Category Archives: NSA

Americans find swift stonewall on whether NSA vacuumed their data

n13-iconMcClatchy reports: Since last year’s revelations about the National Security Agency’s massive communications data dragnets, the spy agency has been inundated with requests from Americans and others wanting to know if it has files on them. All of them are being turned down .

The denials illustrate the bind in which the disclosures have trapped the Obama administration. While it has pledged to provide greater transparency about the NSA’s communications collections, the NSA says it cannot respond to individuals’ requests without tipping off terrorists and other targets.

As a result, Americans whose email and telephone data may have been improperly vacuumed up have no way of finding that out by filing open records requests with the agency. Six McClatchy reporters who filed requests seeking any information kept by the NSA on them all received the same response. [Continue reading…]

Facebooktwittermail

The Day We Fight Back: An internet protest to stop the NSA

n13-iconThe Verge reports: On January 18th, 2012, the world’s free encyclopedia went dark. “Imagine a world without free knowledge,” said a black splash page, warning users of a bill that could “fatally damage the free and open internet” and urging them to contact Congress. The bill was SOPA, a widely reviled piece of anti-piracy legislation, and Wikipedia wasn’t alone: Reddit, Google, and other huge sites either disabled access or hosted banners in protest. What happened next has become a touchstone for internet activists. Bill sponsor Lamar Smith (R-TX), who a few days earlier had implied that SOPA’s opponents must be profiting from piracy, tabled his proposal almost immediately. Chris Dodd, head of the MPAA, compared the public outcry to the Arab Spring.

It’s been over two years since the death of SOPA. But as attention has turned instead to NSA surveillance, the 2012 protests have provided assurance that online action can create real results. This is the idea behind The Day We Fight Back, an anti-surveillance web protest being held Tuesday, February 11th, in memory of hacktivist and anti-SOPA organizer Aaron Swartz. “In January 2012 we defeated the SOPA and PIPA censorship legislation with the largest Internet protest in history,” says the site. “Today we face another critical threat.” If anything, though, the reference doesn’t inspire confidence so much as it underscores just how much more complex — and difficult to confront — that new threat really is.

The goal of the 2012 blackout was simple: spur people to call their representatives and express opposition to a new bill. The Day We Fight Back, though, is an attempt to dismantle a system that’s been in place for years. Inside the US, participants are urged to put a banner on their website and call or email their legislators in support of Representative Jim Sensenbrenner (R-WI) and Senator Patrick Leahy’s (D-VT) USA Freedom Act, which would reform the NSA’s metadata database. But they’re also urged to oppose Dianne Feinstein’s (D-CA) FISA Improvements Act, a bill that sounds just as pleasant but has been sharply criticized for enshrining the database program in law. And even these are just baby steps in the long run. [Continue reading…]

Facebooktwittermail

The NSA’s secret role in the U.S. assassination program

f13-iconJeremy Scahill and Glenn Greenwald report: The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device. [Continue reading…]

Facebooktwittermail

Snowden used low-cost tool to best NSA

n13-iconThe New York Times reports: Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyberattacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.

Moreover, Mr. Snowden succeeded nearly three years after the WikiLeaks disclosures, in which military and State Department files, of far less sensitivity, were taken using similar techniques. [Continue reading…]

Facebooktwittermail

CIA confirms agency obliged to follow federal surveillance law

n13-iconThe Guardian reports: The CIA has confirmed that it is obliged to follow a federal law barring the collection of financial information and hacking into government data networks.

But neither the agency nor its Senate overseers will say what, if any, current, recent or desired activities the law prohibits the CIA from performing – particularly since a section of the law explicitly carves out an exception for “lawfully authorized” intelligence activities.

The murky episode, arising from a public Senate hearing on intelligence last week, illustrates what observers call the frustrations inherent in getting even basic information about secret agencies into public view, a difficulty recently to the fore over whistleblower Edward Snowden’s revelations about the National Security Agency (NSA) and its surveillance partners.

