John Lanchester writes: In August, the editor of the Guardian rang me up and asked if I would spend a week in New York, reading the GCHQ files whose UK copy the Guardian was forced to destroy. His suggestion was that it might be worthwhile to look at the material not from a perspective of making news but from that of a novelist with an interest in the way we live now.
I took Alan Rusbridger up on his invitation, after an initial reluctance that was based on two main reasons. The first of them was that I don’t share the instinctive sense felt by many on the left that it is always wrong for states to have secrets. I’d put it more strongly than that: democratic states need spies.
The philosopher Karl Popper, observing the second world war from his academic post in New Zealand, came up with a great title for his major work of political thought: The Open Society and Its Enemies. It is, in its way, a shocking phrase – why would the open society have enemies? (But then, the title of Charles Repington’s The First World War, published in 1920, was shocking too, because it implied that there would be another one.)
We do have enemies, though, enemies who are in deadly earnest; enemies who wish you reading this dead, whoever you are, for no other reason than that you belong to a society like this one. We have enemies who are seeking to break into our governments’ computers, with the potential to destroy our infrastructure and, literally, make the lights go out; we have enemies who want to kill as many of us, the more innocent the better, as possible, by any means possible, as a deliberate strategy; we have enemies who want to develop nuclear weapons, and thereby vastly raise the stakes for international diplomacy and the threat of terrorism; and we have common-or-garden serious criminals, who also need watching and catching.
I get all that. It doesn’t thrill me to bits that the state has to use the tools of electronic surveillance to keep us safe, but it seems clear to me that it does, and that our right to privacy needs to be qualified, just as our other rights are qualified, in the interest of general security and the common good.
My week spent reading things that were never meant to be read by outsiders was, from this point of view, largely reassuring. Most of what GCHQ does is exactly the kind of thing we all want it to do. It takes an interest in places such as the Horn of Africa, Iran, and North Korea; it takes an interest in energy security, nuclear proliferation, and in state-sponsored computer hacking.
There doesn’t seem to be much in the documents about serious crime, for which GCHQ has a surveillance mandate, but it seems that much of this activity is covered by warrants that belong to other branches of the security apparatus. Most of this surveillance is individually targeted: it concerns specific individuals and specific acts (or intentions to act), and as such, it is not the threat.
Even Julian Assange thinks that, and said as much in his alarming and perceptive book Cypherpunks: “Individual targeting is not the threat.” When the state has specific enemies and knows who they are and the kind of harm they intend, it is welcome to target them to make the rest of our polity safe. I say again, on the evidence I’ve seen, this is mainly what GCHQ does. I would add that the Guardian and its partners have gone to a lot of trouble to prevent any unnecessarily damaging detail about this work being published.
The problems with GCHQ are to be found in the margins of the material – though they are at the centre of the revelations that have been extracted from the Snowden disclosures, and with good reason. The problem and the risk comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital.
In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information “in real time”, ie immediately, from a gigantic amount of hoovered-up data.
In addition, the NSA has encouraged technology companies to install secret weaknesses or “backdoors” into their commercially available, supposedly secure products. They have spent a very great deal of money ($250m a year alone on weakening encryption), on breaking commercially available security products. Other revelations have been published in Der Spiegel, and concern the NSA exploitation of technology such as the iPhone.
What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service.
Using that “selector”, the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what’s on your mind.
To get a rough version of this knowledge, a state once had to bug phones manually, break into houses and intercept letters, and deploy teams of trained watchers to follow your whereabouts. Even then it was a rough and approximate process, vulnerable to all sorts of human error and countermeasures. It can now have something much better than that, a historically unprecedented panoply of surveillance, which it can deploy in a matter of seconds.
This process is not without supervision, of course. In order to target you via one of these “selectors” – that’s the technical term – the agent of the state will have to type into a box on his or her computer screen a Miranda number, to show that the process is taking place in response to a specific request for information, and will also need to select a justification under the Human Rights Act. That last isn’t too arduous, because the agent can choose the justification from a drop-down menu. This is the way we live now.
