Reuters reports: IBM Corp has been sued by a shareholder who accused it of concealing how its ties to what became a major U.S. spying scandal reduced business in China and ultimately caused its market value to plunge more than $12 billion.
IBM lobbied Congress hard to pass a law letting it share personal data of customers in China and elsewhere with the U.S. National Security Agency, in a bid to protect its intellectual property rights, according to a complaint filed in the U.S. District Court in Manhattan.
The plaintiff in the complaint, Louisiana Sheriffs’ Pension & Relief Fund, said this threatened IBM hardware sales in China, particularly given a program known as Prism that let the NSA spy on that country through technology companies such as IBM.
The Baton Rouge pension fund said the revelation of Prism and related disclosures by former NSA contractor Edward Snowden caused Chinese businesses and China’s government to abruptly cut ties with the world’s largest technology services provider.
It said this led IBM on October 16 to post disappointing third-quarter results, including drops in China of 22 percent in sales and 40 percent in hardware sales.
While quarterly profit rose 6 percent, revenue dropped 4 percent and fell well below analyst forecasts.
IBM shares fell 6.4 percent on October 17, wiping out $12.9 billion of the Armonk, New York-based company’s market value. [Continue reading…]
Category Archives: NSA
Chas Freeman on Snowden and snooping
The former U.S. ambassador to Saudi Arabia, Chas W. Freeman, said at MIT on Thursday: We live in what the National Security Agency [NSA] has called “the golden age of SIGINT [signals intelligence].” We might have guessed this. We now know it for a fact because of a spectacular act of civil disobedience by Edward Snowden. His is perhaps the most consequential such act for both our domestic liberties and our foreign relations in the more than two century-long history of our republic.
This past spring, Mr. Snowden decided to place his oath to “preserve, protect and defend the Constitution of the United States” and his allegiance to the Bill of Rights above his contractual obligations to the intelligence community and the government for which it snoops. He blew the whistle on NSA’s ruthless drive for digital omniscience. When he did this, he knew that many of his fellow citizens would impugn his patriotism. He also knew he would be prosecuted for violating the growing maze of legislation that criminalizes revelations about the national security practices of America’s post-9/11 warfare state.
Mr. Snowden does not dispute that he is guilty of legally criminal acts. But he places himself in the long line of Americans convinced, as Martin Luther King put it, that “noncooperation with evil is as much a moral obligation as is cooperation with good.” As someone long in service to our country, I am upset by such defiance of authority. As an American, I am not.
Like Henry David Thoreau and many others in protest movements in our country over the past century and a half, Mr. Snowden deliberately broke the law to bring to public attention government behavior he considered at odds with the U.S. Constitution, American values, and the rule of law. One point he wanted to make was that we Americans now live under a government that precludes legal or political challenges to its own increasingly deviant behavior. Our government has criminalized the release of information exposing such behavior or revealing the policies that authorize it. The only way to challenge its policies and activities is to break the law by exposing them. [Continue reading…]
By cracking cellphone code, NSA has capacity for decoding private conversations
The Washington Post reports: The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day.
While the military and law enforcement agencies long have been able to hack into individual cellphones, the NSA’s capability appears to be far more sweeping because of the agency’s global signals collection operation. The agency’s ability to crack encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.
U.S. law prohibits the NSA from collecting the content of conversations between Americans without a court order. But experts say that if the NSA has developed the capacity to easily decode encrypted cellphone conversations, then other nations likely can do the same through their own intelligence services, potentially to Americans’ calls, as well.
Encryption experts have complained for years that the most commonly used technology, known as A5/1, is vulnerable and have urged providers to upgrade to newer systems that are much harder to crack. Most companies worldwide have not done so, even as controversy has intensified in recent months over NSA collection of cellphone traffic, including of such world leaders as German Chancellor Angela Merkel. [Continue reading…]
NSA review to leave spying programs largely unchanged, reports say
The Guardian reports: A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact.
Sascha Meinrath, director of the Open Technology Institute, said Friday that the review panel he advised is at risk of missing an opportunity to restore confidence in US surveillance practices.
“The review group was searching for ways to make the most modest pivot necessary to continue business as usual,” Meinrath said.
