NSA, GCHQ spy on millions of Yahoo users

This 27 February 2014 video is called GCHQ & NSA Store Millions of Yahoo Webcam Images.

By Thomas Gaist:

GCHQ, NSA collected webcam images from 1.8 million Yahoo users

28 February 2014

Under a program code-named “Optic Nerve,” the British Government Communications Headquarters (GCHQ), working in coordination with the American National Security Agency (NSA), has been collecting webcam images in bulk and saving them to agency databases.

According to documents obtained by the Guardian (“Yahoo webcam images from millions of users intercepted by GCHQ”), GCHQ targeted 1.8 million webcam users in a single six-month period in 2008. Collection of images has been carried out indiscriminately, without regard to whether users were targets of an intelligence investigation.

The operations collected imagery from the webcams by saving screen shots every five minutes during live video chats. The GCHQ documents also mention possible surveillance efforts involving other web-based video technologies, including the Xbox 360 “Kinect” camera, and indicate that Optic Nerve was still active as of 2012.

Yahoo has responded with a statement condemning the surveillance operations, saying, “This report, if true, represents a whole new level of violation of our users’ privacy that is completely unacceptable, and we strongly call on the world’s government to reform surveillance law consistent with the principles we outlined in December.”

Despite Yahoo’s criticisms, the major telecommunications companies have been collaborating with the NSA’s surveillance operations for years. The PRISM surveillance program, for instance, has been systematically spying on millions of users of Skype, Google, Facebook, YouTube, Microsoft, Yahoo, Apple, and others since 2007. An NSA document leaked by Edward Snowden last year stated that PRISM relies on “assistance of communications providers in the US” and specifically lists AOL, Apple, Facebook, Google, Microsoft, PalTalk and Yahoo with the dates on which they “joined” PRISM.

Optic Nerve has also involved experimental efforts with facial-recognition technology. A GCHQ document cited by the Guardian shows that the agency has sought to develop the capability to search through ongoing webcam sessions for faces already included in the database.

The program collected information via GCHQ’s “Internet cable taps” operated by the agency’s TEMPORA program, through which the agency dips directly into the fiber-optic lines that carry vast quantities of data around the world.

As the Guardian noted in relation to the close collaboration of US intelligence with its British partner, “Optic Nerve was based on collecting information from GCHQ’s huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA’s XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo’s webcam traffic.”

The Guardian reported that the webcam material “included large quantity of sexually explicit images,” estimating the quantity of sexually explicit material at between 3 and 11 percent of the images collected. As the GCHQ document put it, “it would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person.”

These latest revelations further expose the contempt of the US and British governments for the democratic rights and privacy of the world’s population. Far from narrowly targeted operations directed against terrorists and criminals, these agencies are running mass data collection programs directed against the population as a whole. The state is seeking to accumulate as much information, in whatever form it can use, for the purpose of targeting political organizations and individuals.

These revelations come on the heels of reports that the spy agencies monitor the personal habits of targets as part of their human intelligence (HUMINT) efforts. The operations, revealed in a leaked GCHQ document, “The Art of Deception: Training for a New Generation of Online Covert Operations,” seek to discredit and disrupt groups deemed hostile to the state, through systematic blackmail and intimidation. The most intimate aspects of Internet users’ lives are being actively compiled by government units such as the Joint Threat Research Intelligence Group (JTRIG), in preparation for political and psychological operations aimed at suppressing opposition to the ruling elite.

Also this week, the Justice Department sought permission from the FISA court for the NSA to retain telephone metadata on an indefinite basis. This data includes phone records for millions of Americans, showing when they placed calls, with whom they spoke, and for how long.

“The United States must ensure that all potentially relevant evidence is retained which includes the [business records] metadata obtained in bulk from certain telecommunications service providers pursuant to this court’s production orders,” said the Justice Department filing.

Current rules drawn up by the FISA court limit retention of metadata by the surveillance agency to five years. In its filing submitted Wednesday, the Justice Department asserted that data must be kept indefinitely to preserve evidence relevant to lawsuits brought against the government by the Electronic Frontier Foundation and other civil liberties groups.

