Bloomberg reports: International anger over the National Security Agency’s Internet surveillance is hurting global sales by American technology companies and setting back U.S. efforts to promote Internet freedom.
Disclosures of spying abroad may cost U.S. companies as much as $35 billion in lost revenue through 2016 because of doubts about the security of information on their systems, according to the Information Technology & Innovation Foundation, a policy research group in Washington whose board includes representatives of companies such as IBM and Intel.
“The potential fallout is pretty huge given how much our economy depends on the information economy for its growth,” said Rebecca MacKinnon, a senior fellow at the New America Foundation, a Washington policy group. “It’s increasingly where the U.S. advantage lies.”
Any setback in the U.S. push to maintain an open Internet also could inflict indirect damage on companies such as Apple and Google that benefit from global networks with few national restrictions. [Continue reading…]
Category Archives: Five Eyes
Pierre Omidyar, Glenn Greenwald and the ownership of the Snowden’s leaks
Mark Ames writes: Who “owns” the NSA secrets leaked by Edward Snowden to reporters Glenn Greenwald and Laura Poitras?
Given that eBay founder Pierre Omidyar just invested a quarter of a billion dollars to personally hire Greenwald and Poitras for his new for-profit media venture, it’s a question worth asking.
It’s especially worth asking since it became clear that Greenwald and Poitras are now the only two people with full access to the complete cache of NSA files, which are said to number anywhere from 50,000 to as many as 200,000 files. That’s right: Snowden doesn’t have the files any more, the Guardian doesn’t have them, the Washington Post doesn’t have them… just Glenn and Laura at the for-profit journalism company created by the founder of eBay.
Edward Snowden has popularly been compared to major whistleblowers such as Daniel Ellsberg, Chelsea Manning and Jeffrey Wigand. However, there is an important difference in the Snowden files that has so far gone largely unnoticed. Whistleblowing has traditionally served the public interest. In this case, it is about to serve the interests of a billionaire starting a for-profit media business venture. This is truly unprecedented. Never before has such a vast trove of public secrets been sold wholesale to a single billionaire as the foundation of a for-profit company.
Think about other famous leakers: Daniel Ellsberg neither monetized nor monopolized the Pentagon Papers. Instead, he leaked them to well over a dozen different newspapers and media outlets such as the New York Times and Washington Post, and to a handful of sitting senators — one of whom, Mike Gravel, read over 4,000 of the 7,000 pages into the Congressional record before collapsing from exhaustion. The Papers were published in book form by a small nonprofit run by the Unitarian Church, Beacon House Press.
Chelsea Manning, responsible for the largest mass leaks of government secrets ever, leaked everything to WikiLeaks, a nonprofit venture that has largely struggled to make ends meet in its seven years of existence. Julian Assange, for all of his flaws, cannot be accused of crudely enriching himself from his privileged access to Manning’s leaks; instead, he shared his entire trove with a number of established media outlets including the Guardian, New York Times, Le Monde and El Pais. Today, Chelsea Manning is serving a 35-year sentence in a military prison, while the Private Manning Support Network constantly struggles to raise funds from donations; Assange has spent the last year and a half inside Ecuador’s embassy in London, also struggling to raise funds to run the WikiLeaks operation.
A similar story emerges in the biggest private sector analogy — the tobacco industry leaks by whistleblowers Merrell Williams and Jeffrey Wigand. After suffering lawsuits, harassment and attempts to destroy their livelihoods, both eventually won awards as part of the massive multibillion dollar settlements — but the millions of confidential tobacco documents now belong to the public, maintained by a nonprofit, the American Legacy Project, whose purpose is to help scholars and reporters and scientists fight tobacco propaganda and power. Every year, over 400,000 Americans die from tobacco-related illnesses.
The point is this: In the most successful whistleblower cases, the public has sided with the selfless whistleblower against the power- or profit-driven entity whose secrets were leaked. The Snowden case represents a new twist to the heroic whistleblower story arc: After successfully convincing a large part of the public and the American Establishment that Snowden’s leaks serve a higher public interest, Greenwald promptly sold those secrets to a billionaire. [Continue reading…]
Ire in Canada over report NSA spied from Ottawa
The New York Times reports: Canadian opposition politicians expressed shock and anger on Thursday over a report that the National Security Agency conducted widespread surveillance during a summit meeting of world leaders in Canada in June 2010.
