive war,” he said in a statement released last week, “don’t wait to put that out and think about it, consider acting in a timely way at whatever cost to yourself…. Do what Katharine Gun did.”

Front page of The Observer from March 3, 2003

If you don’t know what Katharine Gun did, chalk that up to the media power of the war system.

Ellsberg’s video statement went public as this month began, just before the 15th anniversary of when a British newspaper, the Observer, revealed a secret NSA memo – thanks to Katharine Gun. At the UK’s intelligence agency GCHQ, about 100 people received the same email memo from the National Security Agency on the last day of January 2003, seven weeks before the invasion of Iraq got underway. Only Katharine Gun, at great personal risk, decided to leak the document.

If more people had taken such risks in early 2003, the Iraq War might have been prevented. If more people were willing to take such risks in 2018, the current military slaughter in several nations, mainly funded by U.S. taxpayers, might be curtailed if not stopped. Blockage of information about past whistleblowing deprives the public of inspiring role models.

That’s the kind of reality George Orwell was referring to when he wrote: “Who controls the past controls the future; who controls the present controls the past.”

…click on the above link to read the rest of the article…

The US-UK Deep State Empire Strikes Back: ‘It’s Russia! Russia! Russia!’

The US-UK Deep State Empire Strikes Back: ‘It’s Russia! Russia! Russia!’

There’s no defense like a good offense.

For weeks the unfolding story in Washington has been how a cabal of conspirators in the heart of the American federal law enforcement and intelligence apparat colluded to ensure the election of Hillary Clinton and, when that failed, to undermine the nascent presidency of Donald Trump. Agencies tainted by this corruption include not only the FBI and the Department of Justice (DOJ) but the Obama White House, the State Department, the NSA, and the CIA, plus their British sister organizations MI6 and GCHQ, possibly along with the British Foreign Office (with the involvement of former British ambassador to Russia Andrew Wood) and even Number 10 Downing Street.

Those implicated form a regular rogue’s gallery of the Deep State: Peter Strzok (formerly Chief of the FBI’s Counterespionage Section, then Deputy Assistant Director of the Counterintelligence Division; busy bee Strzok is implicated not only in exonerating Hillary from her email server crimes but initiating the Russiagate investigation in the first place, securing a FISA warrant using the dodgy “Steele Dossier,” and nailing erstwhile National Security Adviser General Mike Flynn on a bogus charge of “lying to the FBI”); Lisa Page (Strzok’s paramour and a DOJ lawyer formerly assigned to the all-star Democrat lineup on the Robert Mueller Russigate inquisition); former FBI Director James Comey, former Associate Deputy Attorney General Bruce Ohr, former Deputy FBI Director Andrew McCabe, and – let’s not forget – current Deputy Attorney General Rod Rosenstein, himself implicated by having signed at least one of the dubious FISA warrant requests. Finally, there’s reason to believe that former CIA Director John O. Brennan may have been the mastermind behind the whole operation.

…click on the above link to read the rest of the article…

How UK Spies Hacked a European Ally and Got Away With It

The Belgacom Group is the largest telecommunications company in Belgium, headquartered in Brussels.Belgacom flag, Belgian national flag hang together at the entrance mirrored in the windows. (Photo by Sander de Wilde/Corbis via Getty Images)
Photo: Sander de Wilde/Corbis/Getty Images

HOW UK SPIES HACKED A EUROPEAN ALLY AND GOT AWAY WITH IT

FOR A MOMENT, it seemed the hackers had slipped up and exposed their identities. It was the summer of 2013, and European investigators were looking into an unprecedented breach of Belgium’s telecommunications infrastructure. They believed they were on the trail of the people responsible. But it would soon become clear that they were chasing ghosts – fake names that had been invented by British spies.

The hack had targeted Belgacom, Belgium’s largest telecommunications provider, which serves millions of people across Europe. The company’s employees had noticed their email accounts were not receiving messages. On closer inspection, they made a startling discovery: Belgacom’s internal computer systems had been infected with one of the most advanced pieces of malware security experts had ever seen.

As The Intercept reported in 2014, the hack turned out to have been perpetrated by U.K. surveillance agency Government Communications Headquarters, better known as GCHQ. The British spies hacked into Belgacom employees’ computers and then penetrated the company’s internal systems. In an eavesdropping mission called “Operation Socialist,” GCHQ planted bugs inside the most sensitive parts of Belgacom’s networks and tapped into communications processed by the company.

