Category Archives: NSA

Eavesdropping by algorithm is still eavesdropping

Bruce Schneier writes: Increasingly, we are watched not by people but by algorithms. Amazon and Netflix track the books we buy and the movies we stream, and suggest other books and movies based on our habits. Google and Facebook watch what we do and what we say, and show us advertisements based on our behavior. Google even modifies our web search results based on our previous behavior. Smartphone navigation apps watch us as we drive, and update suggested route information based on traffic congestion. And the National Security Agency, of course, monitors our phone calls, emails and locations, then uses that information to try to identify terrorists.

Documents provided by Edwards Snowden and revealed by the Guardian today show that the UK spy agency GHCQ, with help from the NSA, has been collecting millions of webcam images from innocent Yahoo users. And that speaks to a key distinction in the age of algorithmic surveillance: is it really okay for a computer to monitor you online, and for that data collection and analysis only to count as a potential privacy invasion when a person sees it? I say it’s not, and the latest Snowden leaks only make more clear how important this distinction is.

The robots-vs-spies divide is especially important as we decide what to do about NSA and GCHQ surveillance. The spy community and the Justice Department have reported back early on President Obama’s request for changing how the NSA “collects” your data, but the potential reforms – FBI monitoring, holding on to your phone records and more – still largely depend on what the meaning of “collects” is. [Continue reading…]

Those who claim a special privilege to define words in their own way, defying the dictates of everyday usage, are also claiming a right to employ their own definitions of truthfulness and lying. This might have some legal utility, but the price for going this route is that language, thus constrained, becomes worthless.

As Schneier notes, Google has also fallen back on the dumb-machine defense when claiming that it does not read our email.

Back when Gmail was introduced, this was Google’s defense, too, about its context-sensitive advertising. Googles computers examine each individual email and insert an advertisement nearby, related to the contents of your email. But no person at Google reads any Gmail messages; only a computer does. In the words of one Google executive: “Worrying about a computer reading your email is like worrying about your dog seeing you naked”.

The absence of human eyes does not add a layer of privacy. On the contrary it constitutes a glaring lack of oversight by promoting a fiction: that what people don’t see, must be harmless.

Google is not a dumb companion, eager to please and dependably obedient; its only loyalty is to its own commercial interests and it currently sees those interests best served by pursuing an ambition to dominate the field of machine learning.

The data analysis being performed by computers enables surveillance more sweeping than could ever be carried out by people.

Although most Americans seem more afraid of government than commerce, the powers being exercised by the NSA are dwarfed by those that have been acquired by companies like Google, Amazon, and Facebook. Indeed the intelligence community has been doing little more than opportunistically taking a piggyback ride on the shoulders of Silicon Valley.

Facebooktwittermail

GCHQ intercepted webcam images of millions of Yahoo users worldwide

n13-iconThe Guardian reports: Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of “a whole new level of violation of our users’ privacy”. [Continue reading…]

Facebooktwittermail

NSA inspector general speaks on Snowden for first time, says he was ‘manic in his thievery’

n13-iconKevin Gosztola reports: During a day-long conference at the Georgetown University Law Center, Dr. George Ellard, the inspector general for the National Security Agency, spoke for the first time about the disclosures made by former NSA contractor Edward Snowden.

In addressing the alleged damage caused by Snowden’s disclosures he compared Snowden to Robert Hanssen, a former FBI agent and convicted spy who sold secrets to the Russians.

Ellard has been the NSA’s inspector general since 2007. In this capacity he has not spoken in a public forum before so that made what he said additionally significant. Had Snowden made the decision to report his concerns through approved NSA channels it would have been through Ellard’s office.

Ellard was part of a panel discussion on whether there was a “new paradigm of leaking.” The panel included Alex Abdo, staff attorney of the ACLU National Security Project, Georgetown Law professor David Cole and Kenneth Wainstein, former Homeland Security Advisor and former Assistant Attorney General for National Security.