The Canadian Broadcasting Corporation, citing a confidential briefing paper obtained by Edward J. Snowden, the former N.S.A. contractor, reported on Wednesday night that the N.S.A. turned the United States Embassy in Ottawa into a command post for a six-day surveillance operation that coincided with the Group of 20 summit meeting in Toronto and the Group of 8 meeting in Huntsville, Ontario.
According to the document, the operation was “closely coordinated with the Canadian partner,” an apparent reference to the Communications Security Establishment Canada, a Canadian electronic surveillance agency.
Exactly who or what the N.S.A. was monitoring, however, was unclear from the CBC’s description of the report. The document does indicate, however, that the N.S.A. believed that its mandate during the summit meetings included “providing support to policy makers.” [Continue reading…]
U.S. nears decision to split leadership of NSA, Cyber Command
Reuters reports: The White House is nearing a decision on splitting up the eavesdropping National Security Agency and U.S. Cyber Command, which conducts cyber warfare, a proposed reform prompted in part by revelations of NSA’s widespread snooping, individuals briefed on the matter said on Wednesday.
As part of the emerging plan, the NSA likely would get a civilian director for the first time in its 61-year history, the individuals said.
Both agencies are now headed by the same person, Army General Keith Alexander, who is retiring in March as NSA’s longest-serving director.
While Alexander is highly regarded in the intelligence community, critics have questioned the current arrangement. They say it concentrates too much power in one individual and that the two agencies have different missions. [Continue reading…]
Fallout from NSA surveillance threatens ‘the existence of the World Wide Web’ says agency’s former director
The Wall Street Journal reports: Revelations about the NSA’s surveillance operations are fueling international efforts to divide up the Internet by country, [Michael Hayden, former director of both the NSA and the CIA] said, which is a movement the U.S. government — and U.S. tech companies — have worked hard to prevent.
“This is threatening the existence of the World Wide Web,” Mr. Hayden said, adding that a Balkanization of the Internet is “a no-fooling danger.”
In the near term, Germany wants a “no-spy” agreement and has sought to insert tough data-privacy measures into a long-sought U.S.-European trade pact. Ms. Merkel told parliament last Monday the NSA affair was “putting to the test” Germany’s relationship with the U.S., and the trade pact negotiations in particular.
Microsoft boosts effort to encrypt its Internet traffic to avoid NSA spying
The Washington Post reports: Microsoft is moving toward a major new effort to encrypt its Internet traffic amid fears that the National Security Agency may have broken into its global communications links, said people familiar with the emerging plans.
Suspicions at Microsoft, while building for several months, sharpened in October when it was reported that the NSA was intercepting traffic inside the private networks of Google and Yahoo, two industry rivals with similar global infrastructures, said people with direct knowledge of the company’s deliberations. They said top Microsoft executives are meeting this week to decide what encryption initiatives to deploy and how quickly.
Documents obtained from former NSA contractor Edward Snowden suggest — but do not prove — that the company is right to be concerned. Two previously unreleased slides that describe operations against Google and Yahoo include references to Microsoft’s Hotmail and Windows Live Messenger services. A separate NSA e-mail mentions Microsoft Passport, a Web-based service formerly offered by Microsoft, as a possible target of that same surveillance project, called MUSCULAR, which was first disclosed by The Washington Post last month.
Though Microsoft officials said they had no independent verification of the NSA targeting the company in this way, general counsel Brad Smith said Tuesday that it would be “very disturbing” and a possible constitutional breach if true. [Continue reading…]
Snowden spyware revelations: we need to unmask the five-eyed monster
Eric King, head of research at Privacy International, writes: As the global public reels from yet another Snowden revelation – this time, that the US and UK intelligence forces have hacked into and planted spyware on more than 50,000 computer networks worldwide – the hypocrisy of the US and British governments is brought into sharp relief. Less than four years ago Hillary Clinton, chastising China, declared that “countries or individuals that engage in cyber attacks should face consequences and international condemnation. In an interconnected world, an attack on one nation’s networks can be an attack on all.” Given what we now know to be the “Five Eyes” complete stranglehold on the world’s internet infrastructure, how can we possibly reconcile repeated American appeals to internet freedom and condemnation of Chinese internet monitoring with US-sponsored network hacking?