GCHQ Computer Network Exploitation presentation22 pages

The covert operation was the first known example of a European Union member state hacking the critical infrastructure of another. The malware infection triggered a massive cleanup operation within Belgacom, which has since renamed itself Proximus. The company – of which the Belgian government is the majority owner – was forced to replace thousands of its computers at a cost of several million Euros. Elio di Rupo, Belgium’s then-prime minister, was furious, calling the hack a “violation.” Meanwhile, one of the country’s top federal prosecutors opened a criminal investigation into the intrusion.

…click on the above link to read the rest of the article…

European Court to Decide Whether U.K. Mass Surveillance Revealed By Snowden Violates Human Rights

City workers use smartphones inside an office in the City of London, U.K., on Monday. Oct. 30, 2017. The Bank of England may raise interest rates this week for the first time in more than a decade, but that wont be enough to buoy the pound, strategists say. Photographer: Jason Alden/Bloomberg via Getty Images
Photo: Jason Alden/Bloomberg News/Getty Images

BRITISH SPY AGENCIES are under scrutiny in a landmark court case challenging the legality of top-secret mass surveillance programs revealed in documents leaked by whistleblower Edward Snowden.

A panel of 10 judges at the European Court of Human Rights in Strasbourg, France, held a hearing Tuesday to examine the U.K. government’s large-scale electronic spying operations, following three separate challenges brought by a dozen human rights groups, including Amnesty International, Privacy International, the American Civil Liberties Union, Big Brother Watch, the Open Rights Group, and the Irish Council for Civil Liberties.

The case is the first of its kind to be heard by the court, which handles complaints related to violations of the European Convention on Human Rights, an international treaty by which the U.K. is still bound despite its vote last year to leave the European Union. The court’s judgments could have ramifications for future U.K. surveillance operations.

The human rights groups are arguing that British spy programs violate four key rights protected under the convention: the right to privacy; the right to a fair trial; the right to freedom of expression; and the right not to be discriminated against. They cite a 2015 ruling by a U.K. tribunal, which found that British eavesdropping agency Government Communications Headquarters, or GCHQ, had unlawfully spied on the communications of Amnesty International and the South Africa-based Legal Resources Centre.

Dinah Rose, a lawyer representing the human rights groups, acknowledged in court Tuesday that some serious security threats require the use of covert government surveillance. But, she added, “excessive and unaccountable state surveillance puts at risk the very core values of the free and democratic societies that terrorism seeks to undermine.”

…click on the above link to read the rest of the article…

“False Flags” Are So Common that U.S. Officials Commonly Discuss Them

“False Flags” Are So Common that U.S. Officials Commonly Discuss Them

Despite the attempt to marginalize the concept, “false flags” are so common that U.S. officials frequentlyuse that phrase.

For example, Colonel Lawrence Wilkerson, former chief of staff to Colin Powell:

Former Director for Transnational Threats on the U.S. National Security Council, Roger Cressey:

Former CIA counterterrorism official Philip Mudd:

Lieutenant General Thomas McInerney, a high ranking Air Force official:

Former U.S. Ambassador to the United Nations (and Neocon warmonger) John Bolton:

The Washington Post notes that Secretary of Defense Donald Rumsfeld approved as an acceptable interrogation method

A technique known as “false flag,” or deceiving a detainee into believing he is being interrogated by someone from another country.

NBC News points out:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.” Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Washington’s Blog asked high-level NSA official Bill Binney* if he had heard of the term “false flags” when he was with the NSA.

Binney responded:

Sure, they were under deception and manipulation programs.  I was not involved in doing them; but, I did have to figure out some that the other side was doing.  The other side called them “dezsinformatsiya” and Manipulatsiya.”

The Brits have been doing this for several hundred years and are quite good at it.

Washington’s Blog asked Philip Giraldi – a former counter-terrorism specialist and military intelligence officer with the CIA – the same question with regards to his experience with the CIA.

…click on the above link to read the rest of the article…

Report: British Intelligence Agencies, In Addition to Six Other Nations, Were All Spying on Trump

Report: British Intelligence Agencies, In Addition to Six Other Nations, Were All Spying on Trump

About a month ago, Fox suspended Judge Nap for suggesting British intelligence had spied on Donald Trump. The media went hysterical, saying the good judge was filled with UFO styled conspiracy theories.

Here was his claim.

A spokesman for the GCHQ at the time called the claims ‘nonsense’, proclaiming “They are utterly ridiculous and should be ignored.”

Lo and behold, the Guardian is out with an exclusive tonight — rebuking the GCHQ denial — confirming that Obama had received information from the British spy agency, possibly to avoid being detected by people investigating FISA warrants. In addition to Britain’s GCHQ, Mi6 was also involved, and 4 other nations —  as part of the intelligence gathering apparatus called SIGINT — who then ferried their findings to Obama. The spying nations were Germany, Estonia, Poland and Australia.