When Ellard began his prepared statements, he acknowledged that he had approached this event with some level of trepidation. [Continue reading…]

Facebooktwittermail

White House considers four options for modifying NSA mass phone surveillance

The Wall Street Journal reports that administration lawyers have presented the White House with four options for reforming the NSA’s mass phone-surveillance program the first of which would require phone companies to store such data and deliver specific search requests.

A second option presented to the White House would have a government agency other than the NSA hold the data, according to a U.S. official. Candidates for this option could include the Federal Bureau of Investigation, which some current and former intelligence officials have recommended.

Another possibility floated in policy circles was turning the program over to the custody of the Foreign Intelligence Surveillance Court, which oversees the phone-data and other NSA surveillance programs, but judges have balked at an expanded role for the court.

A third option would be for an entity outside the phone companies or the government to hold the data, officials said. This approach has been criticized by privacy groups who say such a third party would just become an extension of the NSA and would provide no additional privacy benefit.

A final alternative would be to scrap the phone-data program and instead bolster investigative efforts under current authorities to obtain the information about possible terrorist connections some other way, an official said. Mr. Obama acknowledged this approach in his January speech, but said “more work needs to be done to determine exactly how this system might work.”

Facebooktwittermail

How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations

f13-iconGlenn Greenwald writes: No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.” [Continue reading…]

Facebooktwittermail

Richard Clarke warns that NSA could enable police surveillance state

n13-iconZDNet reports: The NSA is so good at collecting intelligence that it has the potential to create a police surveillance state that could never be shut off, counter-terrorism expert Richard Clarke said during his keynote address at the Cloud Security Alliance Summit taking place Monday at the RSA Conference.

“We are not there yet, but the technology is,” said Clarke, the former National Coordinator for Security, Infrastructure Protection, and Counter-Terrorism for the United States and advisor to presidents dating back to Ronald Reagan.

Since such technology is available around the world to many governments, “the task of controlling them is more important than it has ever been,” Clarke said.

He concluded his talk by saying, “I believe we can have both security and civil liberties, but we can only do that if we keep a very close eye on the government and demand transparency and oversight and tell them we are not willing to trade our civil liberties for greater security.” [Continue reading…]

Facebooktwittermail

If it’s reported by Bild, is it worth repeating?

Reuters has a report which is really a repeat, which is to say, it elevates to the status of “news,” an item in the Sunday edition of Germany’s Bild — a newspaper which is not renowned for the quality of its reporting.

The National Security Agency (NSA) has stepped up its surveillance of senior German government officials since being ordered by Barack Obama to halt its spying on Chancellor Angela Merkel, Bild am Sonntag paper reported on Sunday.

Revelations last year about mass U.S. surveillance in Germany, in particular of Merkel’s mobile phone, shocked Germans and sparked the most serious dispute between the transatlantic allies in a decade.

Bild am Sonntag said its information stemmed from a high-ranking NSA employee in Germany and that those being spied on included Interior Minister Thomas de Maiziere, a close confidant of Merkel.

“We have had the order not to miss out on any information now that we are no longer able to monitor the chancellor’s communication directly,” it quoted the NSA employee as saying.

This is silly.

Firstly, how likely is it that a “high-ranking NSA employee in Germany” is going to talk to Bild? Not likely.

Secondly, how likely is it that surveillance of Angela Merkel’s phone was occurring in isolation and thus, having been curtailed, now needs to be supplemented by broader surveillance?

Assuming that the NSA’s bugging efforts are designed for gathering intelligence as opposed to irritating the people being bugged, it’s hard to imagine that an interest in Merkel’s communications would overshadow an interest in the communications of the officials who brief her. Indeed, it’s reasonable to assume that an intelligence agency conducting surveillance on any head of state will actually be more interested in the communications going on around that individual than those that directly involve the individual her or himself. That being the case, what the NSA is doing in Germany now is probably very close to what it was doing before — except they are now more nervous about getting caught.

Facebooktwittermail

Why AT&T’s surveillance report omits 80 million NSA targets

Wired reports: AT&T this week released for the first time in the phone company’s 140-year history a rough accounting of how often the U.S. government secretly demands records on telephone customers. But to those who’ve been following the National Security Agency leaks, Ma Bell’s numbers come up short by more than 80 million spied-upon Americans.