And yet nobody, at least in Britain, seems to care. In the UK there has been an extraordinary disconnect between the scale and seriousness of what Snowden has revealed, and the scale and seriousness of the response. One of the main reasons for that, I think, is that while some countries are interested in rights, in Britain we are more focused on wrongs. [Continue reading…]
Category Archives: NSA
Video: BBC Newsnight interview with Glenn Greenwald
NSA admits grossly exaggerating effectiveness of mass surveillance in thwarting terrorism
The Washington Times reports: The Obama administration’s credibility on intelligence suffered another blow Wednesday as the chief of the National Security Agency admitted that officials put out numbers that vastly overstated the counterterrorism successes of the government’s warrantless bulk collection of all Americans’ phone records.
Pressed by the Democratic chairman of the Senate Judiciary Committee at an oversight hearing, Gen. Keith B. Alexander admitted that the number of terrorist plots foiled by the NSA’s huge database of every phone call made in or to America was only one or perhaps two — far smaller than the 54 originally claimed by the administration.
Gen. Alexander and other intelligence chiefs have pleaded with lawmakers not to shut down the bulk collection of U.S. phone records despite growing unease about government overreach in the program, which was revealed in documents leaked by former NSA contractor Edward Snowden.
“There is no evidence that [bulk] phone records collection helped to thwart dozens or even several terrorist plots,” Sen. Patrick J. Leahy, Vermont Democrat and committee chairman, told Gen. Alexander of the 54 cases that administration officials — including the general himself — have cited as the fruit of the NSA’s domestic snooping.
“These weren’t all plots and they weren’t all foiled,” he said.
Mr. Leahy and Rep. F. James Sensenbrenner Jr., Wisconsin Republican and author of the USA Patriot Act, which the government says allows bulk data collection, are working on a bill to roll back that authority.
In a summary they floated to colleagues Wednesday, the men said they would end bulk collection and require the NSA to show that the data it is seeking are relevant to an authorized investigation and involve a foreign agent.
The two lawmakers also proposed a special advocacy office with appellate powers to be part of the proceedings in the secret Foreign Intelligence Surveillance Court, and requiring the court to release secret opinions that lay out major interpretations of law.
Mr. Leahy, who has been a chief critic of the NSA, asked Gen. Alexander to admit that only 13 of the 54 cases had any connection at all to the U.S., “Would you agree with that, yes or no?”
“Yes,” Gen. Alexander replied in a departure from normal practice.
Administration officials giving testimony to Congress, even when asked to confine themselves to a simple yes or no, rarely do.
In response to a follow-up question, Gen. Alexander also acknowledged that only one or perhaps two of even those 13 cases had been foiled with help from the NSA’s vast phone records database. [Continue reading…]
NSA had test project to collect data on Americans’ cellphone locations, director says
The Washington Post reports: The National Security Agency began a test project in 2010 to collect data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value,” the agency’s director said Wednesday.
In response to questioning at a Senate hearing, Gen. Keith Alexander said that the secret effort ended in 2011 and that the data collected were never available for intelligence analysis purposes.
“This may be something that is a future requirement for the country, but it is not right now,” given that the FBI is able to gather the location of suspects’ cellphones by obtaining warrants from a court, Alexander told the Senate Judiciary Committee.
The disclosure came just a week after Alexander declined to answer whether the NSA had ever sought the authority to obtain such data. But Sen. Ron Wyden (D-Ore.), an Intelligence Committee member who has been pressing this issue for at least two years, suggested Wednesday that officials were still withholding significant information.
“After years of stonewalling on whether the government has ever tracked or planned to track the location of law abiding Americans through their cell phones, once again, the intelligence leadership has decided to leave most of the real story secret — even when the truth would not compromise national security,” Wyden said in a statement. [Continue reading…]
Germany asks U.S. why NSA critic was denied entry
The Associated Press reports: Germany’s Foreign Ministry says it has contacted U.S. authorities over their decision to deny a German author entry to the United States.
Ilija Trojanow says he was refused permission to board a flight from Salvador da Bahia, Brazil, to Miami on Monday without explanation. He told the Spiegel Online website that the denial of entry might be linked to his criticism of the U.S. National Security Agency.
