Category Archives: NSA

Decoding NSA newspeak

At Slate, Jameel Jaffer and Brett Max Kaufman do an excellent job of translating NSA newspeak into meaningful English.

I do have one gripe though — and this is something endemic in mainstream news reporting: everyone is terrified of using the words lie and lying.

Hardly anyone dare unequivocally articulate what everyone knows to be an indisputable fact: that DNI James Clapper lied to Congress when he responded to a question about the NSA collecting any type of data on millions of Americans by answering: “No, sir,” to Senator Wyden.

One doesn’t require the powers of telepathy or need to have taken a deposition from a priest to whom Clapper might have confessed, to know that he was lying.

We now know without doubt that Clapper misled Congress and he later said: “My response was clearly erroneous”. But to say that the content of his statement was erroneous and that he misled Congress, sidesteps the issue of intention. It essentially says that without additional information, we are incapable of determining whether it was Clapper’s intention to mislead Congress — if we knew that was his intention, then we could without hesitation say he was lying.

Yet, who can be in any doubt that as Director of National Intelligence and thus responsible for oversight of the NSA, Clapper would have been fully aware of FISA court orders requiring Verizon and others to provide the NSA with metadata on all its customers? Clapper knew what Wyden knew and that when Wyden said “any type of data at all” he had crafted his question precisely to include metadata. And thus Clapper uttered a bald-headed lie and committed perjury, a crime for which he could be imprisoned for up to five years — that is, if anyone in Congress cared about upholding the law.

James Clapper, the director of national intelligence, has been harshly criticized for having misled Congress earlier this year about the scope of the National Security Agency’s surveillance activities. The criticism is entirely justified. An equally insidious threat to the integrity of our national debate, however, comes not from officials’ outright lies but from the language they use to tell the truth. When it comes to discussing government surveillance, U.S. intelligence officials have been using a vocabulary of misdirection — a language that allows them to say one thing while meaning quite another. The assignment of unconventional meanings to conventional words allows officials to imply that the NSA’s activities are narrow and closely supervised, though neither of those things is true. What follows is a lexicon for decoding the true meaning of what NSA officials say. [Continue reading…]

Facebooktwittermail

Members of Congress denied access to basic information about NSA

Glenn Greenwald writes: Members of Congress have been repeatedly thwarted when attempting to learn basic information about the National Security Agency (NSA) and the secret FISA court which authorizes its activities, documents provided by two House members demonstrate.

From the beginning of the NSA controversy, the agency’s defenders have insisted that Congress is aware of the disclosed programs and exercises robust supervision over them. “These programs are subject to congressional oversight and congressional reauthorization and congressional debate,” President Obama said the day after the first story on NSA bulk collection of phone records was published in this space. “And if there are members of Congress who feel differently, then they should speak up.”

But members of Congress, including those in Obama’s party, have flatly denied knowing about them. On MSNBC on Wednesday night, Sen. Richard Blumenthal (D-Ct) was asked by host Chris Hayes: “How much are you learning about what the government that you are charged with overseeing and holding accountable is doing from the newspaper and how much of this do you know?” The Senator’s reply:

“The revelations about the magnitude, the scope and scale of these surveillances, the metadata and the invasive actions surveillance of social media Web sites were indeed revelations to me.”

But it is not merely that members of Congress are unaware of the very existence of these programs, let alone their capabilities. Beyond that, members who seek out basic information – including about NSA programs they are required to vote on and FISA court (FISC) rulings on the legality of those programs – find that they are unable to obtain it. [Continue reading…]

Facebooktwittermail

With Snowden now free in Russia, U.S. has few options

McClatchy reports: The world’s most closely watched layover ended on Thursday as Russia granted temporary asylum to Edward Snowden, the accused intelligence leaker who’d been holed up in a Moscow airport’s transit lounge since June 23.

The Obama administration, which for weeks had issued only muted criticism of Russia as it implored President Vladimir Putin’s government to “do the right thing,” lashed out at the decision to offer Snowden a haven but didn’t dwell on possible repercussions.

Members of Congress fumed, calling on President Barack Obama to respond firmly. Sen. Lindsey Graham, R-S.C., said the affront was a “game changer” for U.S.-Russia relations. Sen. Charles Schumer, D-N.Y., said “Russia has stabbed us in the back” and asked Obama to recommend moving the G-20 economic summit, which is scheduled for next month in the Russian city of St. Petersburg.