Last Wednesday, in a brief exchange at the hearing, Senator Ron Wyden, an Oregon Democrat, asked CIA director John Brennan if the agency is subject to the Computer Fraud and Abuse Act, a three-decade-old law intended to protect computer systems, like those of financial and government networks, from unauthorized access.

Brennan demurred, citing the need to check on the legal complexities posed by Wyden’s question, and pledged to give the senator an answer within a week.

The answer, agency spokesman Dean Boyd told the Guardian, is: “Yes, the statute applies to CIA.”

Wyden gave no indication of what prompted his query. His office would not elaborate, citing classification rules, and neither would the CIA. [Continue reading…]

Facebooktwittermail

NSA incapable of accomplishing its own mass surveillance goals

As I have long argued, Americans have less reason to be afraid of the NSA intercepting their communications than afraid that vast resources are being wasted on an effort that turns out to be fruitless.

Along with an over-extension of powers comes an over-extension of competence. Finding a needle in a haystack is very difficult. But finding a needle while examining less than a third of the haystack is just a waste of time.

The Washington Post reports: The National Security Agency is collecting less than 30 percent of all Americans’ call records because of an inability to keep pace with the explosion in cellphone use, according to current and former U.S. officials.

The disclosure contradicts popular perceptions that the government is sweeping up virtually all domestic phone data. It is also likely to raise questions about the efficacy of a program that is premised on its breadth and depth, on collecting as close to a complete universe of data as possible in order to make sure that clues aren’t missed in counter­terrorism investigations.

In 2006, a senior U.S. official said, the NSA was collecting “closer to 100” percent of Americans’ phone records from a number of U.S. companies under a then-classified program, but as of last summer that share had plummeted to less than 30 percent.

The government is taking steps to restore the collection — which does not include the content of conversations — closer to previous levels. The NSA is preparing to seek court orders to compel wireless companies that currently do not hand over records to the government to do so, said the current and former officials, who spoke on the condition of anonymity to discuss internal deliberations.

That effort comes in the wake of President Obama’s decision last month to find a way to move the data out of the government’s hands to assuage concerns about intrusions on privacy. Obama has given the Justice Department and the intelligence community until March 28 to come up with a plan.

The actual percentage of records gathered is somewhere between 20 and 30 percent and reflects Americans’ increasing turn away from the use of land lines to cellphones. Officials also have faced technical challenges in preparing the NSA database to handle large amounts of new records without taking in data such as cell tower locations that are not authorized for collection. [Continue reading…]

Facebooktwittermail

James Clapper: Director of National Fear

o13-iconMichael Cohen writes: James Clapper is very worried. It’s not the first time.

Last week the man who serves as America’s Director of National Intelligence trudged up to Capitol Hill to tell the assembled members of the Senate Select Intelligence Committee (pdf) that the annual worldwide threat assessment, put together by the intelligence community, has filled him with dread. He told the room:

Looking back over my more than half a century in intelligence, I have not experienced a time when we have been beset by more crises and threats around the globe.

That is some scary stuff.

However, if you think you’ve heard this before from Clapper … well you have.

Last year he appeared before Congress for a similar purpose and, lo and behold, he was very, very concerned then too (pdf):

I will say that my almost 50 years in intelligence, I do not recall a period in which we confront a more diverse array of threats, crises and challenges around the world. This year’s threat assessment illustrates how dramatically the world and our threat environment are changing.

And here he was in 2012 testifying (pdf) on that year’s threat assessment report, “Never has there been, in my almost 49-year career in intelligence, a more complex and interdependent array of challenges than that we face today.”

