zondag 18 september 2016

Oliver Stone Film About Snowden

Great New Oliver Stone Film About Snowden; Here Are the Snooping Programs He Helped Expose

6 hours ago | 405 5
Originally appeared at The Intercept
Oliver Stone’s latest film, “Snowden,” bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.
Stone’s rendering of Snowden’s life combines facts with Hollywood invention, covering Snowden being discharged from the military after an injury in basic training, meeting his girlfriend, and training in the CIA with fictitious mentors (including Nicolas Cage’s character, most likely a composite of whistleblowers like Thomas Drake and Bill Binney). Snowden then goes undercover, only to see an op turn ugly; becomes a contractor for the CIA and NSA; and finally chooses to leave the intelligence community and disclose its vast surveillance apparatus, some of which he helped develop.
The movie hits key points in Snowden’s story, including his growing interest in constitutional law and the Foreign Intelligence Surveillance Court, some of the U.S. surveillance programs he eventually unmasked, and parts of his furtive meetings in Hong Kong with Glenn Greenwald and Laura Poitras (co-founders of The Intercept), as well as The Guardian’s Ewen MacAskill.

There are doses of artistic license — for example, a Rubik’s Cube hiding the drive where he stored the documents, and Snowden’s CIA mentor spying on his girlfriend through her webcam. In hazier focus are the global questions his revelations raised, including the legal and moral implications of the U.S. government collecting data on foreigners and Americans with relative impunity, and the very real stories born of Snowden’s massive disclosures.
So here’s a retrospective of sorts for moviegoers and others interested in the journalism Edward Snowden made possible through his decision to become a whistleblower: In all, over 150 articles from 23 news organizations worldwide have incorporated documents provided by Snowden, and The Intercept and other outlets continue to mine the archive for stories of social and political significance.
In the hope that Stone’s movie will spark more widespread interest in the NSA programs Snowden helped bring to light, The Intercept has compiled its stories based on the archive of documents, which can be explored through the chart below.
Published
 ArticleCode Names
2/14/14The NSA’s Secret Role in the U.S. Assassination ProgramGILGAMESH, SHENANIGANS, VICTORYDANCE
2/18/14Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its SupportersANTICRISIS GIRL, TEMPORA, XKEYSCORE
2/24/14How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations 
3/7/14The NSA Has an Advice Columnist. Seriously. 
3/12/14How the NSA Plans to Infect “Millions” of Computers With MalwareCAPTIVATEDAUDIENCE, FOGGYBOTTOM, FOXACID, GROK, GUMFISH, HAMMERCHANT, HAMMERSTEIN, QUANTUM, QUANTUMCOPPER, QUANTUMHAND, QUANTUMSKY, SADDLEBACK, SECONDDATE, SOCIALIST, STELLARWIND, TURBINE, TURMOIL, UNITEDRAKE, VALIDATOR, WILLOWVIXEN
3/13/14Foreign Officials in the Dark About Their Own Spy Agencies’ Cooperation With NSAPRISM, TEMPORA
3/15/14Compare the NSA’s Facebook Malware Denial to Its Own Secret DocumentsQUANTUMHAND, QUANTUMTHEORY, TURBINE
3/20/14Inside the NSA’s Secret Efforts to Hunt and Hack System AdministratorsQUANTUM
4/4/14The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda BucketROYAL CONCIERGE, SALAMANCA
4/30/14British Spy Chiefs Secretly Begged to Play in NSA’s Data PoolsBLARNEY, GHOSTMACHINE, PRISM, STORMBREW,
5/19/14Data Pirates of the Caribbean: The NSA Is Recording Every Cellphone Call in the BahamasMYSTIC, SOMALGET
7/9/14Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On 
7/14/14Hacking Online Polls and Other Ways British Spies Seek to Control the InternetANGRY PIRATE, CHANGELING, ELATE, GATEWAY, GESTATOR, IMPERIAL BARGE, PREDATORS FACE, ROLLING THUNDER, SLIPSTREAM, SPRING BISHOP, UNDERPASS
7/23/14The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police 
8/3/14Cash, Weapons, and Surveillance: The U.S. Is a Key Party to Every Israeli AttackYESTERNIGHT
8/5/14NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting 
8/25/14ICREACH: How the NSA Built Its Own Secret GoogleCRISSCROSS, GLOBALREACH, ICREACH, PROTON,
9/14/14The NSA and GCHQ Campaign Against German Satellite CompaniesTREASURE MAP