Trojanow was one of several prominent German authors who signed an open letter to Chancellor Angela Merkel urging her to take a firm stance against the mass online surveillance allegedly conducted by the NSA.
Edward Snowden’s e-mail provider defied FBI demands to turn over crypto keys, documents show
Wired reports: The U.S. government in July obtained a search warrant demanding that Edward Snowden’s e-mail provider, Lavabit, turn over the private SSL keys that protected all web traffic to the site, according to to newly unsealed documents.
The July 16 order came after Texas-based Lavabit refused to circumvent its own security systems to comply with earlier orders intended to monitor a particular Lavabit user’s metadata, defined as “information about each communication sent or received by the account, including the date and time of the communication, the method of communication, and the source and destination of the communication.”
The name of the target is redacted from the unsealed records, but the offenses under investigation are listed as violations of the Espionage Act and theft of government property — the exact charges that have been filed against NSA whistleblower Snowden in the same Virginia court.
The records in the case, which is now being argued at the 4th U.S. Circuit Court of Appeals, were unsealed today by a federal judge in Alexandria, Virginia. They confirm much of what had been suspected about the conflict between the pro-privacy e-mail company and the federal government, which led to Lavabit voluntarily closing in August rather than compromise the security it promised users. [Continue reading…]
NSA stores metadata of millions of web users for up to a year, secret files show
The Guardian reports: The National Security Agency is storing the online metadata of millions of internet users for up to a year, regardless of whether or not they are persons of interest to the agency, top secret documents reveal.
Metadata provides a record of almost anything a user does online, from browsing history – such as map searches and websites visited – to account details, email activity, and even some account passwords. This can be used to build a detailed picture of an individual’s life.
The Obama administration has repeatedly stated that the NSA keeps only the content of messages and communications of people it is intentionally targeting – but internal documents reveal the agency retains vast amounts of metadata.
An introductory guide to digital network intelligence for NSA field agents, included in documents disclosed by former contractor Edward Snowden, describes the agency’s metadata repository, codenamed Marina. Any computer metadata picked up by NSA collection systems is routed to the Marina database, the guide explains. Phone metadata is sent to a separate system. [Continue reading…]
NSA gathers data on social connections of U.S. citizens
The New York Times reports: Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.
The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.
The policy shift was intended to help the agency “discover and track” connections between intelligence targets overseas and people in the United States, according to an N.S.A. memorandum from January 2011. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.
The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.
N.S.A. officials declined to say how many Americans have been caught up in the effort, including people involved in no wrongdoing. The documents do not describe what has resulted from the scrutiny, which links phone numbers and e-mails in a “contact chain” tied directly or indirectly to a person or organization overseas that is of foreign intelligence interest.
The new disclosures add to the growing body of knowledge in recent months about the N.S.A.’s access to and use of private information concerning Americans, prompting lawmakers in Washington to call for reining in the agency and President Obama to order an examination of its surveillance policies. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate. As far back as 2006, a Justice Department memo warned of the potential for the “misuse” of such information without adequate safeguards. [Continue reading…]
Senators push to preserve NSA phone surveillance
The New York Times reports: The Senate Intelligence Committee appears to be moving toward swift passage of a bill that would “change but preserve” the once-secret National Security Agency program that is keeping logs of every American’s phone calls, Senator Dianne Feinstein, the California Democrat who leads the panel, said Thursday.
Ms. Feinstein, speaking at a rare public hearing of the committee, said she and the top Republican on the panel, Senator Saxby Chambliss of Georgia, are drafting a bill that would be marked up — meaning that lawmakers could propose amendments to it before voting it out of committee — as early as next week.
After the existence of the program became public by leaks from the former N.S.A. contractor Edward J. Snowden, critics called for it to be dismantled. Ms. Feinstein said her bill would be aimed at increasing public confidence in the program, which she said she believed was lawful.
The measure would require public reports of how often the N.S.A. had used the calling log database, she said. It would also reduce the number of years — currently five — that the domestic calling log data is kept before it is deleted. It would also require the N.S.A. to send lists of the phone numbers it searches, and its rationale for doing so, to the Foreign Intelligence Surveillance Court for review.
