Monthly Archives: December 2013

Snowden’s mission ‘already accomplished’

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

“For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself.”

“All I wanted was for the public to be able to have a say in how they are governed,” he said. “That is a milestone we left a long time ago. Right now, all we are looking at are stretch goals.”

Snowden is an orderly thinker, with an engineer’s approach to problem-solving. He had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. Classification rules erected walls to prevent public debate.

Toppling those walls would be a spectacular act of transgression against the norms that prevailed inside them. Someone would have to bypass security, extract the secrets, make undetected contact with journalists and provide them with enough proof to tell the stories.

The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

“You recognize that you’re going in blind, that there’s no model,” Snowden said, acknowledging that he had no way to know whether the public would share his views.

“But when you weigh that against the alternative, which is not to act,” he said, “you realize that some analysis is better than no analysis. Because even if your analysis proves to be wrong, the marketplace of ideas will bear that out. If you look at it from an engineering perspective, an iterative perspective, it’s clear that you have to try something rather than do nothing.”

By his own terms, Snowden succeeded beyond plausible ambition. The NSA, accustomed to watching without being watched, faces scrutiny it has not endured since the 1970s, or perhaps ever.

Facebooktwittermail

How the NSA became an advanced persistent threat to global cybersecurity

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

The documents leaked by Snowden compelled attention because they revealed to Americans a history they did not know they had.

Internal briefing documents reveled in the “Golden Age of Electronic Surveillance.” Brawny cover names such as MUSCULAR, TUMULT and TURMOIL boasted of the agency’s prowess.

With assistance from private communications firms, the NSA had learned to capture enormous flows of data at the speed of light from fiber-optic cables that carried Internet and telephone traffic over continents and under seas. According to one document in Snowden’s cache, the agency’s Special Source Operations group, which as early as 2006 was said to be ingesting “one Library of Congress every 14.4 seconds,” had an official seal that might have been parody: an eagle with all the world’s cables in its grasp.

Each year, NSA systems collected hundreds of millions of e-mail address books, hundreds of billions of cellphone location records and trillions of domestic call logs.

Most of that data, by definition and intent, belonged to ordinary people suspected of nothing. But vast new storage capacity and processing tools enabled the NSA to use the information to map human relationships on a planetary scale. Only this way, its leadership believed, could the NSA reach beyond its universe of known intelligence targets.

In the view of the NSA, signals intelligence, or electronic eavesdropping, was a matter of life and death, “without which America would cease to exist as we know it,” according to an internal presentation in the first week of October 2001 as the agency ramped up its response to the al-Qaeda attacks on the World Trade Center and the Pentagon.

With stakes such as those, there was no capability the NSA believed it should leave on the table. The agency followed orders from President George W. Bush to begin domestic collection without authority from Congress and the courts. When the NSA won those authorities later, some of them under secret interpretations of laws passed by Congress between 2007 and 2012, the Obama administration went further still.

Using PRISM, the cover name for collection of user data from Google, Yahoo, Microsoft, Apple and five other U.S.-based companies, the NSA could obtain all communications to or from any specified target. The companies had no choice but to comply with the government’s request for data.

But the NSA could not use PRISM, which was overseen once a year by the surveillance court, for the collection of virtually all data handled by those companies. To widen its access, it teamed up with its British counterpart, Government Communications Headquarters, or GCHQ, to break into the private fiber-optic links that connected Google and Yahoo data centers around the world.

That operation, which used the cover name MUSCULAR, tapped into U.S. company data from outside U.S. territory. The NSA, therefore, believed it did not need permission from Congress or judicial oversight. Data from hundreds of millions of U.S. accounts flowed over those Google and Yahoo links, but classified rules allowed the NSA to presume that data ingested overseas belonged to foreigners.

Disclosure of the MUSCULAR project enraged and galvanized U.S. technology executives. They believed the NSA had lawful access to their front doors — and had broken down the back doors anyway.