Intelligence agencies and the governments that operate them have been revealed to be not merely secretive, but also hypocritical, and dismissive of any legitimate public concerns. It is time to bring these practices, and the covert agreements that underpin them, into the light. For more than 60 years, the secret patchwork of spying arrangements and intelligence-sharing agreements that makes up the Five Eyes alliance has remained obfuscated by the states that it benefits – Australia, the US, Canada, New Zealand and the UK. Save for one critically important release of declassified documents in 2010, the Five Eyes states have spent almost 70 years concealing from their citizens the scope and extent of their global surveillance ambitions – eroding the public’s ability to communicate privately and securely without examination or question.
That’s why today, Privacy International has written to the governments of the Five Eyes states demanding the publication of the treaties and agreements that underpin the alliance. At the same time, a group of civil society actors are launching a Campaign to End Mass Surveillance, enlisting citizens from around the world to urgently call on their governments to put down this mysterious arrangement. While these arrangements have been in existence for decades, the alliance is now coming out of the shadows to block UN resolutions condemning the mass surveillance that has been revealed over the summer. [Continue reading…]
Spies worry over ‘doomsday’ cache alleged to be stashed on cloud by Snowden
Reuters reports: British and U.S. intelligence officials say they are worried about a “doomsday” cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.
The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.
The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.
The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
Spokespeople for both NSA and the U.S. Office of the Director of National Intelligence declined to comment.
One source described the cache of still unpublished material as Snowden’s “insurance policy” against arrest or physical harm.
U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories.
“The worst is yet to come,” said one former U.S. official who follows the investigation closely. [Continue reading…]
Obama’s overhaul of spy programs cloaked in more secrecy
McClatchy reports: President Barack Obama has faced withering criticism around the globe for his secret spying programs. How has he responded? With more secrecy.
Obama has been gradually tweaking his vast government surveillance policies. But he is not disclosing those changes to the public. Has he stopped spying on friendly world leaders? He won’t say. Has he stopped eavesdropping on the United Nations, the World Bank and the International Monetary Fund? He won’t say.
Even the report by the group Obama created to review and recommend changes to his surveillance programs has been kept secret.
Critics note that this comes after he famously promised the most open administration in history.
“They seem to have reverted to a much more traditional model of secrecy except when it’s politically advantageous,” said Steven Aftergood, who directs the Federation of American Scientists Project on Government Secrecy, and is an expert on – and prominent critic of – government secrecy. “That’s normal but not consistent with their pledge. [Continue reading…]
Top-secret document reveals NSA propaganda operations designed to discredit ‘radicalizers’
The Huffington Post reports: The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target’s credibility, reputation and authority.
The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT” — or signals intelligence, the interception of communications — “assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues.
Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
The Director of the National Security Agency — described as “DIRNSA” — is listed as the “originator” of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. [Continue reading…]
NSA may have hit Internet companies at a weak spot
The New York Times reports: The recent revelation that the National Security Agency was able to eavesdrop on the communications of Google and Yahoo users without breaking into either company’s data centers sounded like something pulled from a Robert Ludlum spy thriller.
How on earth, the companies asked, did the N.S.A. get their data without their knowing about it?
The most likely answer is a modern spin on a century-old eavesdropping tradition.
People knowledgeable about Google and Yahoo’s infrastructure say they believe that government spies bypassed the big Internet companies and hit them at a weak spot — the fiber-optic cables that connect data centers around the world and are owned by companies like Verizon Communications, the BT Group, the Vodafone Group and Level 3 Communications. In particular, fingers have been pointed at Level 3, the world’s largest so-called Internet backbone provider, whose cables are used by Google and Yahoo.
The Internet companies’ data centers are locked down with full-time security and state-of-the-art surveillance, including heat sensors and iris scanners. But between the data centers — on Level 3’s fiber-optic cables that connected those massive computer farms — information was unencrypted and an easier target for government intercept efforts, according to three people with knowledge of Google’s and Yahoo’s systems who spoke on the condition of anonymity. [Continue reading…]
End the NSA dragnet now
Senators Ron Wyden, Mark Udall, and Martin Heinrich write: The framers of the Constitution declared that government officials had no power to seize the records of individual Americans without evidence of wrongdoing, and they embedded this principle in the Fourth Amendment. The bulk collection of Americans’ telephone records — so-called metadata — by the National Security Agency is, in our view, a clear case of a general warrant that violates the spirit of the framers’ intentions. This intrusive program was authorized under a secret legal process by the Foreign Intelligence Surveillance Court, so for years American citizens did not have the knowledge needed to challenge the infringement of their privacy rights.