By contrast, a rival bill drafted by skeptics of government surveillance, including two members of the committee, Senators Ron Wyden of Oregon and Mark Udall of Colorado, would ban the mass call log collection program. [Continue reading…]
To reform the NSA, fire officials who lie
James Goodale writes: The NSA has lied to the Congress, the courts, and perhaps even to the president himself, but no one seems to care.
The Director of National Intelligence James R Clapper admitted he lied to Congress about the NSA metadata collection program. He said the NSA had no such program – and then added that that was the least “untruthful” remark he could make. General Keith Alexander, director of the National Security Agency, lied in 2012 that the NSA does not hold data on US citizens, and repeated similar misstatements, under oath, to Congress about the program:
We’re not authorized to do it [data collection on US citizens], nor do we do it.
NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.
But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week. [Continue reading…]
Europe really, really doesn’t trust the NSA
Pacific Standard reports: A few days ago the European Parliament’s Office of Citizens’ Rights and Constitutional Affairs released a notably pointed briefing paper arguing for Europe to stop trusting American Internet services. The briefing and the committee are the latest forum to suggest that European states create domestic cloud computing capacities to provide member states legal protection for NSA data surveillance. The report has the not-at-all-subtle title “The US National Security Agency Surveillance Programmes (PRISM) Foreign Intelligence Surveillance (FISA) Activities and Their Impact on EU Citizens’ Fundamental Rights.” Among the findings:
Prominent notices should be displayed by every US web site offering services in the EU to inform consent to collect data from EU citizens. The users should be made aware that the data may be subject to surveillance (under FISA 702) by the US government for any purpose which furthers US foreign policy.
The argument there being that people will have an incentive to find other websites to use. Particularly for e-commerce. Companies like Amazon, and U.S. airlines and ticketing agencies—Expedia and the like—won’t be pleased, and that in turn will create economic pressure to alter surveillance strategy, the report argues.
A consent requirement will raise EU citizen awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact on US business and increase pressure on the US government to reach a settlement.
That isn’t all. The report argues for the European Union to simply swear off U.S.-based cloud computing, and to develop local capacity. [Continue reading…]
Brazil speech at U.N. lashes out at U.S. spy program
The Associated Press reports: Brazil’s president delivered a stinging rebuke Tuesday to the United States over its surveillance program that has swept up data from billions of telephone calls and emails that have passed through Brazil —including her own.
Addressing the U.N. General Assembly on the first day of its annual meeting, President Dilma Rousseff accused the U.S. of violating Brazil’s sovereignty with what she called a “grave violation of human rights and of civil liberties.”
“In the absence of the respect for sovereignty, there is no basis for the relationship among nations,” Rousseff said. “Friendly governments and societies that seek to build a true strategic partnership, as in our case, cannot allow recurring illegal actions to take place as if they were normal. They are unacceptable.”
Last week, she shelved an upcoming state trip to the U.S. in a show of anger over the U.S. National Security Agency program.
Brazil is an important hub for trans-Atlantic fiber optic cables. The NSA, tasked with intercepting potential terror communications, also reportedly hacked into the computer network of state-run oil company Petrobras.
Rousseff said the NSA also collected economic and strategic corporate data, as well as messages by Brazilian diplomats, including to the United Nations, and from her own office. [Continue reading…]
Bruce Schneier: NSA spying is making us less safe
Bruce Schneier, a cryptographer and author on security topics, is now helping The Guardian sift through documents leaked by Edward Snowden. He talked to MIT Technology Review about what he is learning.
MIT Technology Review: Taken together, what do all of the Snowden documents leaked thus far reveal that we didn’t know already?
Bruce Schneier: Those of us in the security community who watch the NSA had made assumptions along the lines of what Snowden revealed. But there was scant evidence and no proof. What these leaks reveal is how robust NSA surveillance is, how pervasive it is, and to what degree the NSA has commandeered the entire Internet and turned it into a surveillance platform.
We are seeing the NSA collecting data from all of the cloud providers we use: Google and Facebook and Apple and Yahoo, etc. We see the NSA in partnerships with all the major telcos in the U.S., and many others around the world, to collect data on the backbone. We see the NSA deliberately subverting cryptography, through secret agreements with vendors, to make security systems less effective. The scope and scale are enormous.