Microsoft general counsel Brad Smith took to his company’s blog and called the NSA an “advanced persistent threat” — the worst of all fighting words in U.S. cybersecurity circles, generally reserved for Chinese state-sponsored hackers and sophisticated criminal enterprises.

Facebooktwittermail

The NSA has assumed the expansive powers of colonial Britain against which Americans fought

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

Snowden likened the NSA’s powers to those used by British authorities in Colonial America, when “general warrants” allowed for anyone to be searched. The FISA court, Snowden said, “is authorizing general warrants for the entire country’s metadata.”

“The last time that happened, we fought a war over it,” he said.

Technology, of course, has enabled a great deal of consumer surveillance by private companies, as well. The difference with the NSA’s possession of the data, Snowden said, is that government has the power to take away life or freedom.

At the NSA, he said, “there are people in the office who joke about, ‘We put warheads on foreheads.’ Twitter doesn’t put warheads on foreheads.”

Privacy, as Snowden sees it, is a universal right, applicable to American and foreign surveillance alike.

“I don’t care whether you’re the pope or Osama bin Laden,” he said. “As long as there’s an individualized, articulable, probable cause for targeting these people as legitimate foreign intelligence, that’s fine. I don’t think it’s imposing a ridiculous burden by asking for probable cause. Because, you have to understand, when you have access to the tools the NSA does, probable cause falls out of trees.”

Facebooktwittermail

Snowden took on a responsibility that others refused to exercise

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

It is commonly said of Snowden that he broke an oath of secrecy, a turn of phrase that captures a sense of betrayal. NSA Director Keith B. Alexander and Director of National Intelligence James R. Clapper Jr., among many others, have used that formula.

In his interview with The Post, Snowden noted matter-of-factly that Standard Form 312, the ­classified-information nondisclosure agreement, is a civil contract. He signed it, but he pledged his fealty elsewhere.

“The oath of allegiance is not an oath of secrecy,” he said. “That is an oath to the Constitution. That is the oath that I kept that Keith Alexander and James Clapper did not.”

People who accuse him of disloyalty, he said, mistake his purpose.

“I am not trying to bring down the NSA, I am working to improve the NSA,” he said. “I am still working for the NSA right now. They are the only ones who don’t realize it.”

What entitled Snowden, now 30, to take on that responsibility?

“That whole question — who elected you? — inverts the model,” he said. “They elected me. The overseers.”

He named the chairmen of the Senate and House intelligence committees.

“Dianne Feinstein elected me when she asked softball questions” in committee hearings, he said. “Mike Rogers elected me when he kept these programs hidden. . . . The FISA court elected me when they decided to legislate from the bench on things that were far beyond the mandate of what that court was ever intended to do. The system failed comprehensively, and each level of oversight, each level of responsibility that should have addressed this, abdicated their responsibility.”

“It wasn’t that they put it on me as an individual — that I’m uniquely qualified, an angel descending from the heavens — as that they put it on someone, somewhere,” he said. “You have the capability, and you realize every other [person] sitting around the table has the same capability but they don’t do it. So somebody has to be the first.”

Facebooktwittermail

Snowden blew the whistle from the inside before he went public

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

Beginning in October 2012, he said, he brought his misgivings to two superiors in the NSA’s Technology Directorate and two more in the NSA Threat Operations Center’s regional base in Hawaii. For each of them, and 15 other co-workers, Snowden said he opened a data query tool called BOUNDLESSINFORMANT, which used color-coded “heat maps” to depict the volume of data ingested by NSA taps.

His colleagues were often “astonished to learn we are collecting more in the United States on Americans than we are on Russians in Russia,” he said. Many of them were troubled, he said, and several said they did not want to know any more.

“I asked these people, ‘What do you think the public would do if this was on the front page?’ ” he said. He noted that critics have accused him of bypassing internal channels of dissent. “How is that not reporting it? How is that not raising it?” he said.