Of course, one must consider the possibility that over the past five decades the world has never been as dangerous, complex and challenging as it’s been over the past three years (putting aside for a moment that whole “threat of nuclear holocaust” that defined much of the 60s, 70s and 80s.) If, however, you’re skeptical about this, well you have good reason because Clapper’s alarmist tone is hardly matched by the threats he cites. [Continue reading…]

Facebooktwittermail

Pratap Chatterjee: The Wild West of surveillance

f13-icon

The question Senator Ron Wyden asked on March 12th of last year was straightforward enough and no surprise for Director of National Intelligence James Clapper.  He had been given it a day in advance of his testimony before the Senate Intelligence Committee and after he was done, Senator Wyden and his staff offered him a chance to “amend” his answer if he wished.  Did the National Security Agency, Wyden wanted to know, gather “any type of data at all on millions or hundreds of millions of Americans”?  Being on that committee and privy to a certain amount of secret intelligence information, Wyden already knew the correct answer to the question.  Clapper, with a day to prepare, nonetheless answered, “No, sir.  Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly.” 

That was a bald-faced lie, though Clapper would later term it the “least untruthful” thing he felt he could say.  As we now know, the NSA was, among many other things, gathering the phone “data” of every American and storing it for future use.  In other words, after some forethought, the director perjured himself.

Mind you, Clapper isn’t exactly shy about charging other people with implicit crimes.  In recent testimony before Congress, he demanded that whistleblower and former NSA contractor Edward Snowden “and his accomplices” return all agency documents.  It was a stunning use of a term whose only meaning is criminal and clearly referred to the journalists — Glenn Greenwald, filmmaker Laura Poitras, and reporters from the Guardian, the New York Times, and the Washington Post, among other papers — who have been examining and writing about the Snowden documents.

It caught something of the chutzpah of the top officials who run Washington’s national security state — and little wonder that they feel emboldened and demanding.  After all, not only is Clapper not going to be charged with perjury, but he has retained his post without a blink.  He has kept the “support” of President Obama, who recently told CNN’s Jake Tapper (in what passes these days for a rebuke of our surveiller-in-chief), “Jim Clapper himself would acknowledge, and has acknowledged, that he should have been more careful about how he responded.”  More careful indeed!

I’ve long argued that while we, the citizens of the U.S., remain in legal America, the U.S. national security state exists in “post-legal America” because no illegal act from warrantless surveillance to torture committed in its service will ever be prosecuted. So it’s no surprise that Clapper won’t even be forced to resign for lying to Congress.  He’s free as a bird and remains powerful indeed. Tell that to some of our whistleblowers.

In his latest post, TomDispatch regular Pratap Chatterjee offers an anatomy of a surveillance world that grows more, not less, powerful and full of itself with every passing moment and technological advance, a national security world whose global ambitions know no bounds. Tom Engelhardt

Selling your secrets
The invisible world of software backdoors and bounty hunters
By Pratap Chatterjee

Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night.  Imagine that, once inside, you could observe everything happening, unnoticed by others — from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody’s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.

That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now.  After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.

Now — one more moment of imagining — what if every one of your transactions in that world was infiltrated? What if the government had paid developers to put trapdoors and secret passages into the structures that are being built in this new digital world to connect all of us all the time? What if they had locksmiths on call to help create master keys for all the rooms? And what if they could pay bounty hunters to stalk us and build profiles of our lives and secrets to use against us?

Well, check your imagination at the door, because this is indeed the brave new dystopian world that the U.S. government is building, according to the latest revelations from the treasure trove of documents released by National Security Agency whistleblower Edward Snowden.

Continue reading

Facebooktwittermail

Glenn Greenwald denies selling NSA documents

n13-iconPolitico reports: Writer Glenn Greenwald charged Tuesday that claims by U.S. officials that he’s selling National Security Agency documents are wrong and that those officials are pursuing a campaign that could criminalize the practice of journalism.

“I’m never selling documents,” Greenwald said in an interview. “I don’t get money and give them documents, like, ‘Hey, nice doing business with you.’”