The only analogy I can give is that it’s like death. We all know how the story ends. But seeing the actual details, and seeing the actual programs, is very different than knowing it theoretically.
The NSA mission is national security. How is the snooping really affecting the average person?
The NSA’s actions are making us all less safe. They’re not just spying on the bad guys, they’re deliberately weakening Internet security for everyone—including the good guys. It’s sheer folly to believe that only the NSA can exploit the vulnerabilities they create. Additionally, by eavesdropping on all Americans, they’re building the technical infrastructure for a police state.
We’re not there yet, but already we’ve learned that both the DEA and the IRS use NSA surveillance data in prosecutions and then lie about it in court. Power without accountability or oversight is dangerous to society at a very fundamental level. [Continue reading…]
How the NSA is damaging the American economy
Network World reports: The spectacle of National Security Agency contractor Edward Snowden exposing the covert spying nature of US federal officials has sent ripple waves through the technology industry — especially in the outsourcing arena.
Experts predict the NSA fiasco could result in the loss of business for some hosting vendors, but it’s hard to say exactly what the impact has been or will be.
The head of a European cloud computing provider said recently though that he’s seen a “measurable impact” from companies looking to use its services to escape what they fear could be the prying eyes of the US NSA.
“It has not been a profound surge, but there is definitely a measureable impact,” says Robert Jenkins, co-founder and CTO of Cloud Sigma, which is headquartered in Switzerland and has data centers across Europe and the United States. “We’ve definitely seen cases where people are turning to us because of this.”
Forrester analyst and cloud tracker James Staten predicted this could happen in a blog post in the summer. Information Technology & Innovation Foundation (ITIF) estimated in a report that the US cloud computing market could stand to lose up to $35 billion by 2016 because of vendors bypassing US providers and looking to overseas competitors. Staten says that’s the low end of an estimate though. [Continue reading…]
In secret, Fisa court contradicted U.S. supreme court on constitutional rights
Yochai Benkler writes: On Tuesday, the Foreign Intelligence Surveillance Court (FISC) declassified an opinion in which it explained why the government’s collection of records of all Americans’ phone calls is constitutional, and that if there is a problem with the program, it is a matter of political judgment, not constitutional law. So, should Americans just keep calm and carry on phoning? Not really.
Instead, we should worry about a court that, lacking a real adversarial process to inform it, failed while taking its best shot at explaining its position to the public to address the most basic, widely-known counter-argument to its position. The opinion does not even mention last year’s unanimous US supreme court decision on the fourth amendment and GPS tracking, a decision in which all three opinions include strong language that may render the NSA’s phone records collection program unconstitutional. No court that had been briefed by both sides would have ignored the grave constitutional issues raised by the three opinions of Justices Scalia, Sotomayor, and Alito in United States v Jones. And no opinion that fails to consider these should calm anyone down.
The newly-released FISC opinion, the first to opine on the legality of the phone metadata collection program since the Snowden leaks brought the program to national attention, is based on two straightforward points.
First, in 1979, the supreme court held in Smith v Maryland that using “pen registers” that record what number called what other number, when, and for how long, did not violate the fourth amendment. The court in Smith reasoned that individuals have no expectation of privacy in information they knowingly hand over to the phone company. The FISC reasoned that even though the NSA metadata program collected more information than the program the supreme court upheld 35 years ago, the details did not make a constitutional difference. Individuals have no fourth amendment rights in their phone call metadata.
The second component of the FISC argument was that “grouping together a large number of individuals”, no single one of whom has “a fourth amendment interest”, “cannot result in a fourth amendment interest springing into existence ex nihilo”. Adding up many zeros doesn’t create a positive value; bulk collection of unprotected materials over a sustained period of years raises no special constitutional considerations.
Standing on its own, this logic may seem persuasive. But only until you think about how last year’s Jones decision by the supreme court destabilizes this logic. [Continue reading…]
Close the NSA’s back doors
An editorial in the New York Times says: In 2006, a federal agency, the National Institute of Standards and Technology, helped build an international encryption system to help countries and industries fend off computer hacking and theft. Unbeknown to the many users of the system, a different government arm, the National Security Agency, secretly inserted a “back door” into the system that allowed federal spies to crack open any data that was encoded using its technology.