Facebooktwittermail

Snowden alerted his superiors about serious flaws with NSA information security

In the first in-person interview Edward Snowden has conducted since his arrival in Moscow in June, Barton Gellman reports:

Snowden recounted another set of conversations that he said took place three years earlier, when he was sent by the NSA’s Technology Directorate to support operations at a listening post in Japan. As a system administrator, he had full access to security and auditing controls. He said he saw serious flaws with information security.

“I actually recommended they move to two-man control for administrative access back in 2009,” he said, first to his supervisor in Japan and then to the directorate’s chief of operations in the Pacific. “Sure, a whistleblower could use these things, but so could a spy.”

That precaution, which requires a second set of credentials to perform risky operations such as copying files onto a removable drive, has been among the principal security responses to the Snowden affair.

Facebooktwittermail

The Democratic senators willing to risk a war with Iran

The Huffington Post reports: As the United States finally puts a decade of war behind it, a group of senators, including 15 Democrats, is defying the White House and threatening to push the country into a fresh war with Iran.

Sen. Bob Menendez (D-N.J.) is leading the charge to pass legislation in January that would impose tougher sanctions on Iran, despite dire warnings from the White House, Iranian leaders, 10 Democratic committee chairs and a host of liberal groups that such an effort could sink a delicate nuclear agreement already in place. Under that Nov. 24 deal, Tehran would curb its nuclear program in exchange for some relief from economic sanctions for a period of six months.

The Senate bill, which has 19 Republican cosponsors, takes a hard line, levying new sanctions on Iran unless the country’s leaders agree to abandon all uranium enrichment — what some have called an “absurd” stance. In the past, both John Kerry, then a U.S. senator, and Mohamed ElBaradei, former head of the International Atomic Energy Agency, have said that Iran has the right to enrich uranium for peaceful purposes.

Iranian Foreign Minister Javad Zarif said earlier this month that if the Senate moved forward with its bill, the current nuclear deal would be dead. A senior Obama administration official went further, telling The Huffington Post that Senate action makes it “far more likely that we’ll be left only with a military option” regarding Iran. [Continue reading…]

Facebooktwittermail

When ‘60 Minutes’ checks its journalistic skepticism at the door

David Carr writes: Last week, a study commissioned by the president concluded that the National Security Agency had reached too far into the private lives of Americans. The study, which came after a series of journalistic revelations exposing the agency’s surveillance practices, recommended numerous reforms that would curb the N.S.A.’s prerogatives. President Obama said he was “open to many” of the suggestions.

It was exactly the kind of news-making moment that “60 Minutes” — America’s leading purveyor of serious television news — has often been responsible for creating. For more than four decades, the program has exposed C.I.A. abuses, rogue military contractors and hundreds of corporate villains.

But where was “60 Minutes” on the N.S.A. story? The Sunday before the damning study, the program produced a segment that scanned as a friendly infomercial for the agency. Reported by John Miller, a CBS News reporter, the piece included extensive interviews with Gen. Keith Alexander, the director of the N.S.A.

In a scene that served as something of a metaphor for the whole segment, the producers negotiated access to the Black Chamber, a supersecret area where the nation’s top code breakers work. The door is briefly opened, we see a deserted office hall that looks like any other and then the door is closed. We get a look in, but we learn nothing.

Coming as it does on the heels of the now-discredited Benghazi report — in which “60 Minutes” said it was fooled by an eyewitness who was apparently nothing of the kind — the N.S.A. segment raises the question of whether the program has not just temporarily lost its mojo, but its skepticism as well. It didn’t help that the day after the piece aired, a federal judge ruled that the agency’s program of collecting phone records was most likely unconstitutional. [Continue reading…]

Facebooktwittermail

A spy world reshaped by Edward Snowden

The Los Angeles Times reports: After news reports that the National Security Agency had secretly monitored German Chancellor Angela Merkel’s cellphone calls, America’s top intelligence official was asked why congressional oversight committees were kept in the dark.