Another guardian source said both France and the Netherlands were possible contributors to the Trump spying ring too.

CNN reporting:

The GCHQ became aware of  ‘suspicious interactions’ in late 2015.

Over the next six months, until summer 2016, a number of western agencies shared further information on contacts between Trump’s inner circle and Russians, sources said.

It is understood that GCHQ was at no point carrying out a targeted operation against Trump or his team or proactively seeking information. The alleged conversations were picked up by chance as part of routine surveillance of Russian intelligence assets. Over several months, different agencies targeting the same people began to see a pattern of connections that were flagged to intelligence officials in the US.

In typical spin, the Guardian’s source posited the notion that something improper had taken place between the Russians and Trump.

…click on the above link to read the rest of the article…

A Key Similarity Between Snowden Leak and Panama Papers: Scandal Is What’s Been Legalized

FROM THE START of the reporting based on Edward Snowden’s leaked document archive, government defenders insisted that no illegal behavior was revealed. That was always false: Multiple courts have now found the domestic metadata spying program in violation of the Constitution and relevant statutes and have issued similar rulings for other mass surveillance programs; numerous articles on NSA and GCHQ documented the targeting of people and groups for blatantly political or legally impermissible purposes; and the leak revealed that President Obama’s top national security official (still), James Clapper, blatantly lied when testifying before Congress about the NSA’s activities — a felony.

But illegality was never the crux of the scandal triggered by those NSA revelations. Instead, what was most shocking was what had been legalized: the secret construction of the largest system of suspicionless spying in human history. What was scandalous was not that most of this spying was against the law, but rather that the law — at least as applied and interpreted by the Justice Department and secret, one-sided FISA “courts” — now permitted the U.S. government and its partners to engage in mass surveillance of entire populations, including their own. As the ACLU’s Jameel Jaffer put it after the Washington Post’s publication of documents showing NSA analysts engaged in illegal spying: “The ‘non-compliance’ angle is important, but don’t get carried away. The deeper scandal is what’s legal, not what’s not.”

Yesterday, dozens of newspapers around the world reported on what they are calling the Panama Papers: a gargantuan leak of documents from a Panama-based law firm that specializes in creating offshore shell companies. The documents reveal billions of dollars being funneled to offshore tax havens by leading governmental and corporate officials in numerous countries (the U.S. was oddly missing from the initial reporting, though journalists vow that will change shortly).

…click on the above link to read the rest of the article…

NSA Helped British Spies Find Security Holes in Juniper Firewalls

A TOP-SECRET document dated February 2011 reveals that British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks, a leading provider of networking and Internet security gear.

The six-page document, titled “Assessment of Intelligence Opportunity – Juniper,” raises questions about whether the intelligence agencies were responsible for or culpable in the creation of security holes disclosed by Juniper last week. While it does not establish a certain link between GCHQ, NSA, and the Juniper hacks, it does make clear that, like the unidentified parties behind those hacks, the agencies found ways to penetrate the “NetScreen” line of security products, which help companies create online firewalls and virtual private networks, or VPNs. It further indicates that, also like the hackers, GCHQ’s capabilities clustered around an operating system called “ScreenOS,” which powers only a subset of products sold by Juniper, including the NetScreen line. Juniper’s other products, which include high-volume Internet routers, run a different operating system called JUNOS.

The possibility of links between the security holes and the intelligence agencies is particularly important given an ongoing debate in the U.S. and the U.K. over whether governments should have backdoors allowing access to encrypted data. Cryptographers and security researchers have raised the possibility that one of the newly discovered Juniper vulnerabilities stemmed from an encryption backdoor engineered by the NSA and co-opted by someone else. Meanwhile, U.S. officials are reviewing how the Juniper hacks could affect their own networks, putting them in the awkward position of scrambling to shore up their own encryption even as they criticize the growing use of encryption by others.

…click on the above link to read the rest of the article…

Edward Snowden Explains How to Reclaim Your Privacy

LAST MONTH, I met Edward Snowden in a hotel in central Moscow, just blocks away from Red Square. It was the first time we’d met in person; he first emailed me nearly two years earlier, and we eventually created an encrypted channel to journalists Laura Poitras and Glenn Greenwald, to whom Snowden would disclose overreaching mass surveillance by the National Security Agency and its British equivalent, GCHQ.

This time around, Snowden’s anonymity was gone; the world knew who he was, much of what he’d leaked, and that he’d been living in exile in Moscow, where he’s been stranded ever since the State Department canceled his passport while he was en route to Latin America. His situation was more stable, the threats against him a bit easier to predict. So I approached my 2015 Snowden meeting with less paranoia than was warranted in 2013, and with a little more attention to physical security, since this time our communications would not be confined to the internet.

