1 surveillance and privacy in the snowden era nicky hager 30 january 2014
TRANSCRIPT
![Page 1: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/1.jpg)
1
Surveillance and Surveillance and privacy in the privacy in the Snowden eraSnowden era
Nicky Hager Nicky Hager
30 January 201430 January 2014
![Page 2: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/2.jpg)
2
NSA HQ, Washington DC – NSA HQ, Washington DC –
![Page 3: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/3.jpg)
3
New Zealand’s Waihopai New Zealand’s Waihopai stationstation
![Page 4: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/4.jpg)
4
Sugar Grove, West Virginia
![Page 5: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/5.jpg)
5
NSA Yakima station in NSA Yakima station in Washington State, with Washington State, with dishes facing the Pacific dishes facing the Pacific
skiesskies
![Page 6: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/6.jpg)
6
Pine Gap, central Pine Gap, central AustraliaAustralia
![Page 7: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/7.jpg)
7
Menwith Hill station Menwith Hill station (NSA)(NSA)
![Page 8: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/8.jpg)
8
![Page 9: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/9.jpg)
9
![Page 10: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/10.jpg)
10
The Echelon Committee The Echelon Committee urged EU countries to . . .urged EU countries to . . . Acknowledge the existence of Echelon systemAcknowledge the existence of Echelon system Inform their citizens about the threats to Inform their citizens about the threats to
privacyprivacy Establish Europe-wide advisory agencies to Establish Europe-wide advisory agencies to
provide practical assistance in protection provide practical assistance in protection against surveillance, including promoting against surveillance, including promoting encryption technology and development of encryption technology and development of open-source encryption software.open-source encryption software.
Systematically encrypt their government e-Systematically encrypt their government e-mails “so that ultimately encryption becomes mails “so that ultimately encryption becomes the norm.”the norm.”
![Page 11: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/11.jpg)
11
Main interception Main interception locations todaylocations today
![Page 12: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/12.jpg)
12
““Special collection” Special collection” (embassy-based (embassy-based eavesdropping eavesdropping
operations)operations)
![Page 13: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/13.jpg)
13
![Page 14: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/14.jpg)
14
Target logs into Yahoo Target logs into Yahoo accountaccount
![Page 15: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/15.jpg)
15
SSO site detects userSSO site detects user
![Page 16: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/16.jpg)
16
User’s packet forwarded User’s packet forwarded to TAO(Taylored Access to TAO(Taylored Access
Ops) Foxacid serverOps) Foxacid server
![Page 17: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/17.jpg)
17
Injects code into packet Injects code into packet and send it back to userand send it back to user
![Page 18: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/18.jpg)
18
Foxacid packet beats the Foxacid packet beats the Yahoo packet back to the Yahoo packet back to the
useruser
![Page 19: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/19.jpg)
19
Foxacid now in Foxacid now in background behind background behind
Yahoo webpageYahoo webpage
![Page 20: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/20.jpg)
20
NSA’s TAO unit sends NSA’s TAO unit sends implant into user’s implant into user’s
computercomputer
![Page 21: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/21.jpg)
21
Target implanted!Target implanted!
![Page 22: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/22.jpg)
22
Main interception Main interception locations todaylocations today
![Page 23: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/23.jpg)
23
Growth of the InternetGrowth of the Internet
![Page 24: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/24.jpg)
24
![Page 25: 1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014](https://reader036.vdocuments.site/reader036/viewer/2022062804/56649f095503460f94c1dfd0/html5/thumbnails/25.jpg)
25
Growth of the InternetGrowth of the Internet