But relations with Russia already are so frayed, analysts say, that there’s little the U.S. could do to punish Putin for taking in Snowden, who’s regarded by many here and abroad as a whistleblower for revealing a top-secret government spy program.

As dramatic as Snowden’s revelations are, his hiding out in Russia may not even be the worst snag in bilateral relations, which have deteriorated over the past 18 months and killed Obama’s goal of a “reset.” Other strains include disagreements over Syria, Russia’s freeze on U.S. adoptions of Russian children, and Congress’ approval of a law barring several Russian officials from entering the U.S. [Continue reading…]

Facebooktwittermail

NSA pays £100m in secret funding for GCHQ. Is Britain now getting paid to do America’s dirty work?

The Guardian reports: The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain’s intelligence gathering programmes.

The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. “GCHQ must pull its weight and be seen to pull its weight,” a GCHQ strategy briefing said.

The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK’s biggest and most important intelligence agency, and whether Britain’s dependency on the NSA has become too great.

In one revealing document from 2010, GCHQ acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”. It said GCHQ “still remains short of the full NSA ask”.

Ministers have denied that GCHQ does the NSA’s “dirty work”, but in the documents GCHQ describes Britain’s surveillance laws and regulatory regime as a “selling point” for the Americans.

The papers are the latest to emerge from the cache leaked by the American whistleblower Edward Snowden, the former NSA contractor who has railed at the reach of the US and UK intelligence agencies. [Continue reading…]

Nick Hopkins writes: The influence the NSA has over GCHQ seems considerable. Whether this is down to the money, or the pressure a senior partner in a relationship can bring to bear, is not entirely clear.

Common sense suggests it’s a mixture of the two. What is clear is this: the Snowden files are littered with remarks from GCHQ senior and middle managers worrying about the NSA “ask” and whether the British agency is doing enough to meet it.

One budget report states GCHQ will spend money according to NSA and UK government requirements – in that order. Does GCHQ feel compromised by this? If it does, it seems the imperative of keeping close to the Americans is overriding. That appears to be the view of the Cabinet Office too.

Asked about the NSA payments, the American demands and the concerns that the UK might be vulnerable to being pushed about, the Cabinet Office said: “In a 60-year close alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

It may be entirely unsurprising in Whitehall that our subservience has been institutionalised in this way, but everyone else is entitled to ask whether that makes it healthy or right.

People are also entitled to ponder whether the price of keeping the Americans so close might involve undertaking some of their “dirty work” – developing intelligence-gathering techniques that are beyond the US legislative and judicial framework, but can be accommodated within ours. [Continue reading…]

Facebooktwittermail

When Snowden informs the public, it’s espionage; when Clapper reveals same information, it’s a ‘public service’

Tim Cushing writes: Perhaps spurred on by the success of the Snowden leaks, the NSA has made its own “me too” effort and declassified a few documents ahead of Senate Judiciary Committee hearing dealing with bulk records collection and FISA oversight.

Given the choice, I’m sure we’d all rather read the unredacted versions of these documents, like those supplied by Ed Snowden, but all the same, it’s refreshing to see an intelligence agency being forced into some minimal transparency.

What the NSA revealed isn’t necessarily a surprise, but there are a few (perhaps unintentional) aspects of the declassified documents that are worth noting.

The first notable aspect, one that simply can’t be ignored, is the statement from James Clapper’s office that accompanied the unveiling.

A statement issued by Clapper’s office said he “has determined that the release of these documents is in the public interest.”

So, when Clapper releases documents, it’s in the “public’s interest.” When Snowden does it, it’s espionage that does “grave and serious damage to national security.”

Granted, the NSA’s releases are heavily redacted (for security!), but if all that’s being sought is so-called “business records/metadata” that have no expectation of privacy, what difference does it make who breaks the news and how much they expose? It’s all above board and, according to the DNI’s general counsel, everyone affected already knows they have no “expectation of privacy” in terms of the data collected. If we follow that logic, there’s no reason these documents should ever have been classified. After all, it’s pretty much the NSA/FBI equivalent of a FOIA request — all public records, all available without a warrant. [Continue reading…]

Facebooktwittermail

The ECHELON trail — Part Four: The Omega Foundation

By Steve Wright

(The first part in this series can be read here, second part here, third part here, and an introduction to the series here.)