Our first meeting would be in the hotel lobby, and I arrived with all my important electronic gear in tow. I had powered down my smartphone and placed it in a “faraday bag” designed to block all radio emissions. This, in turn, was tucked inside my backpack next to my laptop (which I configured and hardened specifically for traveling to Russia), also powered off. Both electronic devices stored their data in encrypted form, but disk encryption isn’t perfect, and leaving these in my hotel room seemed like an invitation to tampering.

Most of the lobby seats were taken by well-dressed Russians sipping cocktails. I planted myself on an empty couch off in a nook hidden from most of the action and from the only security camera I could spot.

…click on the above link to read the rest of the article…

Edward Snowden’s New Revelations Are Truly Chilling

Edward Snowden’s New Revelations Are Truly Chilling

Former intelligence contractor and NSA whistleblower Edward Snowden told the BBC’s Panorama that the UK intelligence centre GCHQ has the power to hack phones without their owners’ knowledge


In an interview with the BBC’s ‘Panorama’ which aired in Britain last night, Edward Snowden spoke in detail about the spying capabilities of the UK intelligence agency GCHQ. He disclosed that government spies can legally hack into any citizen’s phone to listen in to what’s happening in the room, view files, messages and photos, pinpoint exactly where a person is (to a much more sophisticated level than a normal GPS system), and monitor a person’s every move and every conversation, even when the phone is turned off. These technologies are named after Smurfs, those little blue cartoon characters who had a recent Hollywood makeover. But despite the cute name, these technologies are very disturbing; each one is built to spy on you in a different way:

  • “Dreamy Smurf”: lets the phone be powered on and off
  • “Nosey Smurf”:lets spies turn the microphone on and listen in on users, even if the phone itself is turned off
  • “Tracker Smurf”:a geo-location tool which allows [GCHQ] to follow you with a greater precision than you would get from the typical triangulation of cellphone towers.
  • “Paranoid Smurf”: hides the fact that it has taken control of the phone. The tool will stop people from recognising that the phone has been tampered with if it is taken in for a service, for instance.

Snowden says: “They want to own your phone instead of you.” It sounds very much like he means we are being purposefully encouraged to buy our own tracking devices. That kinda saved the government some money, didn’t it?

Read More: http://www.trueactivist.com/breaking-bbc-news-edward-snowdens-chilling-new-revelations/?utm_source=sm&utm_medium=ta&utm_campaign=sm

The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than It Intended

The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than It Intended

In July 2013, GCHQ, Britain’s equivalent of the U.S. National Security Agency,forced journalists at the London headquarters of The Guardian to completely obliterate the memory of the computers on which they kept copies of top-secret documents provided to them by former NSA contractor and whistleblower Edward Snowden.

However, in its attempt to destroy information, GCHQ also revealed intriguing details about what it did and why.

Two technologists, Mustafa Al-Bassam and Richard Tynan, visited Guardianheadquarters last year to examine the remnants of the devices. Al-Bassam is an ex-hacker who two years ago pleaded guilty to joining attacks on Sony, Nintendo, and other companies, and now studies computer science at King’s College; Tynan is a technologist at Privacy International with a PhD in computer science. The pair concluded, first, that GCHQ wanted The Guardian to completely destroy every possible bit of information the news outlet might retain; and second, that GCHQ’s instructions may have inadvertently revealed all the locations in your computer where information may be covertly stored.

 

Editors of The Guardian chose to destroy the files and the devices they lived on after the British government threatened to sue them and halt further reporting on the issue, including stories on how GCHQ utilized data collected by the NSA on communications from many major Internet companies.

Footage of Guardian editors physically destroying their MacBooks and USB drives, taken by Guardian executive Sheila Fitzsimons, wasn’t released until months later, in January 2014. The GCHQ agents who supervised the destruction of the devices also insisted on recording it all on their own iPhones.

 

…click on the above link to read the rest of the article…

GCHQ and me: My Life Unmasking British Eavesdroppers

GCHQ and me: My Life Unmasking British Eavesdroppers

I stepped from the warmth of our source’s London flat. That February night in 1977, the air was damp and cool, the buzz of traffic muted in this leafy North London suburb, in the shadow of the iconic Alexandra Palace. A fellow journalist and I had just spent three hours inside, drinking Chianti and talking about secret surveillance with our source, and now we stood on the doorstep discussing how to get back to the south coast town where I lived.