Headed by the CIA’s former deputy director, Michael Morrell, the review is expected to deliver its report to President Barack Obama on Sunday, the White House confirmed, although it is less clear when and how substantially its report will be available to the public.
National security council spokeswoman Caitlin Hayden said she would have no further comment “on a report that is not yet final and hasn’t yet been submitted to the White House”.
Should the review group’s report resemble descriptions that leaked late Thursday, the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage.
Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. [Continue reading…]
AT&T accused of violating privacy law with sale of phone records to CIA
Ars Technica: Consumer advocates have asked the Federal Communications Commission (FCC) to declare that AT&T violated a privacy rule in the Communications Act by selling phone records to the Central Intelligence Agency (CIA).
A report last month said that “AT&T has turned over international calling records to the CIA. The telecom charges the CIA more than $10 million per year in exchange for access to metadata about calls by suspected terrorists overseas.”
In response, a group of consumer advocacy groups led by Public Knowledge filed a petition today with the FCC.
Appealing to the FCC is a new tactic against government collection of calling records. Previously, privacy advocates have tried to shut down the phone collection by filing lawsuits, including one in the Supreme Court. [Continue reading…]
Meanwhile, Reuters reports: Verizon Communications Inc told activist investors on Wednesday that it might skip a vote on a shareholder proposal that seeks details on the company’s cooperation with government surveillance efforts.
Verizon’s law firm Jones Day said in a November 25 letter that the company would exclude the measure from its 2014 proxy statement unless the activists did more to verify their eligibility to file the proposal.
The company’s response appears to be more aggressive than the stance AT&T Inc took against a similar proposal, said Jonas Kron, senior vice president for Trillium Asset Management, a co-filer of the measures at both telecommunications companies.
How Google should respond to revelation that NSA uses its cookies to track and exploit
Mike Masnick writes: The latest Washington Post story from the Snowden leaks highlights how the NSA was able to effectively piggyback on Google’s ad-tracking cookies to track someone’s online activities and to “enable remote exploitation” (the details of that exploitation are not revealed, but there are a few ways that would be possible).
It’s important to note, first off, that it does not appear that that the NSA is doing this in any “bulk” sense. Rather it appears to be accessing this and other data via more specific orders. That is, rather than going through everyone’s surfing habits, it’s using this particular “trick” when it’s looking for someone (or something) specific, and likely getting a FISA court order to do so.
Still, this should raise very serious concerns — and it should lead internet companies to rethink the way they use cookies. I know that some people want an extreme solution, in which cookies go away entirely, but that ignores the many benefits that cookies/tracking can provide. As we’ve said in the past, privacy is always about tradeoffs, and generally it should be about tradeoffs where individuals can assess if what they’re giving up is worth what they get in return. The problem here is that the information on what they were giving up was not clear at all, and open to abuse — meaning that things may have tilted pretty far in one direction. [Continue reading…]
NSA leaks blamed for Cisco’s falling sales overseas
Ars Technica: Cisco executives recently announced declines in product orders in China, and have placed at least part of the blame on the National Security Agency.
“In our Q1 earnings call of November 13th, we stated that product orders in China declined 18% in Q1 FY14, whereas in Q4 FY13, we referenced that our business in China had declined 6%,” a Cisco spokesperson told Ars. “By comparison, China bookings were up 8% in Q3 FY13. So, yes, there is a short-term trend of declining business in China, which we have acknowledged.”
Cisco noted that overall revenue is growing. “From a topline perspective, total revenues grew 2% $12.1B for the first quarter. Cisco revenues also grew at 6% in the preceding quarter, and grew 5% in the quarter ending April 2013,” the company said.
The trend in China is a little worrying, though. When former NSA contractor Edward Snowden revealed documents that showed the NSA had infiltrated the network infrastructure of universities and other institutions in China, suspicion was immediately cast upon Cisco. In an article published on June 20, the Chinese English-language newspaper Global Times stated, “Although the company has issued statements saying that it is not involved in monitoring citizens or government communications in China or anywhere else, recent events mean that it may be quite a long time before we can trust Cisco again.”