Shouldn’t Congress have been briefed, Rep. Adam B. Schiff (D-Burbank) asked James R. Clapper, the director of national intelligence, about a spying operation that would embarrass the U.S. government if exposed?

“Well, sir, there are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback,” Clapper replied at a House Intelligence Committee hearing in October. “The conduct of intelligence is premised on the notion that we can do it secretly, and we don’t count on it being revealed in the newspaper.”

Not these days. [Continue reading…]

Facebooktwittermail

RSA denies taking $10m from NSA to default backdoored algorithm

ZDNet reports: EMC-owned RSA Security has denied reports that the company had entered into secret contracts with the NSA worth $10 million to use the flaws Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) as the default pseudorandom number generator for the company’s encryptions products.

Over the weekend, sources told Reuters that as part of the US National Security Agency’s (NSA) efforts to promote Dual_EC_DRBG, the use of the algorithm by RSA allowed the agency to point to its usage within government to help push for its inclusion in the National Institute of Standards and Technology’s Recommendation for Random Number Generation Using Deterministic Random Bit Generators (PDF).

“Recent press coverage has asserted that RSA entered into a ‘secret contract’ with the NSA to incorporate a known flawed random number generator into its BSAFE encryption libraries. We categorically deny this allegation,” RSA responded today in a blog post.

Facebooktwittermail

Syria: barrel bombs ‘kill 87 children’ in Aleppo

Reuters reports: More than 300 people, 87 of them children, have been killed in a week of air raids on the northern Syrian city of Aleppo and nearby towns by President Bashar al-Assad’s forces, a monitoring group said on Monday.

Many were killed by so-called barrel bombs dropped from helicopters, the Syrian Observatory for Human Rights said.

Syrian authorities say they are battling rebels who have controlled parts of Syria’s biggest city and most of the surrounding countryside for the past 18 months.

But human rights groups have condemned the use of the improvised bombs – oil drums packed with explosives and metal fragments, and rolled out of the aircraft cargo bay – as indiscriminate bombardment. [Continue reading…]

Facebooktwittermail

Foreign fighters in Syria still remain a small fraction of the opposition

The International Centre for the Study of Radicalisation: We estimate that – from late 2011 to 10 December 2013 – between 3,300 and 11,000 individuals have gone to Syria to fight against the Assad government. These figures include those who are currently present as well as those who have since returned home, been arrested or killed.

Based on the credibility of various sources, our own judgement, and the feedback we have received since publishing our April estimate, we believe the “true” figure to be above 8,500. This would mean that the numbers have nearly doubled since April, with a particularly steep increase among non-Arabs, especially Westerners.

While Arabs and Europeans continue to represent the bulk of foreign fighters (up to 80 per cent), we have identified individuals from Southeast Asia, North America, Australia, and (non-Arab) Africa. Overall, we believe that residents and citizens from at least 74 countries have joined militant opposition groups in Syria. [Continue reading…]

Facebooktwittermail

Christmas food for thought

Shelly Fan writes: The morning before Christmas eve, I’m sitting here in the dining room munching happily on the bits and pieces of what’s left of our gingerbread house that was only erected to its full glory the night before. I have not consumed this amount of carbohydrates in over a year.

Inside, a few species of my extensive gut microbe community are screaming bloody murder.

When you eat, you’re not only feeding your own fleshy vessel, but also the 100 trillion of microbugs that thrive in your intestines. Hardly “along for the ride”, these bugs not only help us digest foodstuff, ferment carbohydrates and proteins but also heavily impact our metabolism and general health. Depending on their composition, they tweak our risk of cardiovascular diseases, Type II diabetes and may even cause obesity in humans. There’s tantalizing evidence that their reach extends to the brain, influencing mood, anxiety and cognition in mice.