GCHQ’s spy toolkit: Leaked documents reveal how UK manipulates information online: here.

TWO Green Party politicians brought a case to the Investigatory Powers Tribunal yesterday over claims that they were put under surveillance by GCHQ. The case has been launched by MP Caroline Lucas, who represents Brighton Pavilion, and London Assembly member Baroness Jones of Moulsecoomb: here.

THE government was forced yesterday to release secret documents which show that GCHQ and MI5 actively targeted legally privileged conversations between lawyers and their clients

The fallout continued yesterday after the revelation that MI5 and GCHQ routinely spied on privileged lawyer-client conversations: here.

NOBODY should be surprised that Britain’s intelligence agencies collect and use confidential information passed between lawyers and their clients. In reality there are no effective limits to what the Security Service (MI5), Secret Intelligence Service (MI6) or eavesdropping centre GCHQ can do in the name of the “national interest” and “national security.” Only informed public opinion and the danger that it might demand some democratic control over them has ever prevented these agencies from going even further than they do: here.

Amnesty International vowed yesterday to take its fight against British spooks to Europe’s court of human rights after their blanket surveillance techniques were deemed lawful: here.

Britain: An intelligence sharing regime between British and US security services was unlawful, a surveillance watchdog has ruled. The Investigatory Powers Tribunal (IPT), which deals with complaints against GCHQ, MI5 and MI6, found that intercepted communications were provided to Britain’s listening post GCHQ in breach of human rights laws: here.

Beginning in 2010, a previously undisclosed unit of the British GCHQ acting with support from the NSA, the Mobile Handset Exploitation Team (MHET), penetrated the internal networks of cell phone SIM card manufacturing companies in order to steal encryption keys before the phones came to market, according to documents revealed by NSA whistleblower Edward Snowden and published this week on the Intercept : here.

GCHQ conducted illegal surveillance, investigatory powers tribunal rules. Eavesdropping agency must destroy documents containing legally privileged communications relating to Libyan rendition victim Sami al-Saadi: here.

UK government admits spying on British population for decades: here.

The Government Communications Headquarters (GCHQ) has proposed that tech companies allow state spies into encrypted chats and calls. The new surveillance measures, known as a “ghost protocol,” would allow a government agent to “sit in” on ostensibly secure private conversations without the knowledge of other participants. This news comes just days after MI5 and GCHQ’s admission that they are acting illegally in their use of bulk data, gathered by intruding into the lives of millions of innocent people: here.

THE Foreign Office unlawfully gave British spooks the power to collect huge amounts of personal information from telecommunications companies for over a decade, the Investigatory Powers Tribunal ruled today. Campaign group Privacy International has been involved in a long-running legal battle with the Foreign and Home Offices, GCHQ, MI5 and MI6 over the collection and retention of bulk communications data and bulk personal datasets: here.