International bill of digital rights: call from 500 writers around the world
A stand for democracy in a digital age
In recent months, the extent of mass surveillance has become common knowledge. With a few clicks of the mouse the state can access your mobile device, your email, your social networking and internet searches. It can follow your political leanings and activities and, in partnership with internet corporations, it collects and stores your data, and thus can predict your consumption and behaviour.
The basic pillar of democracy is the inviolable integrity of the individual. Human integrity extends beyond the physical body. In their thoughts and in their personal environments and communications, all humans have the right to remain unobserved and unmolested.
This fundamental human right has been rendered null and void through abuse of technological developments by states and corporations for mass surveillance purposes.
A person under surveillance is no longer free; a society under surveillance is no longer a democracy. To maintain any validity, our democratic rights must apply in virtual as in real space.
* Surveillance violates the private sphere and compromises freedom of thought and opinion.
* Mass surveillance treats every citizen as a potential suspect. It overturns one of our historical triumphs, the presumption of innocence.
* Surveillance makes the individual transparent, while the state and the corporation operate in secret. As we have seen, this power is being systemically abused.
* Surveillance is theft. This data is not public property: it belongs to us. When it is used to predict our behaviour, we are robbed of something else: the principle of free will crucial to democratic liberty.
WE DEMAND THE RIGHT for all people to determine, as democratic citizens, to what extent their personal data may be legally collected, stored and processed, and by whom; to obtain information on where their data is stored and how it is being used; to obtain the deletion of their data if it has been illegally collected and stored.
WE CALL ON ALL STATES AND CORPORATIONS to respect these rights.
WE CALL ON ALL CITIZENS to stand up and defend these rights.
WE CALL ON THE UNITED NATIONS to acknowledge the central importance of protecting civil rights in the digital age, and to create an international bill of digital rights.
WE CALL ON GOVERNMENTS to sign and adhere to such a convention. [Continue reading…]
Why won’t the President rein in the intelligence community?
Ryan Lizza writes: On March 12, 2013, James R. Clapper appeared before the Senate Select Committee on Intelligence to discuss the threats facing America. Clapper, who is seventy-two, is a retired Air Force general and Barack Obama’s director of National Intelligence, in charge of overseeing the National Security Agency, the Central Intelligence Agency, and fourteen other U.S. spy agencies. Clapper is bald, with a gray goatee and rimless spectacles, and his affect is intimidatingly bureaucratic. The fifteen-member Intelligence Committee was created in the nineteen-seventies, after a series of investigations revealed that the N.S.A. and the C.I.A. had, for years, been illegally spying on Americans. The panel’s mission is to conduct “vigilant legislative oversight” of the intelligence community, but more often it treats senior intelligence officials like matinée idols. As the senators took turns at the microphone, greeting Clapper with anodyne statements and inquiries, he obligingly led them on a tour of the dangers posed by homegrown extremists, far-flung terrorist groups, and emerging nuclear powers.
“This hearing is really a unique opportunity to inform the American public to the extent we can about the threats we face as a nation, and worldwide,” Dianne Feinstein, a California Democrat and the committee’s chairman, said at one point. She asked committee members to “refrain from asking questions here that have classified answers.” Saxby Chambliss, a Georgia Republican, asked about the lessons of the terrorist attack in Benghazi. Marco Rubio, a Florida Republican, asked about the dangers of Egypt’s Muslim Brotherhood.
Toward the end of the hearing, Feinstein turned to Senator Ron Wyden, of Oregon, also a Democrat, who had a final question. The two senators have been friends. Feinstein held a baby shower for Wyden and his wife, Nancy Bass, before the birth of twins, in 2007. But, since then, their increasingly divergent views on intelligence policy have strained the relationship. “This is an issue where we just have a difference of opinion,” Wyden told me. Feinstein often uses the committee to bolster the tools that spy agencies say they need to protect the country, and Wyden has been increasingly concerned about privacy rights. For almost a decade, he has been trying to force intelligence officials like Clapper to be more forthcoming about spy programs that gather information about Americans who have no connection to terrorism.