However, the gut microbiota* is a fluid, ever-changing beast. In one previous study, researchers transplanted gut-free mice with fresh or frozen human poop to inoculate them with a microbiome of known composition. When researchers switched these mice’s plant-based diet to a high-fat, high-sugar one, the structure of the established microbiome changed within a single day: some species dwindled in number, while others exploded onto the intestinal stage, bringing with them their particular metabolic tricks. (*The word “microbiome” refers to the set of genes in the gut bugs).

Similar diet-induced changes have been found in humans. When babies are weaned from their mothers’ milk and switch to solid food, their gut bug community simultaneously go through tumultuous changes. The gut bugs of African hunter-gatherers vastly differ from those in people grown on a Western diet. But these changes take weeks, even lifetimes. Just how fast can the microbiome adapt and change to a new diet? [Continue reading…]

Facebooktwittermail

Most scientific research data from the 1990s is lost forever

Smithsonian.com: One of the foundations of the scientific method is the reproducibility of results. In a lab anywhere around the world, a researcher should be able to study the same subject as another scientist and reproduce the same data, or analyze the same data and notice the same patterns.

This is why the findings of a study published today in Current Biology are so concerning. When a group of researchers tried to email the authors of 516 biological studies published between 1991 and 2011 and ask for the raw data, they were dismayed to find that more 90 percent of the oldest data (from papers written more than 20 years ago) were inaccessible. In total, even including papers published as recently as 2011, they were only able to track down the data for 23 percent.

“Everybody kind of knows that if you ask a researcher for data from old studies, they’ll hem and haw, because they don’t know where it is,” says Timothy Vines, a zoologist at the University of British Columbia, who led the effort. “But there really hadn’t ever been systematic estimates of how quickly the data held by authors actually disappears.”

To make their estimate, his group chose a type of data that’s been relatively consistent over time—anatomical measurements of plants and animals—and dug up between 25 and 40 papers for each odd year during the period that used this sort of data, to see if they could hunt down the raw numbers.

A surprising amount of their inquiries were halted at the very first step: for 25 percent of the studies, active email addresses couldn’t be found, with defunct addresses listed on the paper itself and web searches not turning up any current ones. For another 38 percent of studies, their queries led to no response. Another 7 percent of the data sets were lost or inaccessible.

“Some of the time, for instance, it was saved on three-and-a-half inch floppy disks, so no one could access it, because they no longer had the proper drives,” Vines says. Because the basic idea of keeping data is so that it can be used by others in future research, this sort of obsolescence essentially renders the data useless. [Continue reading..]

Facebooktwittermail

Fantasy news technology from First Look Media

Following an announcement that Pierre Omidyar has doled out $50 million which represents 20 percent of his initial commitment to his new media venture First Look Media, Jay Rosen, an adviser to the project, says the details include the answer to a question he has frequently been asked: is this going to be a business or a non-profit? The answer is both. The news and editorial operation will be a non-profit and helping sustain this will be a new for-profit media technology company.

At the Atlantic, Robinson Meyer is guzzling the Kool-Aid:

First Look is something curious and iridescent — a technology for-profit making products for a news non-profit, selling those products elsewhere, and giving the proceeds back to the non-profit. First Look is two parts, closely joined, feeding and making a home for the other.

One of the first challenges for any new technology company is to convince investors that whatever kind of genius the company’s founders might possess, they also have some idea about how they can make their innovations profitable.

First Look has an advantage over other start-ups in this respect because its lead investor stepped forward before anyone had come up with either an innovative technology or a business plan. The premise seems to be that the Greenwald/Snowden brand has already acquired such immense value, that the new product can be constructed around the brand (and of course thousands of so-far unreleased documents from the NSA).

In Omidyar’s announcement there is one hint of realism:

The journalism operation, which will be incorporated as a 501(c)(3), will enjoy editorial independence, and any profits eventually earned by the technology company are committed to support First Look’s mission of independent journalism.

The key word there is eventually.