Greenwald said he has worked with news outlets around the globe to publicize newsworthy aspects of the documents Edward Snowden copied while working for the NSA in Hawaii. However, Greenwald said he and others working with him supply the foreign outlets with proposed articles and are not “fencing stolen material,” as House Intelligence Committee Chairman Mike Rogers (R-Mich.) argued at a hearing Tuesday.

“We do the reporting first… I vet the stories,” Greenwald said. “We come with the story already formed. We work on drafts of the story. We always edit the story. We have approval rights.”

Greenwald, who is an attorney, acknowledged insisting on freelance contracts in order to supply the stories. However, he said that is itself a legal precaution aimed at ensuring that authorities treat him as a journalist and not as a source. Traditionally, sources have sometimes been subject to prosecution for disclosing secret documents, while the government has shied away from prosecuting those who act as journalists or publishers. [Continue reading…]

Facebooktwittermail

How Edward Snowden went from loyal NSA contractor to whistleblower

f13-iconThe Guardian reports: In late December 2001, someone calling themselves TheTrueHOOHA had a question. He was an 18-year-old American male with impressive IT skills and a sharp intelligence. His real identity was unknown. Everyone who posted on Ars Technica, a popular technology website, did so anonymously.

TheTrueHOOHA wanted to set up his own web server. It was a Saturday morning, a little after 11am. He posted: “It’s my first time. Be gentle. Here’s my dilemma: I want to be my own host. What do I need?”

Soon, regular users were piling in with helpful suggestions. TheTrueHOOHA replied: “Ah, the vast treasury of geek knowledge that is Ars.” He would become a prolific contributor; over the next eight years, he authored nearly 800 comments. He described himself variously as “unemployed”, a failed soldier, a “systems editor”, and someone who had US State Department security clearance.

His home was on the east coast of America in the state of Maryland, near Washington DC. But by his mid-20s he was already an international man of mystery. He popped up in Europe – in Geneva, London, Ireland, Italy and Bosnia. He travelled to India. Despite having no degree, he knew an astonishing amount about computers. His politics appeared staunchly Republican. He believed strongly in personal liberty, defending, for example, Australians who farmed cannabis plants.

At times he could be rather obnoxious. He called one fellow-Arsian, for example, a “cock”; others who disagreed with his sink-or-swim views on social security were “fucking retards”.

His chat logs cover a colourful array of themes: gaming, girls, sex, Japan, the stock market, his disastrous stint in the US army, his negative impressions of multiracial Britain (he was shocked by the number of “Muslims” in east London and wrote, “I thought I had gotten off of the plane in the wrong country… it was terrifying”), the joys of gun ownership (“I have a Walther P22. It’s my only gun but I love it to death,” he wrote in 2006). In their own way, the logs form a Bildungsroman.

Then, in 2009, the entries fizzle away. In February 2010, TheTrueHOOHA mentions a thing that troubles him: pervasive government surveillance. “Society really seems to have developed an unquestioning obedience towards spooky types… Did we get to where we are today via a slippery slope that was entirely within our control to stop? Or was it a relatively instantaneous sea change that sneaked in undetected because of pervasive government secrecy?” [Continue reading…]

Facebooktwittermail

U.S. spied on negotiators at 2009 climate summit

NewsHuffington Post reports: The National Security Agency monitored the communications of other governments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden.

The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.” [Continue reading…]

Meanwhile, Reuters reports: Berlin and Washington are still “far apart” in their views on the U.S. National Security Agency’s (NSA) mass surveillance of Germany but they remain close allies, Chancellor Angela Merkel told parliament on Wednesday.

Facebooktwittermail

Angry Birds firm calls for industry to respond to NSA spying revelations

NewsThe Guardian reports: Rovio, the Finnish software company behind the Angry Birds game, has announced it will “re-evaluate” its relationship with advertising networks following revelations that the NSA and its UK counterpart GCHQ have the capability to “piggyback” on the private user data they collect.