9/15/14New Zealand Launched Mass Surveillance Project While Publicly Denying ItSPEARGUN, XKEYSCORE
10/10/14Core Secrets: NSA Saboteurs in China and GermanySENTRYCONDOR, SENTRYEAGLE, SENTRYHAWK, SENTRYOSPREY, SENTRYRAVEN
12/4/14Operation AURORAGOLD: How the NSA Hacks Cellphone Networks WorldwideAURORAGOLD, OPULANT PUP, WOLFRAMITE
12/13/14Operation Socialist: How GCHQ Spies Hacked Belgium’s Largest TelcoHACIENDA, HOPSCOTCH, LEGSPIN, NOCTURNAL SURGE, STELLARWIND, SOCIALIST
2/4/15Western Spy Agencies Secretly Rely on Hackers for Intel and ExpertiseINTOLERANT, LOVELY HORSE
2/10/15NSA Claims Iran Learned From Western Cyberattacks 
2/19/15The Great SIM Heist: How Spies Stole the Keys to the Encryption CastleDAPINO GAMMA, HIGHLAND FLING, XKEYSCORE
3/10/15iSpy: The CIA Campaign to Steal Apple’s SecretsDREAMY SMURF, NOSEY SMURF, PARANOID SMURF, TRACKER SMURF, WARRIORPRIDE
4/2/15Britain Used Spy Team to Shape Latin American Public Opinion on FalklandsQUITO
5/5/15The Computers Are Listening: How the NSA Converts Spoken Words Into Searchable TextRHINEHART
5/11/15The Computers Are Listening: Speech Recognition Is NSA’s Best-Kept Open Secret 
6/8/15The Computers Are Listening: NSA Won’t Say If It Automatically Transcribes American Phone Calls In BulkPRISM, UPSTREAM
5/8/15U.S. Government Labeled Al Jazeera Journalist as Al QaedaSKYNET
5/18/15Snowden Files Give New Details on Osama Bin Laden Raid 
5/21/15The NSA Plan to Find Bin Laden by Hiding Tracking Devices in Medical Supplies 
5/28/15Inside NSA, Officials Privately Criticize “Collect It All” Surveillance 
6/22/15Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research 
6/22/15Popular Security Software Came Under Relentless NSA and GCHQ AttacksCAMBERDADA, PRISM
6/22/15Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law 
6/26/15How the NSA Started Investigating the New York Times’s Warrantless Wiretapping Story 
7/1/15XKEYSCORE: NSA’s Google for the World’s Private CommunicationsBADASS, NUCLEON, XKEYSCORE
7/15/15Israeli Special Forces Assassinated Senior Syrian Official 
8/3/15GCHQ and Me: My Life Unmasking British EavesdroppersCARBOY, FROSTING, ECHELON, SHAMROCK, SOUNDER, TRANSIENT
8/11/15The Philosopher of Surveillance: What Happens When a Failed Writer Becomes a Loyal Spy? 
9/25/15From Radio to Porn, British Spies Track Web Users’ Online IdentitiesBLACKHOLE, INFINITE MONKEYS, KARMA POLICE, MARBLED GECKO, MEMORY HOLE, MUTANT BROTH, SAMUEL PEPYS, SOCIAL ANTHROPOID, TEMPORA, XKEYSCORE
9/28/15Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?SENTRYOWL
11/18/15Overwhelmed NSA Surprised to Discover Its Own Surveillance “Goldmine” on Venezuela’s Oil ExecutivesCADENCE, PINWALE
1/28/16Israeli Drone Feeds Hacked by British and American IntelligenceANARCHIST
5/16/16NSA Closely Involved in Guantánamo Interrogations, Documents Show 
6/7/16Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence FailureMILKWHITE, PRESTON
6/28/16The Hunter: He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen 
8/15/16In Bungled Spying Operation, NSA Targeted Pro-Democracy CampaignerPRISM
8/19/16The NSA Leak Is Real, Snowden Documents ConfirmBADDECISION, BLINDDATE, ELIGIBLE BOMBSHELL, FOXACID, MAGICBEAN, MAGIC SQUIRREL, NIGHTSTAND, POLARSNEEZE, SECONDDATE, TURBINE
9/6/16Inside Menwith Hill: The NSA’s British Base at the Heart of U.S. Targeted KillingGHOSTHUNTER, GHOSTWOLF
Since the first revelations from Snowden were published in Glenn Greenwald’s June 6, 2013, Guardian article, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,” nearly 1,200 documents from Snowden’s disclosures have been released to the public. These include fragments of the “black budget,” a secret document presented to Congress by intelligence agencies, images hacked from drone feeds, and PowerPoint presentations that painstakingly detail the technology behind the NSA’s surveillance efforts.
The Intercept and other outlets have reported extensively on some of the major technical programs mentioned during the film — PRISM and Upstream, both authorized under Section 702 of the Foreign Intelligence Surveillance Act. PRISM vacuums up hundreds of millions of internet communications every day from the people it “targets,” and those they communicate with — as well as some irrelevant communications it picks up “incidentally” because of the way the technology works. It’s unclear how many of those communications belong to Americans. Upstream gathers communications while they’re traveling through the cables of the internet — voice, text, and more. In the movie, Snowden gets a glimpse at these programs while going undercover for the CIA.