Wyden had an uneasy kind of vindication in June, three months after Clapper’s appearance, when Edward Snowden, a former contractor at the N.S.A., leaked pages and pages of classified N.S.A. documents. They showed that, for the past twelve years, the agency has been running programs that secretly collect detailed information about the phone and Internet usage of Americans. The programs have been plagued by compliance issues, and the legal arguments justifying the surveillance regime have been kept from view. Wyden has long been aware of the programs and of the agency’s appalling compliance record, and has tried everything short of disclosing classified information to warn the public. At the March panel, he looked down at Clapper as if he were about to eat a long-delayed meal. [Continue reading…]
Is Silicon Valley taking a stand in favor of surveillance reform or simply assuming a posture?
Jeff Jarvis writes: Whose side are you on? That is the question MP Keith Vaz asked Alan Rusbridger last week when he challenged the Guardian editor’s patriotism over publishing Edward Snowden’s NSA and GCHQ leaks.
And that is the question answered today by eight tech giants in their letter to the White House and Congress, seeking reform of government surveillance practices worldwide. The companies came down at last on the side of citizens over spies.
Of course, they are also acting in their own economic (albeit enlightened) self-interest, for mass spying via the internet is degrading the publics’, clients’, and other nations’ trust in the cloud and its frequently American proprietors. Spying is bad for the internet; what’s bad for the internet is bad for Silicon Valley; and — to reverse the old General Motors saw — what’s bad for Silicon Valley is bad for America.
But in their letter, the companies stand first and firmly on principle. They propose that government limit its own authority, ending bulk collection of our communication. They urge transparency and oversight of surveillance, which has obviously failed thus far. And they argue against the balkanization of the net and the notion that countries may insist that data respect national borders.
Bravo to all that. I have been waiting for Silicon Valley to establish whether it collectively is a victim or a collaborator in the NSA’s web. I have wondered whether government had commandeered these companies to its ends. I have hoped they would use their power to lobby for our rights. And now I hope government — from Silicon Valley’s senator, NSA fan Dianne Feinstein, to president Obama — will listen.
This is a critical step in sparking real debate over surveillance and civil rights. It was nice that technology companies banded together once before to battle against the overreaching copyright regime known as SOPA and for our ability to watch Batman online. Now they must fight for our fundamental — in America, our constitutional — rights of speech and assembly and against unreasonable search and seizure. ‘Tis a pity it takes eight companies with silly names to do that. [Continue reading…]
The makeup of the band of corporate reformists seems to have been dictated by PowerPoint, which is to say, everyone named on the slides leaked by Snowden wants to salvage their reputation. But the problem with this type of appeal for reform is that it’s no different from the kind that might be made by any toothless advocacy group. Indeed, if these companies just want to present a wish-list of the kind of reform they claim they would like to see, then it’s pretty obvious that if no such reform is forthcoming then it will be back to business as usual.
The only thing about which we can be absolutely confident is that now, as always, corporations will act in accordance with what they determine are their own interests.
Intelligence contractors donate millions to intelligence watchdogs in Congress
The Center for Public Integrity: Most intelligence-related spending by the U.S. government is subject to independent scrutiny and monitoring by a small number of people — primarily, the 40 lawmakers assigned to the House and Senate intelligence committees, plus the roughly 100-member staffs of those two committees.
The lawmakers are meant to provide a key check on waste, fraud, abuse, and potential illegalities, since intelligence-related spending and activities are ordinarily well outside the public’s view.
According to a new report, however, every single one of those lawmakers has received campaign funds from twenty of the largest contractors providing intelligence services to the Defense Department, which accounted for a signficant portion of the nation’s overall $75.4 billion intelligence budget in 2012.
The total, election-related benefits for current intelligence committee members, including ex-officio members, provided by companies in the industry they directly oversee amount to at least $3.7 million from the companies’ PACs and employees since 2005, according to the report released Dec. 9 by Maplight.org, a nonpartisan group that investigates campaign finance issues.
Spy agencies in covert push to infiltrate virtual world of online gaming
The Guardian reports: To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs.
That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden.
The files were obtained by the Guardian and are being published on Monday in partnership with the New York Times and ProPublica.
The agencies, the documents show, have built mass-collection capabilities against the Xbox Live console network, which has more than 48 million players. Real-life agents have been deployed into virtual realms, from those Orc hordes in World of Warcraft to the human avatars of Second Life. There were attempts, too, to recruit potential informants from the games’ tech-friendly users.