The Omega Foundation

It was a long time before I could create the requisite networks of solidarity and understanding, moving to Manchester in 1981 to return to my roots after the riots of the summer when I published a full page article in the Guardian about the hard military policing style which was on the horizon. Oftentimes I felt like a sorcer’s apprentice but in 1984 I succeeded in my application to become Head of Manchester City Council’s Police Monitoring Unit. This provided a firm grounding in politics as ‘the art of the possible’ as well as providing ample opportunities to re-examine police accountability. It also brought me back into contact with Tony Bunyan who had been a central figure in the ABC Defence Committee and a solid source of insight and support during those difficult times. Tony was now the head of London’s Police Monitoring Committee with an awesome remit. He was and is a great teacher on how even small group in civil society can make a political change.

In 1989, after the demise of the Police monitoring initiatives in the UK as the leftwing Labour City Hall Council’s which had originally financed them, lost ground to the Labour political right, I went on to work a trusted friend to set up the Omega Foundation, to track the proliferation of military, police and security equipment to the torturing states.

Scientific And Technological Options Assessment (Stoa) And An Appraisal Of The Technology Of Political Control

In 1996, the Omega Foundation was commissioned by the European Parliament to write ‘An Appraisal of the Technologies of Political Control.’ Late in the day, I decided that maybe the time was right to raise the issue of the interception of communications. Duncan Campbell had returned to the subject in 19881 and recently that work had been extended by the New Zealander Nicky Hager in his book Secret Power.2 It was complete serendipity since I accidentally came across adverts for the book in Washington whilst visiting Terry Allen, then editor of Covert Action Quarterly.

It raised important issues about political control of a system which could technologically bypass any constitutional guarantees any state had protecting citizens from illegal surveillance. Its existence went beyond just privacy, a global network of surveillance which could target financial and political institutions was an instrument for political management: ubiquitous but invisible.

I also wanted to include new work on the FBI’s collusion with EC authorities to get more intimate access to European telecommunications for policing purposes. Tony Bunyan had hundreds of documents on this but in the winter of 1996 had yet to write them up. I inadvertently gate crashed the Statewatch staff Christmas party and in an expansive mood, Tony Bunyan agreed to publish his findings in the next issue of Statewatch. I could then quote his report as an authoritative source in the report I was writing for the European parliament’s Science & Technological Options Panel, which was deadlined for March 1997. However, it did not go to committee until December 1997 and would have been largely ignored had it not been for a Daily Telegraph article by Simon Davies which alerted the international media.

ECHELON Exposed

The section dealing with ECHELON in the STOA report only ran to a few pages. The paragraph which drew most attention concluded:

Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London, then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed for primarily non-military targets: governments, organisations and businesses in virtually every country. The ECHELON system works by indiscriminately intercepting very large quantities of communications then siphoning out what is valuable using artificial intelligence aids like Memex to find key words. Whilst there is much information gathered about potential terrorists, there is a lot of economic intelligence, notably intensive monitoring of all the countries participating in the GATT negotiations. With no system of accountability, it is difficult to discover what criteria determine who is not a target.

Nothing in the STOA report was new but its packaging in a formal report for the European Parliament led to a ‘tipping point’. Interest in ECHELON mushroomed and all the European Member States had parliamentary debates about it. In September 1998, I was asked to produce an edited study updating the earlier report and included calls for a series of new studies to determine the level and extent of ECHELON’s activities. Of these, Duncan Campbell’s Interception Capabilities 2000 was the most informative and helped to redefine our knowledge of the role, function and activities of ECHELON.3

These reports laid the foundation of the European Parliament’s temporary ECHELON Committee, which created some of the best most informed organised knowledge on the existence of ECHELON, its activities and limitations.4 Almost every serious newspaper in the world has now covered ECHELON. Why? Because one package of organised knowledge, put together in a serious format was able to catalyse subsequent interest. Nevertheless, that package in itself was the fruit of scores of other researchers’ activities, not least, the courageous Menwith Hill Women’s camp activists who gleaned much of the secret documentation on which Duncan Campbell based his studies. The documents were ‘liberated’ via the time honoured research methodology of ‘bin-ology’ – the illegal raiding of bins and plastic rubbish bags inside the base.