When Snowden shares a map with a few of his colleagues displaying data on surveillance conducted within different countries, the film is likely nodding toward a program called Boundless Informant — another one of the first Snowden stories reported by Greenwald and MacAskill. The NSA denied at the time that it could determine with absolute certainty “the identity or location” of all the communications it collected — but the program gave it a general sense of the volume of information it got from each country, appearing like a sort of heat map. The U.S. was not, like the movie suggests, the country where the NSA collected the most information; there were many more intercepts from Iran, at least during the time period reported on by The Guardian.
The Intercept debuted its Snowden coverage with a February 10, 2014, article by Jeremy Scahill and Glenn Greenwald titled “The NSA’s Secret Role in the U.S. Assassination Program.” Since then, we have published at least 50 other pieces based on documents from the Snowden archive.
In July 2015, The Intercept delved into one of the NSA’s central programs, also mentioned in the film, called XKeyscore. The program runs like a search engine that helps NSA detect, analyze, and extract information from the massive amounts of communications and online information it collects every day through various filters. Otherwise, the sheer volume of information would be overwhelming.
The agency’s use of cellphone and computer hacking for surveillance has been a recurring theme in The Intercept’s reporting on the Snowden documents. In May 2015, Jeremy Scahill and Josh Begley uncovered the CIA and NSA’s joint mission to crack the security of popular consumer products, including Apple’s notoriously secure iPhone. In the movie, Snowden covers his laptop’s webcam, which he knows the NSA is capable of exploitingthrough a program called QUANTUM. In reality, the NSA has developed malware implants potentially capable of infecting millions of targeted computers covertly, and automated some of the processes involved in the attacks, as Ryan Gallagher and Glenn Greenwald reported in March 2014.
Many news stories from the Snowden archive involve foreign surveillance and the NSA’s partnerships with intelligence agencies from other countries, a subject the Snowden film barely touches — for example, never mentioning the NSA’s close relationship to the British spy agency Government Communications Headquarters (GCHQ); its partnership with countries like Saudi Arabia; or foreign officials’ lack of understanding about their own spies’ connections to the NSA. The film’s only nod to foreign intelligence occurs when Snowden passes off a special microchip to MacAskill, suggesting it might help him learn more about British spying.
The NSA is obviously more than its technical programs and tools. Stone conjures up Snowden’s friends and colleagues at the spy agencies, including T-shirt-wearing hackers, super genius engineers, and domineering bosses. The Intercept’s Peter Maass has written about the human side of the agency, including its resident advice columnist, who went by“Zelda” and answered questions about things like kitchen etiquette and gossip, as well as a columnist with literary ambitions who called himself “the SIGINT Philosopher.”
Ultimately, the movie reflects Stone’s image of the life of an NSA contract employee. For a real window into the agency, there may be no better resource than the NSA’s own documents. In May 2016, The Intercept began the first concerted effort to make large portions of the Snowden archive available to the public with the release of a set of SIDtoday newsletters, the internal news organ of the Signals Intelligence Directorate at the NSA. The batch releases are ongoing and will likely constitute one of the largest single collections of NSA files.


Geen opmerkingen:

How Fascism Came

  How Fascism Came CHRIS HEDGES  • DECEMBER 23, 2024  • 1,700 WORDS   •  60 COMMENTS   •  REPLY Tweet Reddit Share Share Email Print More  R...