Online gaming is big business, attracting tens of millions of users worldwide who inhabit their digital worlds as make-believe characters, living and competing with the avatars of other players. What the intelligence agencies feared, however, was that among these clans of elves and goblins, terrorists were lurking. [Continue reading…]
WikiLeaks’ Sarah Harrison: ‘How can you take Pierre Omidyar seriously?
The Guardian reports: The WikiLeaks staffer and Snowden collaborator Sarah Harrison has criticised Pierre Omidyar, the eBay founder who is setting up a new journalism venture with Glenn Greenwald, Laura Poitras and Jeremy Scahill, for his involvement in the 2010 financial blockade against WikiLeaks.
In her first interview since leaving Moscow for Berlin last month, Harrison told German news weekly Stern: “How can you take something seriously when the person behind this platform went along with the financial boycott against WikiLeaks?”
Harrison was referring to the decision in December 2010 by PayPal, which is owned by eBay, to suspend WikiLeaks’ donation account and freeze its assets after pressure from the US government. The company’s boycott, combined with similar action taken by Visa and Mastercard, left WikiLeaks facing a funding crisis.
“His excuse is probably that there is nothing he could have done at the time,” Harrison continued. “Well, he is on the board of directors. He can’t shake off responsibility that easily. He didn’t even comment on it. He could have said something like: ‘we were forced to do this, but I am against it’.”
Harrison joined WikiLeaks from the Bureau of Investigative Journalism, and worked with the organisation on the Afghan war logs and leaked cables projects. She now works on the WikiLeaks legal defence team, although she has no legal qualifications, and was catapulted to fame when she accompanied Edward Snowden, the NSA whistleblower, on his flight from Hong Kong to Russia in June 2013.
Referring to Omidyar’s plans to set up a new media organisation, in which the former Guardian writer Greenwald – who wrote a number of stories from the Snowden revelations – will play a central part, Harrison said: “If you set up a new media organisation which claims to do everything for press freedom, but you are part of a blockade against another media organisation, then that’s hard for us to take it seriously. But I hope that they stick to their promises”. [Continue reading…]
Do antivirus companies whitelist NSA malware?
Mathew J. Schwartz writes: Dear antivirus vendors: Are you aiding and abetting National Security Agency (NSA) spying?
That’s the subject of an open letter, sent in October to leading antivirus vendors, from 25 different privacy information security experts and organizations. The letter asks the vendors to detail whether they’ve ever detected state-sponsored malware or received a government request to whitelist state-sponsored malware, and how they would respond to any such requests in the future.
The letter, sent from Dutch digital rights foundation Bits of Freedom, requested that the firms respond by November 15. “Please let us know if you feel that you cannot, or cannot fully, answer any of the above questions because of legal constraints imposed upon you by any government,” it said.
“Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we’ve been wondering if it’s done anything to antivirus products,” letter signatory Bruce Schneier, chief security technology officer of BT, said in a blog post. “Given that it engages in offensive cyberattacks — and launches cyberweapons like Stuxnet and Flame — it’s reasonable to assume that it’s asked antivirus companies to ignore its malware. We know that antivirus companies have previously done this for corporate malware.”
As of two weeks ago, however, only six security vendors — ESET, F-Secure, Kaspersky Lab, Norman Shark, Panda, and Trend Micro — had responded to the request for information. [Continue reading…]
Snowden and Greenwald: The men who leaked the secrets
Janet Reitman writes: Early one morning last December, Glenn Greenwald opened his laptop, scanned through his e-mail, and made a decision that almost cost him the story of his life. A columnist and blogger with a large and devoted following, Greenwald receives hundreds of e-mails every day, many from readers who claim to have “great stuff.” Occasionally these claims turn out to be credible; most of the time they’re cranks. There are some that seem promising but also require serious vetting. This takes time, and Greenwald, who starts each morning deluged with messages, has almost none. “My inbox is the enemy,” he told me recently.
And so it was that on December 1st, 2012, Greenwald received a note from a person asking for his public encryption, or PGP, key so he could send him an e-mail securely. Greenwald didn’t have one, which he now acknowledges was fairly inexcusable given that he wrote almost daily about national-security issues, and had likely been on the government’s radar for some time over his vocal support of Bradley Manning and WikiLeaks. “I didn’t really know what PGP was,” he admits. “I had no idea how to install it or how to use it.” It seemed time-consuming and complicated, and Greenwald, who was working on a book about how the media control political discourse, while also writing his column for The Guardian, had more pressing things to do.