Conclusion

The moral of the ECHELON story is that a network of researchers can both model, reinterpret, understand and politically challenge even awesomely funded and politically sensitive surveillance organisations such as the NSA (although I might admit to having second thoughts if I had seen the Gene Hackman movie ‘Enemy of the State’ before I wrote the STOA report.) Even at that juncture, the early reception of the European Parliament was hostile in some quarters with questions about whether ECHELON even existed.

However, the STOA report contained detailed recommendations for further work on understanding new surveillance technologies and their political impact including the commissioning of new work on ECHELON. It was no coincidence that on my recommendation, the author of the key final document proving ECHELON’s role was Duncan Campbell, the original ECHELON researcher and ABC defendant. His report, to STOA, Interception Capabilities 2000 remains one of the clearest expositions on the way that ECHELON works as well as a healthy self-critique of some of the assumptions made including the capacity of the NSA to do continuous real time speech recognition, authentication and direct printout. There were limits but these were burgeoning new research areas too. These reports provoked an intense debate in the European Parliament and the setting up of a Temporary ECHELON Committee5 There is now a rich literature on ECHELON which stretches way beyond what any one researcher could have accomplished. The more important sites are available via Surveillance and Society home pages. How was that paradigm shift achieved? Essentially by a network of researchers working on a variety of different jigsaw puzzle pieces – with one researcher injecting these findings into an appropriate political arena, at the right time.

Has the debate continued? Well yes and no. Immediately after the terrorist attacks on New York in 2001, I requested the STOA committee investigate the political implications of the failure of ECHELON to pre-empt the attack on the basis that such a highly invasive intelligence set up could only justify its existence if it was a prophylactic entity preventing such atrocities before they happened. STOA did commission the report but to its own chosen think-tank. There was not going to be any deeply critical NGO questioning of the role and functioning of sensitive intelligence agencies this time.

After 9/11, the debate rumbles on and many are beginning to fear that in the future such collaborative research will be thwarted by bogus security requirements and restrictions. Research scholars have to take the long view, assemble their findings and grow the supportive networks necessary for sustaining their effective work in the future. To quote my former supervisor, Paul Smoker – every major change requires a happener – and if it has happened – it’s possible! It would be good to see these pages being used to explore the new role of ECHELON post 9/11. At a time when the newly joined former Eastern European states are being used for ‘rendering’ a.k.a. torturing political detainees, we might anticipate that ECHELON is being offered to many more policing and foreign intelligence agencies in the so called ‘War Against Terror’. It is fairly probable that new algorithms for tracking down friendship networks and associates have emerged, based on what could well be dodgy social science assumptions of ‘proximity equals collusion’. How can we locate the new ECHELON in the new world order? In the surveillance world, ECHELON and the NSA are the equivalent of the 900 lb gorilla. It is a challenge that future surveillance scholars will have to face.

1. Campbell, D. 1988 They’ve got it taped, New Statesman, 12 August.

2. Hager, N. (1996) Secret Power: New Zealand’s Role in the International Spy Network, Craig Potton Publishing, PO Box 555, Nelson, New Zealand.

3. See http://www.iptvreports.mcmail.com/ic2kreport.htm accessed December 2005

4. For the final report see http://cryptome.org/ECHELON-ep-fin.htm accessed December 2005

5. A full copy of interception capability 2000 can be found at http://www.iptvreports.mcmail.com/interception_capabilities_2000.htm accessed December 2005

References

Campbell, D. (1988) They’ve got it taped, New Statesman, 12 August.

Hager, N. (1996) Secret Power: New Zealand’s Role in the International Spy Network Nelson, New Zealand: Craig Potton Publishing

Inglis, B. (1986) The Hidden Power London: Jonathon Cape Laurie, P. (1970) Beneath the City Streets, Harmondsworth: Penguin

Lawrence, B. (1977) Nasty Branch hit Bailrigg, Scan 1, 26 April: 1

Snow, C.P. (1959) The Two Cultures and the Scientific Revolution, Cambridge: Cambridge University Press

Wood, D. (2001) The Hidden Geography of Transnational Surveillance, Unpublished PhD thesis, University of Newcastle upon Tyne, UK. http://www.staff.ncl.ac.uk/d.f.j.wood/thesis.htm [Accessed 01/12/05]

(This article originally appeared in Surveillance & Society 3 (2/3) and is republished here with the permission of the author.)

Facebooktwittermail

Obama presents Boston bombings as an NSA success story

Mike Masnick writes: Huffington Post has an article about how President Obama is meeting with many of the biggest Congressional critics of the NSA surveillance programs to discuss their concerns. However, on Wednesday he also met with larger groups in the House and Senate, where he continued to stand behind the programs. At the very bottom of the article is this stunning tidbit:

Obama reiterated his call for a “balance” between privacy and national security, but also invoked the Boston Marathon bombings as an example of where data collected by the NSA helped “identify whether there was a great plot.”

Right. So, after there was a bombing which no intelligence agency spotted beforehand, he’s now claiming that the NSA got to jump into action to find out that there wouldn’t be any more bombings because there was no bigger plot. We’re not even in the silly debunked realm of “preventing terrorist events” anymore. Now we’re at “Great work everyone! We found out that there’s no larger plot to worry about — sorry about the explosions and related mess.”

Facebooktwittermail

Black Hat doesn’t welcome NSA ‘bullshit’

Andy Greenberg: When NSA Director Keith Alexander appeared at the Las Vegas security conference Black Hat Wednesday morning, he hoped to mend the NSA’s reputation in the eyes of thousands of the conference’s hackers and security professionals. It didn’t go exactly as planned.

Alexander was about a half hour into his talk when a 30-year-old security consultant named Jon McCoy shouted “Freedom!”

“Exactly,” responded Alexander. “We stand for freedom.”

“Bullshit!” McCoy shouted.

“Not bad,” Alexander said, as applause broke out in the crowd. “But I think what you’re saying is that in these cases, what’s the distinction, where’s the discussion and what tools do we have to stop this.”

“No, I’m saying I don’t trust you!” shouted McCoy.

“You lied to Congress. Why would people believe you’re not lying to us right now?” another voice in the crowd added.

“I haven’t lied to Congress,” Alexander responded, visibly tensing. “I do think it’s important for us to have this discussion. Because in my opinion, what you believe is what’s written in the press without looking at the facts. This is the greatest technical center of gravity in the world. I ask that you all look at those facts.”

Facebooktwittermail

What is XKEYSCORE?

Marc Ambinder writes: XKEYSCORE is not a thing that DOES collecting; it’s a series of user interfaces, backend databases, servers and software that selects certain types of metadata that the NSA has ALREADY collected using other methods. XKEYSCORE, as D.B. Grady and I reported in our book, is the worldwide base level database for such metadata. XKEYSCORE is useful because it gets the “front end full take feeds” from the various NSA collection points around the world and importantly, knows what to do with it to make it responsive to search queries. As the presentation says, the stuff itself is collected by some entity called F6 and something else called FORNSAT and then something with the acronym SSO.

Deciphered, F6 means a Special Collection Service site located in a U.S. embassy or consulate overseas. The stuff is shunted by these sites to the SCS’s headquarters in Beltsville, Maryland, because the F6 sites are located in countries where it would be impossible to use regular telephonic or fiber optic cables to send it back to HQ. I should probably refrain from being more specific. FORNSAT simply means “foreign satellite collection,” which refers to NSA tapping into satellites that process data used by other countries. And SSO — Special Source Operations — refers to the branch of NSA’s Signals Intelligence Division that taps cables, finds microwave paths, and otherwise collects data not generated by F6 or foreign satellites. Basically, everything else. The presentation [published by The Guardian] suggests that the NSA collects internet traffic from 150 sites — specific facilities — worldwide.

Much of the presentation instructs analysts to query their targets carefully because there’s so much stuff that the NSA can’t even retain it all. I should amend that sentence to add that there are so many different types of data, too, that asking for “all the Internet traffic associated with Pakistan” is going to blow some circuits. Fortunately, the program is set up to allow analysts to look at slices of data that XKEYSCORE has structured. If the NSA needs to figure out the new virtual private networks that the Haqqani network is using in Pakistan, an analyst can task XKEYSCORE to provide it with a list of VPNs that the collection systems have picked up within a particular timeframe. The analyst will then use other databases and tools to figure out where and when the VPN came online, who might be using it, and what subset of other internet data he or she needs to see. [Continue reading…]

Facebooktwittermail

Russia grants Snowden one year asylum

The New York Times reports: After a month holed up in the transit zone of Moscow’s Sheremetyevo airport, Edward J. Snowden, the former intelligence contractor wanted by the United States for leaking details of surveillance programs, has received temporary refugee status in Russia and left the airport, his lawyer said Thursday.

The movement from the airport’s international transit zone marked a significant change in Mr. Snowden’s status for the first time since he left the United States and began leaking details of the National Security Agency’s surveillance.

The refugee status in Russia marks the first formal support from another government for Mr. Snowden, 30, and seems likely to elicit strong objections from the United States.

The temporary refugee status allows Mr. Snowden to move freely within the country and is valid for one year, Anatoly Kucherena, a Russian lawyer assisting Mr. Snowden with the asylum request, said in a telephone interview.

Facebooktwittermail

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

Glenn Greenwald reports: A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. [Continue reading…]

The complete XKeyscore Power Point presentation can be viewed here.

Facebooktwittermail

The ECHELON trail — Part Three: The Special Branch raid on Lancaster University

By Steve Wright

(The first part in this series can be read here, second part here, and an introduction to the series here.)

The Special Branch Raid On Lancaster University

Not all knowledge is from rational sources. Even the term paranoia literally means ‘beyond knowledge (para: beyond; noia: knowledge). On the night of 5th April 1977 I had a stormy, seemingly pointless argument with my wife. In frustration I declared that my wife didn’t understand the work in which I was engaged and ‘one day my work would walk through the front door.’ The instant response, quite deservedly, was ‘you’re being melodramatic – I’m going to bed!’ I reflected on this afterwards thinking it was a bit melodramatic and that I was making needless emotional waves.

A few hours later loud knocks on the door heralded the arrival of six Special Branch officers who make it clear that they wanted co-operation otherwise they will use ‘blatant search techniques’. This implied that not only would they turn the place over but that the search would become very obvious to the neighbours. Without the argument of the night before, I might have caved in. Because of it and a silly sense of ‘I told you so’ I calmly suggested that what they were doing infringed academic freedom and was unprecedented. This episode of déjà vu was so well documented in the light of subsequent events, Brian Inglis used it in his book, the Hidden Power. The lesson here is whilst one should never give way to paranoia, it is useful to develop and trust your intuition. Our minds are capable of intuitive leaps which are ours to use even if we can not necessarily rationally explain them and the history of science is full of such episodes. Our challenge is to use hunches as a methodology to conjecture with or refute.

In fact my then neighbours were so alarmed by the presence of six burly strangers strolling around our house they called the local police! The officer knocked on our door and was given short shrift by Detective Chief Inspector Moffat of Scotland Yard, who told him, ‘It’s official so piss off’. I queried what it was that I was alleged to have done and the Kafkaesque atmosphere was heightened by the response that it is an official secret and I cannot be told. In the meantime, my diaries and entire research correspondence were removed. I discovered later that the police don’t steal, the technical term is detinue – i.e. they hold on to items longer than they should, a matter which can be devastating if a researcher is working to pre-set deadlines.

In this heavy atmosphere of confrontation with secret police officers, it would have been easy to roll over but I felt it was important to stand up to their infringement of my rights to research. How was another matter. I could easily see how my academic future could be blown out of the water if a full secrets trial resulted from what was to all intents and purposes a fishing expedition.

I was taken by car to Lancaster University. It was the Easter holiday period and the special branch officers expected ‘that a bit of arm twisting’ would give them easy access to my offices in an otherwise empty campus. But the politics department was crawling with academics who were demanding proper procedures be followed. After some delay, I thanked the officers for their lift to campus and announced that I had work to do and proceeded to exit the car. This forced their hand and I was arrested under the official secrets legislation and taken to meet with Professor Phillip Reynolds the Pro-Vice Chancellor, together with various university and college officials who had assembled: Dr Roxbee Cox, Fylde principal and Mr. Forrester, Academic Registrar.

The atmosphere was tense. Special Branch demanded access to my room and I pointed out that principles of academic freedom were involved. After all I had only ever used open sources, had simply followed the university motto and no one had explained the nature of any charges laid against me. Detective Chief Inspector Moffat replied that ‘this was an issue of national security’ and told me that they had a warrant. Professor Reynolds demanded that they go through the proper channels, to which Moffat replied that he had six men present and would start breaking down doors in the department if access was denied. People began sweating – it was an unforgettable moment. I broke it by emphasizing that I had nothing to hide and suggested that they could search to their hearts’ content.1 The atmosphere was thankfully lightened a bit later with the arrival of my supervisor, Dr Paul Smoker, who amidst the hub bub in the corridors managed to give me a burst of the Beatles hit, ‘Listen Do You Want To Know A Secret – Do you Promise Not to Tell?’ Perfect: but I was later held in Lancaster Police Station for several hours, refused a solicitor and when finally released was told, sometimes you fellows are too clever for your own good.’

The raid turned my research plans upside down not to mention the impact it had on my personal life. However it was many times worse for the main researchers, Crispin Aubrey, John Berry and Duncan Campbell (now deemed the ABC defendants), who were facing the full rigours of an official secrets act trial. And yet there was a puzzle: why had Special Branch undertaken such a foolhardy exercise as to raid a British University – how come I’d touched on a raw nerve? It quickly dawned on me that I had inadvertently stumbled on a network connected with the configuration of the antennae I had photographed on the Quenmore Moor, which the authorities were desperate to keep secret. It seemed incomprehensible. I knew that Menwith Hill was a US base, but what was the link with UK phone lines, and especially the link to Northern Ireland? Just where were the results being transmitted – to the US, but how – by satellite? The system must be huge. It felt like a science fiction movie. Continue reading

Facebooktwittermail

McClatchy asks whether U.S. spied on its reporter

The Associated Press reports: The McClatchy news organization asked National Intelligence Director James Clapper on Tuesday whether U.S. intelligence agencies monitored cellphone calls between a McClatchy freelance reporter and his sources in Afghanistan.

In a letter to Clapper, Anders Gyllenhaal, McClatchy’s vice president of news, and Karole Morgan-Prager, vice president, corporate development and general counsel, called the allegations that U.S. intelligence agencies helped target a journalist working for a U.S. news organization “disturbing.”

“Absent a well-founded, good faith belief that a journalist is engaged in terrorist activities, compiling and analyzing a journalist’s metadata would violate core First Amendment principles, and U.S. law,” Gyllenhaal and Morgan-Prager wrote.

They asked Clapper whether any U.S. intelligence agencies helped in the “collection, use or analysis” of any metadata from McClatchy freelancer Jon Stephenson’s cellphone while he worked in Afghanistan last year.

Facebooktwittermail

Senators sick of being lied to by intelligence officials

The Guardian reports: The bipartisan leaders of a powerful Senate committee questioned the truthfulness of the US intelligence community in a heated Wednesday morning hearing as intelligence officials conceded that their controversial bulk phone records collection of millions of Americans was not “the most important tool”.

“We need straightforward answers, and I’m concerned we’re not getting them,” said Patrick Leahy, the Vermont Democrat and chairman of the Senate judiciary committee.

Leahy, joined by ranking Republican Chuck Grassley of Iowa, blasted James Clapper, the US director of national intelligence, for making untruthful statements to Congress in March about the bulk phone records collection on Americans, and NSA director Keith Alexander for overstating the usefulness of that collection for stopping terrorist attacks.

Grassley called Clapper’s recent apology to senator Ron Wyden and the intelligence community “especially disturbing”.

“Nothing can excuse this kind of behavior from a senior administration official,” Grassley said. “Especially on a matter of such importance.” [Continue reading…]

Facebooktwittermail

NSA suspected of spying on McClatchy newspaper correspondent

Nicky Hager* reports: The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war.

Stephenson has described the revelation as a serious violation of his privacy, and the intrusion into New Zealand media freedom has been slammed as an abuse of human rights.

The spying came at a time when the New Zealand Defence Force was unhappy at Stephenson’s reporting of its handling of Afghan prisoners and was trying to find out who was giving him confidential information.

The monitoring occurred in the second half of last year when Stephenson was working as Kabul correspondent for the US McClatchy news service and for various New Zealand news organisations.

The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

And since early in the Afghanistan war, the GCSB has secretly posted staff to the main US intelligence centre at Bagram, north of Kabul. They work in a special “signals intelligence” unit that co-ordinates electronic surveillance to assist military targeting. It is likely to be this organisation that monitored Stephenson. [Continue reading…]

*Nicky Hager is an investigative journalist from New Zealand who has been exposing the NSA’s global surveillance operations since the 1990s, and is the author of Secret Power (1997) which can be downloaded as a free e-book here.

Facebooktwittermail