68 thoughts on “NSA, GCHQ spy on millions of Yahoo users

  1. Pingback: NSA spies on billions of people, Snowden says | Dear Kitty. Some blog

  2. Pingback: CIA violates United States constitution, Senator Feinstein says | Dear Kitty. Some blog

  3. Pingback: Graffiti artist Banksy against spying on citizens | Dear Kitty. Some blog

  4. Pingback: German government blocks investigation of NSA spying scandal | Dear Kitty. Some blog

  5. Pingback: ‘British secret police spying on Parliament’ | Dear Kitty. Some blog

  6. Pingback: British government censors over 1,800 petitions | Dear Kitty. Some blog

  7. Pingback: NSA spying on Merkel investigation | Dear Kitty. Some blog

  8. Pingback: Governments spying on Vodafone conversations | Dear Kitty. Some blog

  9. Pingback: British government spying on everyone | Dear Kitty. Some blog

  10. Pingback: Stop British governmental mass spying on citizens | Dear Kitty. Some blog

  11. Pingback: Dutch Internet provider sues British spies | Dear Kitty. Some blog

  12. Pingback: United States NSA role in censoring British daily Guardian | Dear Kitty. Some blog

  13. Pingback: British, United States spying violating international law | Dear Kitty. Some blog

  14. Pingback: Corporations sell cellphone spying tools to governments | Dear Kitty. Some blog

  15. Pingback: Bush’s spying on Yahoo customers | Dear Kitty. Some blog

  16. Pingback: British government’s Libyan torture scandal | Dear Kitty. Some blog

  17. Pingback: Edward Snowden interviewed | Dear Kitty. Some blog

  18. Pingback: Close British military base in Cyprus | Dear Kitty. Some blog

  19. Pingback: British government torture whitewash | Dear Kitty. Some blog

  20. Pingback: British spy boss demands Internet companies should help spying | Dear Kitty. Some blog

  21. Pingback: Writers, media self-censoring because of NSA spying | Dear Kitty. Some blog

  22. Pingback: British secret police spying on journalists | Dear Kitty. Some blog

  23. Pingback: British secret police spying on Parliament | Dear Kitty. Some blog

  24. Pingback: Collabroration between British MI5 and Hitler’s Gestapo | Dear Kitty. Some blog

  25. In files leaked by Edward Snowden last year, GCHQ was shown to have developed tools to influence online debates, change the outcome of polls, “amplify” sanctioned messages on YouTube and send spoof emails from registered accounts.

    First Look Media, which published the leaks, described it as the UK spy agency’s weapon in mastering the dark arts of the internet, a “hacker’s buffet for wreaking online havoc”.

    It claimed that GCHQ staff were encouraged to “think big” about what they could build to help facilitate “internet deception”.

    GCHQ said that their programs, with codenames such as Warpath, Silver Lord and Rolling Thunder, were all “in accordance with a strict legal and policy framework” subject to “rigorous oversight”, a claim queried by Glenn Greenwald, the former Guardian journalist who set up First Look Media.

    The database holding the programs had been accessed more than 20,000 times, but there is no evidence that they have ever been deployed for use beyond GCHQ staff.



  26. Pingback: German, NSA spying on Dutch business | Dear Kitty. Some blog

  27. Pingback: British fake mobile phone towers to spy on the people | Dear Kitty. Some blog

  28. Pingback: British government’s illegal spying on human rights organisations | Dear Kitty. Some blog

  29. Pingback: United States Yemeni civilians-killing drones and British GCHQ | Dear Kitty. Some blog

  30. Pingback: British Conservatives help ISIS | Dear Kitty. Some blog

  31. Pingback: British government spying on Amnesty International | Dear Kitty. Some blog

  32. Pingback: United States NSA political, economic espionage on Japanese allies | Dear Kitty. Some blog

  33. Pingback: NSA spying, corporations collaborating | Dear Kitty. Some blog

  34. Pingback: ‘Spying on British Parliament is legal’ | Dear Kitty. Some blog

  35. Pingback: FBI spy planes over Ferguson and Baltimore, USA | Dear Kitty. Some blog

  36. Pingback: Orwell’s 1984 fiction, 2015 British reality? | Dear Kitty. Some blog

  37. Pingback: US NSA, British GCHQ spying on Israel | Dear Kitty. Some blog

  38. Pingback: British governmental, corporate complicity in human rights abuses | Dear Kitty. Some blog

  39. Pingback: Edward Snowden, new Oliver Stone film | Dear Kitty. Some blog

  40. Pingback: British government spying on citizens, documentary | Dear Kitty. Some blog

  41. Pingback: British government helps US drone assassinations | Dear Kitty. Some blog

  42. Pingback: Edward Snowden, Oliver Stone film reviewed | Dear Kitty. Some blog

  43. Pingback: Corporate media and fake news | Dear Kitty. Some blog

  44. Pingback: Murder Edward Snowden, Canadian spying bigwig says | Dear Kitty. Some blog

  45. Pingback: Berlin atrocity abused for xenophobia | Dear Kitty. Some blog

  46. Pingback: Donald Trump’s Jeff Sessions, bad news | Dear Kitty. Some blog

  47. Pingback: Donald Trump golden shower fake news | Dear Kitty. Some blog

  48. Pingback: Microsoft blames NSA for Wannacry ransomware scandal | Dear Kitty. Some blog

  49. Pingback: WannaCry ransomware, ‘thank you’, NSA! | Dear Kitty. Some blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.