“It felt Anonymous-ish to me,” Greenwald says. “It was this cryptic ‘I and others have things you would be interested in. . . .’ He never sent me neon lights – it was much more ambiguous than that.”
So he ignored the note. Soon after, the source sent Greenwald a step-by-step tutorial on encryption. Then he sent him a video Greenwald describes as “Encryption for Journalists,” which “walked me through the process like I was a complete idiot.”
And yet, Greenwald still didn’t bother learning security protocols. [Continue reading…]
NSA is tracking mobile phone location on so many people it can’t handle the data storage
Mike Masnick writes: We all know that Senators Ron Wyden and Mark Udall have been hinting strongly about the NSA tracking people’s location via mobile phone location data. Since the Snowden documents started getting reported on, Wyden especially had ramped up his hints that mobile phone location data still undisclosed would be the real shocker. Back in October, it was revealed that the NSA had done a “pilot program” in the US to track people’s locations via their mobile phones, but stopped the program and never used the data. In response to that, Senator Wyden hinted that there was much more to come:
“After years of stonewalling on whether the government has ever tracked or planned to track the location of law-abiding Americans through their cellphones, once again, the intelligence leadership has decided to leave most of the real story secret — even when the truth would not compromise national security,” Mr. Wyden said.
It would appear that “the real story secret” has started to come out via some new Snowden documents reported on in the Washington Post by Bart Gellman and Ashkan Soltani. Basically, while the NSA may not be spying on the location of Americans in the US via their mobile phones, they appear to be collecting location data of pretty much anyone all over the rest of the world to the tune of 5 billion records a day — so much info that the NSA was having trouble storing it all (now you know what some of the Bluffdale datacenter in Utah is for).
The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
The location programs have brought in such volumes of information, according to a May 2012 internal NSA briefing, that they are “outpacing our ability to ingest, process and store” data. In the ensuing year and a half, the NSA has been transitioning to a processing system that provided it with greater capacity.
The NSA defends the program by saying that it uses the location data to find “unknown associates of known intelligence targets.” Basically, it’s tracking where everyone goes, just in case people end up spending time with people the NSA deems as being terrorists. However, that also means that the NSA has an astounding amount of really personal data on where pretty much everyone goes outside of the US, including who they meet with. The ability to abuse that data should be rather obvious. From that data, you can not only determine private business meetings, but you can figure out what doctors people go to, if they’re cheating on their spouse, etc. And, given last week’s revelations that the NSA has no qualms (at all) about using data on non-terrorists to embarrass them for the sake of embarrassing them, it’s not difficult to see how the NSA might do the same over information gleaned from this vast trough of location information. [Continue reading…]
NSA tracking cellphone locations worldwide
The Washington Post reports: The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool. [Continue reading…]
How the NSA is tracking people right now (infographic)
Andrea Peterson writes: In conversations with The Washington Post over Barton Gellman and Ashkan Soltani’s recent story on cellphone location tracking, an intelligence agency lawyer told Gellman, “obviously there is no Fourth Amendment expectation in communications metadata.” But some experts say it’s far from obvious that the 1979 Supreme Court case on which the administration bases this view gives the government unfettered power to scoop up Americans’ cellphone location data. [Continue reading…]
Microsoft to encrypt data in its services in bid to prevent snooping
The Washington Post reports: Microsoft plans to encrypt data flowing through all of its communication, productivity and other services as it seeks to reassure users in the United States and beyond that it will guard their personal information from snooping governments, the company announced Wednesday night.
The encryption initiative, approved by company executives last week, comes as many of the nation’s top technology firms scramble to protect their reputations after months of revelations about how the National Security Agency and its foreign counterparts have siphoned off massive amounts of user information, including e-mails, video chats, address books and more.
“The goal is clear: We want to be sure that governments use legal processes rather than brute force to access user data,” Brad Smith, Microsoft’s general counsel, said in an interview. [Continue reading…]