Jump to content
Sign in to follow this  
cavanami

Germany Thread

Recommended Posts

21 hours ago, cavanami said:

Please provide a link to verify your comment.

https://www.reuters.com/article/us-germany-usa-spying/u-s-spy-agency-tapped-german-chancellery-for-decades-wikileaks-idUSKCN0PI2AD20150709

WikiLeaks published what it said were three NSA intercepts of Merkel’s conversations, and data it said listed telephone numbers for the chancellor, her aides, her office and even her fax machine.

“The names associated with some of the targets indicate that spying on the Chancellery predates Angela Merkel as it includes staff of former Chancellor Gerhard Schroeder (in office 1998-2002), and his predecessor Helmut Kohl,” WikiLeaks added in a statement.

The intercepts detailed communications from Merkel in 2009 on the international financial crisis, with the crown prince of the United Arab Emirates in 2009 on Iran, and with advisers in 2011 on the euro zone crisis.

The targeted phone numbers included those for the cellphones of senior officials at the chancellery and included that of Ronald Pofalla, Merkel’s former chief of staff, WikiLeaks said.

https://www.bbc.com/news/world-europe-28243933

 

https://www.infoworld.com/article/2609310/apple--cisco--dell-unhappy-over-alleged-nsa-back-doors-in-their-gear.html

Germany's Der Spiegel newsmagazine reported Monday that the U.S. National Security Agency has for years compromised a wide range of hardware devices, including PCs, iPhones, hard drives, and network routers, as part of its spying activities. The NSA also installed back doors into European telecom networks and into BlackBerry's network operations center to spy on communications, the Der Spiegel report says.

The spy agency's Tailored Access Operations (TAO) unit is alleged to have installed such hidden access methods in a variety of devices from Apple, Cisco Systems, Dell, Huawei, Juniper, Maxtor, Samsung, Seagate, and Western Digital, among others. Although the precise methods are unclear, many seem to involve installation of monitoring software or modified firmware -- some on devices intercepted in transit from vendors to their customers.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...