Glenn Greenwald, Laura Poitras, Jeremy Scahill, and Jay Rosen, probably aren’t too worried about how long eventually takes, because Omidyar’s investment of $250 million will provide financial security for several years. Moreover, since they are all on the non-profit news side, they can leave it to Omidyar to figure out if or how he’s going to make the technology side profitable.

My prediction is that by the time First Look has either succeeded or failed in demonstrating that it represents a new way of making the news business sustainable, Greenwald will have departed from journalism.

In reference to his role in bringing the Snowden revelations to the world, Greenwald has said: “when you go into journalism, this is exactly the sort of thing that you hope one day you’re going to be able to do.”

I suppose there will come some point in time when I feel like most or all of the documents that are in my possession that ought to be published have been published, and that most of the reporting that I think ought to be done has been done. That won’t necessarily end it, because I’m sure the fallout of that reporting will continue, the public debates over things, the consequences from these revelations will endure. And I will likely play some role in debating those things and talking about them and writing about them, but in terms of the very surreal craziness that has become my life, I’m looking forward to that subsiding.

Having repeatedly said that he has so far published reports on less than half the documents that need reporting, it sounds like Greenwald sees plenty of life left in this story, but it’s an open question whether anything comes after Snowden (apart from the book and the film).

Whether future whistleblowers choose to turn to Greenwald and First Look, may hinge on whether this venture ends up being perceived as a new way of doing journalism or an old way of making money: find a cheap or free raw product and then exploit ones role as an exclusive distributor who can fix prices and control the flow of goods to market.

Facebooktwittermail

Americans uneasy about surveillance but often use snooping tools

The Washington Post reports: Julie Beliveau’s 16-year-old daughter, a new driver, was heading from her home in Ashburn toward a job interview the other night when she found herself in Leesburg — the wrong direction entirely. Upset and fearing that she’d blow the interview, she called her mother, who instantly launched her tracking program.

“I just opened my phone, and I could see where she was,” Beliveau said. Mother guided daughter to the interview, where she got the job. Score one for surveillance.

Yet Beliveau says she would never use the program just casually to check her daughter’s whereabouts. “That’s going over the line,” she said.

Amid this year’s revelations about the federal government’s vast apparatus for tracking the movements and communications of people worldwide, Americans are uneasy with the extent of surveillance yet often use snooping tools in their own lives, a Washington Post poll has found.

The sweet spot between liberty and security has been hard to pinpoint ever since the Sept. 11, 2001, attacks on New York and Washington. Remarkable advances in information technology have enabled counterterrorism tactics far more sweeping and intrusive — and powerful — than the United States had ever deployed. At the same time, the relationship between consumers and businesses was elementally altered as mobile phones, GPS, Google and Facebook gave corporations a new capacity to track their customers’ behavior. [Continue reading…]

Facebooktwittermail

How U.S. spying cost Boeing multibillion-dollar jet contract

Reuters reports: Dilma Rousseff was thoroughly charmed.

Brazil had been struggling for years to decide which company to choose for a $4 billion-plus fighter jet contract, one of the world’s most sought-after defense deals and one that would help define the country’s strategic alliances for decades to come.

But Rousseff, the leftist president known for being sometimes gruff and even standoffish with foreign leaders, was thrilled after a 90-minute meeting in Brasilia on May 31 with U.S. Vice President Joe Biden.

After Biden’s reassurances that the United States would not block crucial transfers of technological know-how to Brazil if it bought the jets, she was closer than ever to selecting Chicago-based Boeing to supply its fighter, the F/A-18 Super Hornet.

“She’s ready to sign on the dotted line,” one of her senior aides told Reuters at the time. “This is going to happen soon.”

And then along came Edward Snowden.

Documents leaked by the former National Security Agency contractor, released in the weeks after Biden’s visit, ended up enraging Rousseff and completely changing her plans, several Brazilian officials told Reuters. [Continue reading…]

Facebooktwittermail