AT&T’s transparency report counts 301,816 total requests for information — spread between subpoenas, court orders and search warrants — in 2013. That includes between 2,000 and 4,000 under the category “national security demands,” which collectively gathered information on about 39,000 to 42,000 different accounts.

There was a time when that number would have seemed high. Today, it’s suspiciously low, given the disclosures by whistleblower Edward Snowden about the NSA’s bulk metadata program. We now know that the secretive Foreign Intelligence Surveillance Court is ordering the major telecoms to provide the NSA a firehose of metadata covering every phone call that crosses their networks. [Continue reading…]

Facebooktwittermail

It’s time to rethink our nightmares about surveillance

f13-iconThis is an excerpt from Zeynep Tufekci’s article at Matter — but don’t just read this, read her whole piece: I was in Philadelphia when the protests in Istanbul exploded, at a gathering called Data-Crunched Democracy, hosted by the Annenberg School for Communication at the University of Pennsylvania. It was supposed to be exciting, and a little contentious. But I’m also a scholar of social movements and new technologies. I’d visited Tahrir, the heart of the Egyptian uprising, and Zuccotti Square, the birthplace of the Occupy movement. And now new technology was helping to power protests in Istanbul, my hometown. The epicenter, Gezi Park, is just a few blocks from the hospital where I was born.

So there I was, at a conference I had been looking forward to for months, sitting in the back row, tweeting about tear gas in Istanbul.

A number of high-level staff from the data teams of the Obama and Romney campaigns were there, which meant that a lot of people who probably did not like me very much were in the room. A few months earlier, in an op-ed in the New York Times, I’d argued that richer data for the campaigns could mean poorer democracy for the rest of us. Political campaigns now know an awful lot about American voters, and they will use that to tailor the messages we see — to tell us the things we want to hear about their policies and politicians, while obscuring messages we may dislike.

Of course, these tactics are as old as politics. But the digital era has brought new ways of implementing them. Pointing this out had earned me little love from the campaigns. The former data director on the Obama campaign, writing later in the Times, caricatured and then dismissed my concerns. He claimed that people thought he was “sifting through their garbage for discarded pages from their diaries” — a notion he described as a “bunch of malarkey.” He’s right: Political campaigns don’t rummage through trashcans. They don’t have to. The information they want is online, and they most certainly sift through it.

What we do know about their use of “big data” — the common shorthand for the massive amounts of data now available on everyone — is worrisome. In 2012, again in the Times, reporter Charles Duhigg revealed that Target can often predict when a female customer is pregnant, often in the first 20 weeks of pregnancy, and sometimes even before she has told anyone. This is valuable information, because childbirth is a time of big change, including changes in consumption patterns. It’s an opportunity for brands to get a hook into you — a hook that may last decades, as over-worked parents tend to return to the same brands out of habit. Duhigg recounted how one outraged father, upset at the pregnancy- and baby-related coupons Target had mailed to his teenage daughter, visited his local store and demanded to see the manager. He got an apology, but later apologized himself: His daughter, it turned out, was pregnant. By analyzing changes in her shopping — which could be as subtle as changes in her choice in moisturizers, or the purchase of certain supplements — Target had learned that she was expecting before he did.

Personalized marketing is not new. But so much more can be done with the data now available to corporations and governments. In one recent study, published in the Proceedings of the National Academy of Sciences, researchers showed that mere knowledge of the things that a person has “liked” on Facebook can be used to build a highly accurate profile of the subject, including their “sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.” In a separate study, another group of researchers were able to infer reasonably reliable scores on certain traits — psychopathy, narcissism, and Machiavellianism — from Facebook status updates. A third team showed that social media data, when analyzed the right way, contains evidence of the onset of depression.

Remember, these researchers did not ask the people they profiled a single question. It was all done by modeling. All they had to do was parse the crumbs of data that we drop during our online activities. And the studies that get published are likely the tip of the iceberg: The data is almost always proprietary, and the companies that hold it do not generally tell us what they do with it.

When the time for my panel arrived, I highlighted a recent study in Nature on voting behavior. By altering a message designed to encourage people to vote so that it came with affirmation from a person’s social network, rather than being impersonal, the researchers had shown that they could persuade more people to participate in an election. Combine such nudges with psychological profiles, drawn from our online data, and a political campaign could achieve a level of manipulation that exceeds that possible via blunt television adverts.

How might they do it in practice? Consider that some people are prone to voting conservative when confronted with fearful scenarios. If your psychological profile puts you in that group, a campaign could send you a message that ignites your fears in just the right way. And for your neighbor who gets mad at scaremongering? To her, they’ll present a commitment to a minor policy that the campaign knows she’s interested in — and make it sound like it’s a major commitment. It’s all individualized. It’s all opaque. You don’t see what she sees, and she doesn’t see what you see.

Given the small margins by which elections get decided — a fact well understood by the political operatives who filled the room — I argued that it was possible that minor adjustments to Facebook or Google’s algorithms could tilt an election. [Continue reading…]

Facebooktwittermail

It’s time to break up the NSA

o13-iconBruce Schneier writes: The NSA has become too big and too powerful. What was supposed to be a single agency with a dual mission — protecting the security of U.S. communications and eavesdropping on the communications of our enemies — has become unbalanced in the post-Cold War, all-terrorism-all-the-time era.

Putting the U.S. Cyber Command, the military’s cyberwar wing, in the same location and under the same commander, expanded the NSA’s power. The result is an agency that prioritizes intelligence gathering over security, and that’s increasingly putting us all at risk. It’s time we thought about breaking up the National Security Agency.

Broadly speaking, three types of NSA surveillance programs were exposed by the documents released by Edward Snowden. And while the media tends to lump them together, understanding their differences is critical to understanding how to divide up the NSA’s missions. [Continue reading…]

Facebooktwittermail

Tom Engelhardt: Thug state U.S.A.

Documenting darkness
By Tom Engelhardt

Here, at least, is a place to start: intelligence officials have weighed in with an estimate of just how many secret files National Security Agency contractor Edward Snowden took with him when he headed for Hong Kong last June. Brace yourself: 1.7 million.  At least they claim that as the number he or his web crawler accessed before he left town.  Let’s assume for a moment that it’s accurate and add a caveat.  Whatever he had with him on those thumb drives when he left the agency, Edward Snowden did not take all the NSA’s classified documents.  Not by a long shot.  He only downloaded a portion of them.  We don’t have any idea what percentage, but assumedly millions of NSA secret documents did not get the Snowden treatment.

Such figures should stagger us and what he did take will undoubtedly occupy journalists for months or years more (and historians long after that).  Keep this in mind, however: the NSA is only one of 17 intelligence outfits in what is called the U.S. Intelligence Community.  Some of the others are as large and well funded, and all of them generate their own troves of secret documents, undoubtedly stretching into the many millions.

And keep something else in mind: that’s just intelligence agencies.  If you’re thinking about the full sweep of our national security state (NSS), you also have to include places like the Department of Homeland Security, the Energy Department (responsible for the U.S. nuclear arsenal), and the Pentagon.  In other words, we’re talking about the kind of secret documentation that an army of journalists, researchers, and historians wouldn’t have a hope of getting through, not in a century.

We do know that, in 2011, the whole government reportedly classified 92,064,862 documents. If accurate and reasonably typical, that means, in the twenty-first century, the NSS has already generated hundreds of millions of documents that could not be read by an American without a security clearance.  Of those, thanks to one man (via various journalists), we have had access to a tiny percentage of perhaps 1.7 million of them.  Or put another way, you, the voter, the taxpayer, the citizen — in what we still like to think of as a democracy — are automatically excluded from knowing or learning about most of what the national security state does in your name.  That’s unless, of course, its officials decide to selectively cherry-pick information they feel you are capable of safely and securely absorbing, or an Edward Snowden releases documents to the world over the bitter protests, death threats, and teeth gnashing of Washington officialdom and retired versions of the same.

Continue reading

Facebooktwittermail

NSA and DHS grant permission to be mocked

n13-iconThe Wall Street Journal reports: The National Security Agency and the Department of Homeland Security acknowledged in a settlement made public Tuesday that they were wrong to ban a leading custom-merchandise retailer from selling t-shirts, mugs, and posters that poked fun at the agencies.

The agreement puts to rest a First Amendment lawsuit against the federal government brought last year by a t-shirt designer, Dan McCall, who hawked merchandise on Zazzle.com that parodied the official seal of the NSA with jokes referencing the spy program disclosures. Another design imprinted on mugs featured a look-alike Homeland Security logo for a “Department of Homeland Stupidity.”

Mr. McCall’s lawsuit, which Law Blog wrote about earlier, came in response to cease-and-desist letters that the NSA and Homeland Security sent to Zazzle in 2011, ordering the retailer to remove the parody products from its site or face legal action.

Facebooktwittermail

Snowden documents reveal covert surveillance and pressure tactics aimed at WikiLeaks and its supporters

f13-iconGlenn Greenwald and Ryan Gallagher write: Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.

The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.

Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. [Continue reading…]

Facebooktwittermail

Did the NSA really help spy on U.S. lawyers?

o13-iconOrin Kerr writes: The front page of the Sunday New York Times features a new Snowden-based story that looks, at first blush, like a really big deal. Authored by James Risen and Laura Poitras, the story opens with considerable drama by suggesting that the NSA is spying on U.S. lawyers:

The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers.

A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance.

Sounds like the NSA helped spy on U.S. lawyers, right? Well, not so fast. If you unpack the story and ignore the opening spin, the story ends up delivering considerably less than it promises.
[…]
As I understand it, the Times story is based on a short entry in an NSA internal bulletin celebrating the liaison office’s accomplishment. It reports that the liaison helped clear up a legal issue, and that it all ended well, as the Australians ended up giving useful intel to the U.S. But because it’s just an internal bulletin, it doesn’t tell us what we want to know: What advice was provided, and whether the intel was related to the legal issue. Without that information, it’s hard to know if there’s a significant story here. [Continue reading…]

Facebooktwittermail

How to ‘obtain’ a memo from the NSA

Obtain: to get something that you want, especially through your own effort, skill, or work

e13-iconMichael Isikoff reports: A civilian NSA employee recently resigned after being stripped of his security clearance for allowing former agency contractor Edward Snowden to use his personal log-in credentials to access classified information, according to an agency memo obtained by NBC News.

In addition, an active duty member of the U.S. military and a contractor have been barred from accessing National Security Agency facilities after they were “implicated” in actions that may have aided Snowden, the memo states. Their status is now being reviewed by their employers, the memo says.

The Feb. 10 memo, sent to congressional intelligence and judiciary committees this week, provides the first official account of a sweeping NSA internal inquiry aimed at identifying intelligence officials and contractors who may been responsible for one of the biggest security breaches in U.S. history. The memo is unclassified but labeled “for official use only.”

While the memo’s account is sketchy, it suggests that, contrary to Snowden’s statements, he used an element of trickery to retrieve his trove of tens of thousands of classified documents: “At Snowden’s request,” the civilian NSA employee, who is not identified by name, entered his password onto Snowden’s computer terminal, the memo states.

When an investigative journalists writes that he has “obtained” a memo from the NSA, it might seem that the publication of the memo is the fruit of the labor of investigation. Obtain connotes, he got his hands on it, rather than, it fell into his lap.

In the case of Michael Isikoff and the NSA memo he obtained, how much effort did that require?

I don’t know, but I doubt it involved much more effort than is required to open an email from a Congressional staffer with a subject line like “Must-read document.”