On Monday, the Guardian, New York Times and ProPublica revealed that the US and UK spy agencies had built systems that could collect data from “leaky” smartphone apps, ranging from basic technical information to gender and location. Some apps mentioned in the documents collected more sensitive information, including sexual orientation of the user.

In a statement released in the wake of the story, Rovio’s chief executive said the company would examine its business relationships, but also called for the wider industry to respond to spy agencies’ use of commercial data traversing the web.

GCHQ documents used the Angry Birds app, which has been downloaded globally more than 1.7bn times, as an extended case study, setting out examples of the sorts of data that could be collected through advertising networks associated with the app.

Many apps are funded by advertising, which is typically delivered by third-party networks. To target and track these adverts, some data must be transmitted across the internet – making it available to intelligence agencies’ mass-interception efforts.

In its release, Rovio noted that if spy agencies are indeed targeting advertising networks, then “it would appear that no internet-enabled device that visits ad-enabled web sites or uses ad-enabled applications is immune to such surveillance”.

Targeting advertising is at the core of many if not most online business models that avoid subscription charges, whether apps or websites. Rovio’s CEO referred to the need to balance the ability of websites to make money with user privacy amid the NSA revelations as “the most important conversation to be had”. [Continue reading…]

Facebooktwittermail

No evidence Russia helped Snowden to steal U.S. secrets: Feinstein

NewsReuters reports: The chairwoman of the Senate Intelligence Committee, Senator Dianne Feinstein, said on Tuesday she has seen no evidence that Russian spies helped former National Security Agency contractor Edward Snowden steal U.S. eavesdropping secrets.

The Democrat’s comments on the MSNBC TV channel contrast with statements by her Republican counterpart in the House of Representative Intelligence Committee, Mike Rogers.

Rogers suggested earlier this month that Russia had acquired influence over Snowden before he left his job as an NSA contractor and traveled to Hong Kong, where he leaked tens of thousands of classified documents describing U.S. and British eavesdropping operations.

“I have no information to that effect. I’ve never seen anything to that effect. I’ve asked some questions since and nothing has been forthcoming,” Feinstein said.

A senior U.S. official familiar with the matter said that he had seen no evidence Snowden had been recruited or influenced by Russia to acquire and leak U.S. eavesdropping secrets. Other U.S. security officials have privately offered similar assessments in recent weeks.

Rogers said on television 10 days ago that Snowden had likely been collaborating with Russia before he fled there last year. [Continue reading…]

Facebooktwittermail

RNC condemns NSA surveillance

The Hill: The Republican National Committee has formally renounced the “dragnet” surveillance program at the National Security Agency (NSA).

During its winter meeting in Washington, the committee on Friday overwhelmingly approved a measure calling for lawmakers to end the program and create a special committee to investigate domestic surveillance efforts.

The resolution, which declared that “unwarranted government surveillance is an intrusion on basic human rights,” among other condemnations, passed the committee on a voice vote with near-unanimous support. Only a small minority of the 168 RNC members dissented.

Facebooktwittermail

White House viewed surveillance report as ‘liberal’

Politico: A member of President Barack Obama’s hand-picked surveillance review group said Friday the White House was swayed by U.S. intelligence officials sympathetic to the National Security Agency and ultimately viewed the group’s findings “as a liberal report.”

University of Chicago law professor Geoffrey Stone said that, after receiving the surveillance group’s report, Obama spent a month meeting “with many of the same people we had met with at great length, members of the intelligence community, members of the intelligence committees from Congress largely on one side of the picture.”

“And instead of our report being truly understood as a middle ground, based upon taking into account all of those perspectives on both sides of the spectrum, I think the White House got moved by thinking of our report as a liberal report,” Stone said.

Stone, speaking during a panel discussion at the National Press Club in Washington, said intelligence officials were “pushing [Obama] and the White House generally more to what we can call the right.”

Facebooktwittermail