Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make"
GUESTS
Glenn Greenwald, is the journalist who first broke the story about Edward Snowden. He was previously a columnist at The Guardiannewspaper and is creating a new media venture with Laura Poitras, Jeremy Scahill and eBay founder Pierre Omidyar.
Jameel Jaffer, American Civil Liberties Union deputy legal director and director of its Center for Democracy.
DONATE →
This is viewer supported news
The German publication Der Spiegel has revealed new details about a secretive hacking unit inside the National Security Agency called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Hackers inside the TAO have developed a way to break into computers running Microsoft Windows by gaining passive access to machines when users report program crashes to Microsoft. In addition, with help from the CIA and FBI, the NSAhas the ability to intercept computers and other electronic accessories purchased online in order to secretly insert spyware and components that can provide backdoor access for the intelligence agencies. American Civil Liberties Union Deputy Legal Director Jameel Jaffer and journalist Glenn Greenwald join us to discuss the latest revelations, along with the future of Edward Snowden.
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: This is Democracy Now!, democracynow.org,The War and Peace Report. I’m Amy Goodman, as we continue our conversation about the National Security Agency. On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
GLENN GREENWALD: Sure. I think everybody knows by now, or at least I hope they do after the last seven months reporting, that the goal of the NSA really is the elimination of privacy worldwide—not hyperbole, not metaphor, that’s literally their goal, is to make sure that all human communications that take place electronically are collected and then stored by the NSA and susceptible to being monitored and analyzed. But the specifics are still really important to illustrate just the scope and invasiveness and the dangers presented by this secret surveillance system.
And what the Der Spiegel article details is that one of the things that the NSA is really adept at doing is implanting in various machines—computers, laptops, even cellphones and the like—malware. And malware is essentially a program that allows theNSA, in the terminology that hackers use, to own the machine. So, no matter how much encryption you use, no matter how much you safeguard your communication with passwords and other things, this malware allows the NSA to literally watch every keystroke that you make, to get screen captures of what it is that you’re doing, to circumvent all forms of encryption and other barriers to your communications.
And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
AMY GOODMAN: So, I mean, just to be really specific, you order a computer, and it’s coming UPS, or it’s coming FedEx, and they have it redirected to their own—you know, to the NSA, and they put in the malware, the spyware, and then send it on to you?
SHOW FULL TRANSCRIPT ›
Geen opmerkingen:
Een reactie posten