Maybe it didn’t come by email. Maybe it was delivered by hand. Either way, my guess is that more effort was being made by the sender than the receiver. Indeed, in this case I wouldn’t put it past the sender to have volunteered a loaded term like “trickery” in an unspoken quid pro quo along the lines that a journalist lucky enough to be selected to receive such a gift should show his gratitude by framing his report in terms that would please the source.

As with so many news reports, assessing its significance requires more than reviewing its content. It requires that we understand how it came to be published.

Isikoff is in this respect no different from any other reporter: he reveals nothing about his own investigative process.

What he does is advance a narrative that the NSA have been pushing from day one: that Snowden should not be seen as a whistleblower; he should be treated as a thief.

Yet the NSA, like every other intelligence agency, is not run by professional truth-tellers. From their perspective, Snowden represents a multifaceted problem and one element of the solution they are pursuing is character assassination.

Snowden has not faced questioning under oath in Congress, but so far — unlike Keith Alexander and James Clapper — nothing he has said has been demonstrated to be a bald-faced lie.

The New York Times notes that another feature of the memo is that it appears designed to lay to rest any expectation of high-level accountability:

The letter, first reported by NBC News, was intended to answer congressional queries about who, beyond Mr. Snowden himself, would be held accountable for the security lapses that led to his disclosures. The answer appeared to suggest that no senior officials of the N.S.A. or its oversight organization, the office of the director of national intelligence, will be disciplined or fired for what officials have called the largest and most damaging disclosure of classified material in American history.

The director of the N.S.A., Gen. Keith B. Alexander, is retiring next month after serving far longer than his predecessors. The director of national intelligence, James R. Clapper Jr., who has also been a focus of criticism for failing to police the speed at which security upgrades have been conducted throughout the intelligence community, remains in office.

Both men, and their wives, were guests at the state dinner on Tuesday night for France’s president, François Hollande, which was widely interpreted as an indication they remained in good stead at the White House.

Like Isikoff, the Times reporter, David Sanger, appears to be carrying water for the NSA when he claims that the question — “did [Snowden] have the help of a foreign intelligence service?” — is “reverberating around the intelligence agencies and the Justice Department”.

While those reverberations are apparently audible to Sanger, Senate Intelligence Committee Chairwoman Dianne Feinstein has heard nothing.

Finally, one question that neither of the reporters address is whether it would be unusual for NSA employees or contractors to provide a systems administrator with their passwords. Even though, for obvious reasons, that practice can be described as a security lapse, it might also have been commonplace.

If that’s the case, then the individual referred to in the NSA who resigned, may now justifiably feel like the fall guy.

Facebooktwittermail

Internet governance too U.S.-centric, says European commission

n13-iconThe Guardian reports: The mass surveillance carried out by the US National Security Agency means that governance of the internet has to be made more international and less dominated by America, the European Union’s executive has declared.

Setting out proposals on how the world wide web should function and be regulated, the European commission called for a shift away from the California-based Internet Corporation for Assigned Names and Numbers (Icann), which is subject to US law, is contracted by the US administration and is empowered to supervise how digital traffic operates.

“Recent revelations of large-scale surveillance have called into question the stewardship of the US when it comes to internet governance,” said the commission.

“Given the US-centric model of internet governance currently in place, it is necessary to broker a smooth transition to a more global model while at the same time protecting the underlying values of open multi-stakeholder governance …

“Large-scale surveillance and intelligence activities have led to a loss of confidence in the internet and its present governance arrangements.” [Continue reading…]

Facebooktwittermail

Rand Paul sues Obama administration over NSA surveillance

n13-iconThe Associated Press reports: Sen. Rand Paul, a possible Republican presidential candidate, sued the Obama administration Wednesday over the National Security Agency’s mass collection of millions of Americans’ phone records.

The Kentucky senator said he and the conservative activist group FreedomWorks filed the suit for themselves and on behalf of “everyone in America that has a phone.”

The lawsuit argues that the bulk collection program that’s been in existence since 2006 violates the Fourth Amendment right against unreasonable searches. It calls for an end to the program, which was revealed by former National Security Agency analyst Edward Snowden. [Continue reading…]

Facebooktwittermail