Events were about to take me on a different journey. Behind me, sharp footfalls broke the stillness. A squad was running, hard, toward the porch of the house we had left. Suited men surrounded us. A burly middle-aged cop held up his police ID. We had broken “Section 2″ of Britain’s secrecy law, he claimed. These were “Special Branch,” then the elite security division of the British police.

For a split second, I thought this was a hustle. I knew that a parliamentary commission had released a report five years earlier that concluded that the secrecy law, first enacted a century ago, should be changed. I pulled out my journalist identification card, ready to ask them to respect the press.

But they already knew that my companion that evening, Time Out reporter Crispin Aubrey, and I were journalists. And they had been outside, watching our entire meeting with former British Army signals intelligence (Sigint) operator John Berry, who at the time was a social worker.

Aubrey and I were arrested on suspicion of possessing unauthorized information. They said we’d be taken to the local police station. But after being forced into cars, we were driven in the wrong direction, toward the center of London. I became uneasy.

 

…click on the above link to read the rest of the article…

Amnesty International Responds to UK Government Surveillance

Amnesty International Responds to UK Government SurveillanceFeatured photo - Amnesty International Responds to U.K. Government Surveillance

A British tribunal admitted on Wednesday that the U.K. government had spied on Amnesty International and illegally retained some of its communications. Sherif Elsayed-Ali, deputy director of global issues for Amnesty International in London, responds:

Just after 4 p.m. yesterday, Amnesty International received an email from the Investigatory Powers Tribunal (IPT), which hears cases related to U.K. intelligence agencies. The message was brief: There had been a mistake in the tribunal’s judgment 10 days earlier in a case brought by 10 human rights organizations against the U.K.’s mass surveillance programs. Contrary to the finding in the original ruling, our communications at Amnesty International had, in fact, been under illegal surveillance by GCHQ, the U.K.’s signals intelligence agency.

Incredibly, the initial judgment had named the wrong organization — the Egyptian Initiative for Personal Rights — and it took 10 days to correct the mix-up. The news brought an unexpected and bizarre sense of relief: We strongly suspected that we were being spied on by GCHQ, but having it confirmed in court meant we weren’t just being paranoid.

Of course, GCHQ and likely its U.S. counterpart, the NSA, spy on a range of organizations besides Amnesty. The same IPT judgment revealed GCHQ’s unlawful surveillance of the South African Legal Resources Centre. Leaks by NSA whistleblower Edward Snowden showed that GCHQ and the NSA have spied on Doctors of the World and UNICEF. And the fact that the IPT did not find in favor of the eight other organizations bringing the case does not necessarily mean their communications were left untouched — perhaps they were intercepted, but the tribunal considered it had been done legally.

This whole process brings to light the problem with the so-called “oversight” of U.K. surveillance programs. In the U.K., a government minister, not a judge, issues surveillance warrants; from the very start the executive branch of government authorizes its own spying.

 

…click on the above link to read the rest of the article…

Apple and Google Just Attended a Confidential Spy Summit in a Remote English Mansion

Apple and Google Just Attended a Confidential Spy Summit in a Remote English Mansion

At an 18th-century mansion in England’s countryside last week, current and former spy chiefs from seven countries faced off with representatives from tech giants Apple and Google to discuss government surveillance in the aftermath of Edward Snowden’s leaks.

The three-day conference, which took place behind closed doors and under strict rules about confidentiality, was aimed at debating the line between privacy and security.

Among an extraordinary list of attendees were a host of current or former heads from spy agencies such as the CIA and British electronic surveillance agency Government Communications Headquarters, or GCHQ. Other current or former top spooks from Australia, Canada, France, Germany and Sweden were also in attendance. Google, Apple, and telecommunications company Vodafone sent some of their senior policy and legal staff to the discussions. And a handful of academics and journalists were also present.

According to an event program obtained by The Intercept, questions on the agenda included: “Are we being misled by the term ‘mass surveillance’?” “Is spying on allies/friends/potential adversaries inevitable if there is a perceived national security interest?” “Who should authorize intrusive intelligence operations such as interception?” “What should be the nature of the security relationship between intelligence agencies and private sector providers, especially when they may in any case be cooperating against cyber threats in general?” And, “How much should the press disclose about intelligence activity?”

The list of participants included:

 

From companies:

Richard Salgado, Google’s legal director for law enforcement and information security; Verity Harding, Google’s U.K. public policy manager and head of security and privacy policy; Jane Horvath, Apple’s senior director of global privacy; Erik Neuenschwander, Apple’s product security and privacy manager; Matthew Kirk, Vodafone Group’s external affairs director; and Phillipa McCrostie, global vice chair of transaction advisory services, Ernst & Young.

…click on the above link to read the rest of the article…

 

 

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress