Category Archives: NSA

Total Information Awareness and the NSA

Shane Harris writes: A decade ago, a Pentagon research project called “Total Information Awareness” sparked a mass panic because of its seemingly Orwellian interest in categorizing and mining every aspect of our digital lives. It was “the supersnoop’s dream,” declared William Safire of the New York Times, a “computerized dossier on your private life from commercial sources, [combined with] every piece of information that government has about you….”

If this sounds reminiscent of the current uproar over NSA surveillance, you’re paying attention. That’s because the NSA monitoring tools are very similar to — and, in many cases are directly based on — the technology that Total Information Awareness (TIA) tried to use.

The story of that convergence starts on the morning of Feb. 2, 2002, when retired Admiral John Poindexter drove to the headquarters of the National Security Agency at Ft. Meade, Maryland, and sat down with the agency’s deputy director, an NSA veteran named Bill Black. Poindexter, a former White House national security adviser, was now running the TIA program at the Defense Advanced Research Projects Agency, the organization that tackles some of the hardest engineering and technology challenges in the Pentagon. Poindexter thought TIA was an innovative new way to stop terrorist attacks, and he wanted the NSA to help him test it.

The idea, he explained to Black, was to give U.S. intelligence analysts access to the vast universe of electronic information stored in private databases that might be useful for detecting the next plot. Data such as phone call records, emails, and Internet searches. Poindexter wanted to build what he called a “system of systems” that would access all this raw information, sort and analyze it, and hopefully find indications of terrorist plotting.

The NSA was the biggest collector of electronic data in the government, and Poindexter thought the NSA would be a natural partner in his endeavor. But what he didn’t know was that under secret orders from President George W. Bush, the NSA was already building its own version of Total Information Awareness. Fewer than 100 people at the NSA knew that for the past few months, the agency had been monitoring the phone calls and other electronic communications of Americans, and that it was obtaining copies of domestic phone call records and looking at them for potential clues about terrorist attacks.

Poindexter left Ft. Meade that day with no firm commitment from Black that the NSA would assist in his research. And TIA didn’t last long. Although Poindexter’s work wasn’t classified, the press soon caught wind of his grand data-mining ambitions, and Poindexter was held up as the poster boy for intrusive government surveillance. “I think it’s fair to say that in the country’s history there has never been proposed a program with something this far reaching in terms of surveillance capacity,” said Sen. Ron Wyden at the time. “And my sense is that the country just does not want to unleash a bunch of virtual bloodhounds to go sniffing into the medical, financial and travel records of law-abiding Americans.”

TIA was officially shut down in 2003, and Poindexter left the government. But this wasn’t the end of his grand vision.

In a secret negotiation, members of Congress, some of whom had been among Poindexter’s critics, reached an agreement to keep TIA research going, and to fund it from the classified portion of the military budget, the so-called “black budget.” TIA’s research components were given new cover names, and the program was moved under the control of the very agency that Poindexter had originally wanted to help him — the NSA. There, Poindexter’s ideas were incorporated into NSA’s surveillance activities, the latest glimpses of which we have seen in the past two weeks. [Continue reading…]

Facebooktwittermail

If your name is Ahmed or Fatima, you live in fear of NSA surveillance

Anna Lekas Miller writes: One of the most common responses from the 66% of American citizens in favor of the NSA’s data-collection programs is, “I have nothing to hide, so why should I have anything to fear?”

But what if you have nothing to hide but are targeted as a suspect nevertheless?

By that I mean, what if your name is Ahmed, Jihad, Anwar or Abdulrahman? Fatima, Rania, Rasha or Shaima? What if some of your phone calls – which the NSA is tracking with particular interest – are made to loved ones in Pakistan, Yemen, Iraq, Syria, Iran, Lebanon or Palestine? What if the language you speak on these phone calls is not English, but Arabic, Urdu or Farsi, not because it is a special jihadist code, but because it is your native language that you still speak in your home.

In other words, what if you are one of America’s 1.9 million Arab-Americans or 2.8 million Muslim-Americans? [Continue reading…]

Facebooktwittermail

FISA court oversight: a look inside a secret and empty process

Glenn Greenwald writes: Since we began began publishing stories about the NSA’s massive domestic spying apparatus, various NSA defenders – beginning with President Obama – have sought to assure the public that this is all done under robust judicial oversight. “When it comes to telephone calls, nobody is listening to your telephone calls,” he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is “fully overseen” by “the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them”. Obama told Charlie Rose last night:

“What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it’s always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause.”

The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA “is not listening to Americans’ phone calls. If it did, it is illegal. It is breaking the law.” Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only “allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States.”

The NSA’s media defenders have similarly stressed that the NSA’s eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post’s Charles Lane told his readers: “the government needs a court-issued warrant, based on probable cause, to listen in on phone calls.” The Post’s David Ignatius told Post readers that NSA internet surveillance “is overseen by judges who sit on the Foreign Intelligence Surveillance Court” and is “lawful and controlled”. Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they “have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress.”

This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.

Top secret documents obtained by the Guardian illustrate what the Fisa court actually does – and does not do – when purporting to engage in “oversight” over the NSA’s domestic spying. That process lacks many of the safeguards that Obama, the House GOP, and various media defenders of the NSA are trying to lead the public to believe exist. [Continue reading…]

Facebooktwittermail

Google challenges U.S. gag order, citing First Amendment

The Washington Post reports: Google asked the secretive Foreign Intelligence Surveillance Court on Tuesday to ease long-standing gag orders over data requests the court makes, arguing that the company has a constitutional right to speak about information it is forced to give the government.

The legal filing, which invokes the First Amendment’s guarantee of free speech, is the latest move by the California-based tech giant to protect its reputation in the aftermath of news reports about far-reaching National Security Agency surveillance of Internet traffic.

Revelations about the program, called PRISM, have opened fissures between U.S. officials and the involved companies, which have scrambled to reassure their users without violating strict rules against disclosing information that the government has classified as top-secret.

A high-profile legal showdown might help Google’s efforts to portray itself as aggressively resisting government surveillance, and a victory could bolster the company’s campaign to portray government surveillance requests as targeted narrowly and affecting only a small number of users. [Continue reading…]

Facebooktwittermail

Europe must protect itself from America

Jakob Augstein writes: On Tuesday, Barack Obama is coming to Germany. But who, really, will be visiting? He is the 44th president of the United States. He is the first African American to hold the office. He is an intelligent lawyer. And he is a Nobel Peace Prize laureate.

But is he a friend? The revelations brought to us by IT expert Edward Snowden have made certain what paranoid computer geeks and left-wing conspiracy theorists have long claimed: that we are being watched. All the time and everywhere. And it is the Americans who are doing the watching.

On Tuesday, the head of the largest and most all-encompassing surveillance system ever invented is coming for a visit. If Barack Obama is our friend, then we really don’t need to be terribly worried about our enemies.

It is embarrassing: Barack Obama will be arriving in Berlin for only the second time, but his visit is coming just as we are learning that the US president is a snoop on a colossal scale. German Chancellor Angela Merkel has said that she will speak to the president about the surveillance program run by the National Security Agency, and the Berlin Interior Ministry has sent a set of 16 questions to the US Embassy. But Obama need not be afraid. German Interior Minister Hans Peter Friedrich, to be sure, did say: “That’s not how you treat friends.” But he wasn’t referring to the fact that our trans-Atlantic friends were spying on us. Rather, he meant the criticism of that spying.

Friedrich’s reaction is only paradoxical on the surface and can be explained by looking at geopolitical realities. The US is, for the time being, the only global power — and as such it is the only truly sovereign state in existence. All others are dependent — either as enemies or allies. And because most prefer to be allies, politicians — Germany’s included — prefer to grin and bear it. [Continue reading…]

Facebooktwittermail

How dozens of companies know you’re reading about those NSA leaks

Electronic Frontier Foundation: As news websites around the globe are publishing story after story about dragnet surveillance, these news sites all have one thing in common: when you visit these websites, your personal information is broadcast to dozens of companies, many of which have the ability to track your surfing habits, and many of which are subject to government data requests.

How Does This Happen?

When you load a webpage in your browser, the page normally includes many elements that get loaded separately, like images, fonts, CSS files, and javascript files. These files can be, and often are, loaded from different domain names hosted by different companies. For example, if a website has a Facebook Like button on it, your browser loads javascript and images from Facebook’s server to display that Like button, even if the website you’re visiting has nothing to do with Facebook.

Why Does This Matter?

Each time your browser makes a request it sends the following information with it:

  • Your IP address and the exact time of the request
  • User-Agent string: which normally contains the web browser you’re using, your browser’s version, your operating system, processor information (32-bit, 64-bit), language settings, and other data
  • Referrer: the URL of the website you’re coming from—in the case of the Facebook Like button example, your browser tells Facebook which website you’re viewing
  • Other HTTP headers which contain potentially identifying information
  • Sometimes tracking cookies

Every company has different practices, but they generally log some or all of this information, perhaps indefinitely.

It takes very little information about your web browser to build a unique fingerprint of it. [Continue reading…]

Facebooktwittermail

Edward Snowden Q&A

1) Why did you choose Hong Kong to go to and then tell them about US hacking on their research facilities and universities?

2) How many sets of the documents you disclosed did you make, and how many different people have them? If anything happens to you, do they still exist?

Edward Snowden: 1) First, the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home, openly declaring me guilty of treason and that the disclosure of secret, criminal, and even unconstitutional acts is an unforgivable crime. That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it.

Second, let’s be clear: I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn’t declared war on the countries – the majority of them are our allies – but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we’re not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the “consent of the governed” is meaningless.

2) All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped. [Continue reading…]

Facebooktwittermail

I fear the chilling effect of NSA surveillance on the open internet

Jeff Jarvis writes: I fear the collateral damage the NSA’s spying via technology will do to that technology. The essential problem is not the internet or internet companies or even the spies. The real problem is the law and what it does not prevent the American government from doing with technology, and how it does not protect the principles upon which this nation was founded.

The damage to the net and its freedoms will take many forms: users may come to distrust the net for communication, sharing, and storage because they now fear – with cause – that the government will be spying on them, whether or not they are the object of that surveillance. International users – properly concerned that they are afforded even less protection than Americans – may ditch American platforms. The European Union and other national governments, which already were threatening laws targeting US technology companies, will work harder to keep their citizens’ data away from the US. Technologists may find it necessary to build in so many protections, so much encryption and caution, that the openness that is a key value of the net becomes lost.

If we trust the net less, will we use it less? Will it become less of an engine for innovation and economic development? Will it be a diminished tool for speech and assembly among citizens?

If governments use this event as an excuse to exercise more oversight and control over the net, will that not then, in turn, reduce citizens’ trust in the net and their freedom using it? Governments present themselves as the protector of our privacy, but as the NSA story demonstrates, governments present the greatest threat to our privacy as they have the means both to surveil us and to use our information against us. [Continue reading…]

Facebooktwittermail

PRISM is a small part of a much more expansive and intrusive eavesdropping effort

The Associated Press reports: In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it “Hoovering” – not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet’s backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. [Continue reading…]

Facebooktwittermail

NSA veterans say NSA leaders should face prosecution

In a roundtable discussion, a trio of former National Security Agency whistle-blowers — Thomas Drake, William Binney and J. Kirk Wiebe — tell USA TODAY that Edward Snowden succeeded where they failed.

Q: Did Edward Snowden do the right thing in going public?

William Binney: We tried to stay for the better part of seven years inside the government trying to get the government to recognize the unconstitutional, illegal activity that they were doing and openly admit that and devise certain ways that would be constitutionally and legally acceptable to achieve the ends they were really after. And that just failed totally because no one in Congress or — we couldn’t get anybody in the courts, and certainly the Department of Justice and inspector general’s office didn’t pay any attention to it. And all of the efforts we made just produced no change whatsoever. All it did was continue to get worse and expand.

Q: So Snowden did the right thing?

Binney: Yes, I think he did.

Q: You three wouldn’t criticize him for going public from the start?

J. Kirk Wiebe: Correct.

Binney: In fact, I think he saw and read about what our experience was, and that was part of his decision-making.

Wiebe: We failed, yes.

Jesselyn Radack
: Not only did they go through multiple and all the proper internal channels and they failed, but more than that, it was turned against them. … The inspector general was the one who gave their names to the Justice Department for criminal prosecution under the Espionage Act. And they were all targets of a federal criminal investigation, and Tom ended up being prosecuted — and it was for blowing the whistle.

Binney: [T]he NSA [has become] … a processing service for the FBI to use to interrogate information directly. … The implications are that everybody’s privacy is violated, and it can retroactively analyze the activity of anybody in the country back almost 12 years.

Now, the other point that is important about that is the serial number of the order: 13-dash-80. That means it’s the 80th order of the court in 2013. … Those orders are issued every quarter, and this is the second quarter, so you have to divide 80 by two and you get 40.

If you make the assumption that all those orders have to deal with companies and the turnover of material by those companies to the government, then there are at least 40 companies involved in that transfer of information. However, if Verizon, which is Order No. 80, and the first quarter got order No. 1 — then there can be as many as 79 companies involved.

So somewhere between 40 and 79 is the number of companies, Internet and telecom companies, that are participating in this data transfer in the NSA.

A transcript and videos of the complete discussion can be found here.

Facebooktwittermail

Domestic dissent can change U.S. foreign policy for the better

Mark Weisbrot writes: Several years ago, I had lunch with a US government official who told me about a trip that I had taken, that almost nobody knew about. I didn’t have to ask him where he got the information. For as long as I can remember, our government has been spying on dissidents, especially those who oppose crimes committed in the name of “national security”.

When I was a student at the University of Michigan, the FBI took down the license plates numbers of the people who drove to our meetings of the local Latin American Solidarity Committee, which was trying to end the US-sponsored terrorism and wars in Central America. This we learned from documents released under the Freedom of Information Act. The surveillance of our local, peaceful, and law-abiding group – long before the Patriot Act or the “war on terror” – was so extensive that one of our members who wrote a history of the group had to thank the FBI for keeping such a complete and detailed record of our activities.

The current revelations of a vast, secret NSA surveillance program are, of course, a continuation of what our government has been doing for the past century – the main difference being that the dragnet has gotten much larger due to change in communications technology. But there is an often-overlooked political reason for this mass intrusion on our personal communications: the government is gathering actionable intelligence in order to use it against those who oppose unpopular, unjust, and often criminal policies of that same government. And it has good reason to do so, because that opposition can be quite effective.

It is well-known that a mass protest movement, as well as its lobbying of Congress helped get us out of Vietnam. It is less widely known that the movement against the Central American wars in the 1980s, which involved hundreds of thousands of people, succeeded in cutting off congressional funding for the war against Nicaragua. And perhaps more historically significant, that result caused major problems for then-President Reagan, when his government turned to illegal funding and got caught, resulting in the infamous “Iran-Contra” scandal. [Continue reading…]

Facebooktwittermail

Chinese hail Edward Snowden as a hero

Helen Gao writes: After initially muted responses to the NSA spying controversy, the Chinese media and public are beginning to take stronger stances as it has emerged that Edward Snowden is taking refuge in Hong Kong, where he divulged classified data about US government-sponsored hacking activities directed toward China.

Editorials published by state newspapers argue, in a concerted voice, that the US owes China “an explanation of Prism” given its earlier high-profile accusation of Chinese government’s hacking of US companies. “We can see … that when American politicians and businessmen make accusatory remarks, their eyes are firmly fixed on foreign countries and they turn a blind eye to their own misdeeds,” read an editorial in People’s Daily, the Communist party mouthpiece. “The information Snowden has revealed concerns China, and we need to understand our situation well,” another editorial on Global Times, a popular nationalistic tabloid, maintained. “We have the right to ask the US government to issue explanations on, for example, whether Prism is being applied to the US’s business negotiation with the Chinese government and corporations.”

While the state media seizes the case as evidence of US double standards in its dealing with the world, it is also careful to steer the story away from aspects that may evoke domestic associations deemed too sensitive by the Chinese government. Snowden’s choice of Hong Kong as his temporary haven, for example, was only glossed over, perhaps because it brings too quickly to mind the two epic US consulate runs committed last year, by the Chongqing police chief Wang Lijun, and of human rights advocate Cheng Guangcheng, both of which put the Chinese government in an embarrassing light domestically and internationally. It would also serve as yet another reminder to the mainland Chinese of the greater social freedom and judicial independence in Hong Kong, a depressing contrast to what they have at home. [Continue reading…]

Facebooktwittermail

Larry Hunter’s prescient warnings about the digital threat to privacy

The cover of Whole Earth Review, January, 1985

The Boston Globe’s Ideas section: In the mid 1980s, when Mark Zuckerberg was still in diapers, computers ran on floppy disks, and a web was something a spider built, a computer-science graduate student at Yale University started to worry about a problem that would have struck most people as far-fetched.

Larry Hunter began to realize that as computers became bigger parts of our lives, they would come to know more and more about us, whether we liked it or not. They would gather data and build profiles, and this technology would someday have meaningful implications for our privacy and freedom of choice.

In January 1985 he published a warning essay in the inaugural issue of a techno-revolutionary journal called The Whole Earth Review. “The ubiquity and power of the computer blur the distinction between public and private information,” he wrote. “Our revolution will not be in gathering data — don’t look for TV cameras in your bedroom — but in analyzing information that is already willingly shared.”

In just the past few years, Hunter’s concerns — recently unearthed and reposted on the Smithsonian Magazine’s Paleofuture blog — have come to look almost spookily prescient. His solution, however — new laws to give people property rights over their information — has never come to pass. Today, every time we click a link, shop on Amazon, or retweet a news story, we offer the vast digital world one more free clue about who we are and what we like. All this information is stored and analyzed, bought and sold — last week, it emerged that the FBI and National Security Agency have been collecting this data directly from some of the largest Internet companies. The scope of our private lives is shrinking, and we still don’t really know the implications of this shift.

Hunter is now a professor of computational biology at the University of Colorado Denver, where he creates software that pulls together distant strands of biomedical research. Though he has also kept a finger in the privacy debate, his personal positions on privacy aren’t necessarily what you might think: He encrypts e-mails to friends and extols the privacy benefits of all-cash transactions, but he’s also posted his genetic data online.

Ideas reached out to him for his perspective on how the last 30 years have unfolded, and to ask what he sees as the next big privacy concerns. This transcript was edited from interviews by phone and e-mail. [Continue reading…]

Facebooktwittermail

GCHQ intercepted foreign politicians’ communications at G20 summits

The Guardian reports: Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. [Continue reading…]

Facebooktwittermail

The whistleblowers are the new generation of American patriots

Gary Younge writes: When Darrell Anderson, 22, joined the US military he knew there was going to be a war, and he wanted to fight it. “I thought I was going to free Iraqi people,” he told me. “I thought I was going to do a good thing.”

Until, that is, he realised precisely what he had to do. While on patrol in Baghdad, he thought: “What are we doing here? Are we looking for weapons of mass destruction? No. Are we helping the people? No, they hate us. What are we working towards, apart from just staying alive? If this was my neighbourhood and foreign soldiers were doing this then what would I be doing?” Within a few months, he says, “I was cocking my weapon at innocent civilians without any sympathy or humanity”. While home on leave he realised he was not going to be able to lead a normal life if he went back. His mum drove him to Canada, where I met him in 2006 at a picnic for war resisters in Fort Erie.

Anderson’s trajectory, from uncritical patriotism to conscious disaffection and finally to conscientious dissent, is a familiar one among a generation of Americans who came of political age after 9/11. Over time, efforts to balance the myth of American freedom on which they were raised, with the reality of American power that they have been called on to monitor or operate, causes a profound dislocation in their world view. [Continue reading…]

Facebooktwittermail

Secret court ruling put tech companies in data bind

The New York Times reports: In a secret court in Washington, Yahoo’s top lawyers made their case. The government had sought help in spying on certain foreign users, without a warrant, and Yahoo had refused, saying the broad requests were unconstitutional.

The judges disagreed. That left Yahoo two choices: Hand over the data or break the law.

So Yahoo became part of the National Security Agency’s secret Internet surveillance program, Prism, according to leaked N.S.A. documents, as did seven other Internet companies.

Like almost all the actions of the secret court, which operates under the Foreign Intelligence Surveillance Act, the details of its disagreement with Yahoo were never made public beyond a heavily redacted court order, one of the few public documents ever to emerge from the court. The name of the company had not been revealed until now. Yahoo’s involvement was confirmed by two people with knowledge of the proceedings. Yahoo declined to comment.

But the decision has had lasting repercussions for the dozens of companies that store troves of their users’ personal information and receive these national security requests — it puts them on notice that they need not even try to test their legality. And despite the murky details, the case offers a glimpse of the push and pull among tech companies and the intelligence and law enforcement agencies that try to tap into the reams of personal data stored on their servers. [Continue reading…]

Facebooktwittermail

The NSA’s PRISM creates smaller haystacks — it can’t find needles

Whenever the frequency of an event of interest is extremely low — such as with acts of terrorism — even a very accurate test will fail very often. Corey Chivers explains why.

Recent revelations about PRISM, the NSA’s massive program of surveillance of civilian communications have caused quite a stir. And rightfully so, as it appears that the agency has been granted warrantless direct access to just about any form of digital communication engaged in by American citizens, and that their access to such data has been growing significantly over the past few years.

Some may argue that there is a necessary trade-off between civil liberties and public safety, and that others should just quit their whining. Lets take a look at this proposition (not the whining part). Specifically, let’s ask: how much benefit, in terms of thwarted would-be attacks, does this level of surveillance confer?

Lets start by recognizing that terrorism is extremely rare. So the probability that an individual under surveillance (and now everyone is under surveillance) is also a terrorist is also extremely low. Lets also assume that the neck-beards at the NSA are fairly clever, if exceptionally creepy. We assume that they have devised an algorithm that can detect ‘terrorist communications’ (as opposed to, for instance, pizza orders) with 99% accuracy.

P(+ | bad guy) = 0.99

A job well done, and Murica lives to fight another day. Well, not quite. [Continue reading…]

Facebooktwittermail