Documents leaked by Edward Snowden, the former N.S.A. contractor, make clear that the agency has never met an encryption system that it has not tried to penetrate. And it frequently tries to take the easy way out. Because modern cryptography can be so hard to break, even using the brute force of the agency’s powerful supercomputers, the agency prefers to collaborate with big software companies and cipher authors, getting hidden access built right into their systems.
The New York Times, The Guardian and ProPublica recently reported that the agency now has access to the codes that protect commerce and banking systems, trade secrets and medical records, and everyone’s e-mail and Internet chat messages, including virtual private networks. In some cases, the agency pressured companies to give it access; as The Guardian reported earlier this year, Microsoft provided access to Hotmail, Outlook.com, SkyDrive and Skype. According to some of the Snowden documents given to Der Spiegel, the N.S.A. also has access to the encryption protecting data on iPhones, Android and BlackBerry phones.
These back doors and special access routes are a terrible idea, another example of the intelligence community’s overreach. Companies and individuals are increasingly putting their most confidential data on cloud storage services, and need to rely on assurances their data will be secure. Knowing that encryption has been deliberately weakened will undermine confidence in these systems and interfere with commerce.
The back doors also strip away the expectations of privacy that individuals, businesses and governments have in ordinary communications. If back doors are built into systems by the N.S.A., who is to say that other countries’ spy agencies — or hackers, pirates and terrorists — won’t discover and exploit them?
The government can get a warrant and break into the communications or data of any individual or company suspected of breaking the law. But crippling everyone’s ability to use encryption is going too far, just as the N.S.A. has exceeded its boundaries in collecting everyone’s phone records rather than limiting its focus to actual suspects.
Representative Rush Holt, Democrat of New Jersey, has introduced a bill that would, among other provisions, bar the government from requiring software makers to insert built-in ways to bypass encryption. It deserves full Congressional support. In the meantime, several Internet companies, including Google and Facebook, are building encryption systems that will be much more difficult for the N.S.A. to penetrate, forced to assure their customers that they are not a secret partner with the dark side of their own government.
Edward Snowden has started a global debate. So why the silence in Britain?
Simon Jenkins writes: The Brazilian president cancels a state visit to Washington. The German justice minister talks of “a Hollywood nightmare“. His chancellor, Angela Merkel, ponders offering Edward Snowden asylum. The EU may even end the “safe harbour” directive which would force US-based computer servers to relocate to European regulation. Russians and Chinese, so often accused of cyber-espionage, hop with glee.
In response, an embarrassed Barack Obama pleads for debate and a review of the Patriot Acts. Al Gore refers to the Snowden revelations as “obscenely outrageous“. The rightwing John McCain declares a review “entirely appropriate“. The Senate holds public hearings and summons security chiefs, who squirm like mafia bosses on the run. America’s once dominant internet giants, with 80% of the globe under their sway, now face “Balkanised” regulation round the world as nation states seek to repatriate digital sovereignty.
And in Britain? Nothing. From parliament, the courts, and most of the media, nothing. Snowden, the most significant whistleblower of modern times, briefly amused London when he turned scarlet pimpernel in the summer; then the capital was intrigued when David Miranda was seized by Heathrow police on bogus “terrorism” charges. But the British establishment cannot get excited. It hates whistleblowers, regarding them as not proper chaps. [Continue reading…]
Brazil looks to break from U.S.-centric Internet
Phys.org: Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments.
President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to U.S. tech companies such as Facebook and Google.
The leader is so angered by the espionage that on Tuesday she postponed next month’s scheduled trip to Washington, where she was to be honored with a state dinner.
Internet security and policy experts say the Brazilian government’s reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization.
“The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.”
While Brazil isn’t proposing to bar its citizens from U.S.-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ Internet use to protect them from NSA snooping.
The danger of mandating that kind of geographic isolation, Meinrath said, is that it could render inoperable popular software applications and services and endanger the Internet’s open, interconnected structure. [Continue reading…]