Our first priority is to keep Americans safe from the threat of terrorism. If government agencies identify a suspected terrorist, they should absolutely go to the relevant phone companies to get that person’s phone records. But this can be done without collecting the records of millions of law-abiding Americans. We recall Benjamin Franklin’s famous admonition that those who would give up essential liberty in the pursuit of temporary safety will lose both and deserve neither.
The usefulness of the bulk collection program has been greatly exaggerated. We have yet to see any proof that it provides real, unique value in protecting national security. In spite of our repeated requests, the N.S.A. has not provided evidence of any instance when the agency used this program to review phone records that could not have been obtained using a regular court order or emergency authorization.
Despite this, the surveillance reform bill recently ratified by the Senate Intelligence Committee would explicitly permit the government to engage in dragnet collection as long as there were rules about when officials could look at these phone records. It would also give intelligence agencies wide latitude to conduct warrantless searches for Americans’ phone calls and emails.
This is not the true reform that poll after poll has shown the American people want. It is preserving business as usual. [Continue reading…]
Google mulled ditching U.S. after NSA scandal
CNBC reports: Google, the giant of the Internet, thought about moving its servers out of the U.S. after the NSA debacle, said Eric Schmidt, the company’s chairman, on Friday at the Paley International Council Summit in New York.
“Actually, we thought about that and there are many, many reasons why it’s impossible for Google to leave the United States, although it’s attractive,” Schmidt said.
“But the reason it’s an interesting idea is because American firms are subject to these rules, the [Foreign Intelligence Surveillance Act] rules, Patriot Act and so forth, and this government surveillance is really a problem.”
NSA report outlined goals for more power
James Risen and Laura Poitras report: Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.
In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.”
Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded.
Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.” The agency also said it would try to decrypt or bypass codes that keep communications secret by influencing “the global commercial encryption market through commercial relationships,” human spies and intelligence partners in other countries. It also talked of the need to “revolutionize” analysis of its vast collections of data to “radically increase operational impact.”
The strategy document, provided by the former N.S.A. contractor Edward J. Snowden, was written at a time when the agency was at the peak of its powers and the scope of its surveillance operations was still secret. Since then, Mr. Snowden’s revelations have changed the political landscape. [Continue reading…]
Surveillance goes on trial
An editorial in the New York Times says: There was a lot that was ordinary about the hearing in Courtroom 20B of the Manhattan federal courthouse on Friday morning: a team of lawyers at the plaintiff’s table, spectators in the gallery. What was extraordinary was the defendant, the United States government, and the lawsuit it is facing over the National Security Agency’s seven-year-old, once top-secret phone-surveillance program, which until this week it never had to defend in open court.
Until Edward Snowden, a disaffected N.S.A. contractor, came along and documented the stunning scope of the phone program — which vacuums up information about every call made in the United States every day for the purpose of identifying possible terror suspects — intelligence and law-enforcement officials were accustomed to operating in the friendlier confines of the Foreign Intelligence Surveillance Court.
That is not a court by any standard definition. A rotating slate of federal judges considers secret warrant applications from the government and issues secret opinions, without hearing any opposing argument. In 2012, the court approved 1,855 of 1,856 requests that came before it.
The environment on Friday was very different, as lawyers for the A.C.L.U. vigorously contested the legality of the phone-data sweep, and Federal District Judge William Pauley III expressed a proper skepticism of the government’s claim that the program raised no constitutional concerns. When a government lawyer argued that Congress twice reauthorized the Patriot Act section under which the phone program has been approved, Judge Pauley reminded him that several members of Congress have said publicly they were not made aware of what was in the program. Others have said they believe it is being abused.
The A.C.L.U., which filed its suit days after the revelation of the phone-data sweep, called the program a “vast dragnet” that violates both federal law and the Constitution. The fact that the government must show a higher level of suspicion before it can examine a specific call’s data is irrelevant, the group’s lawyers said. The collection of so much data on millions of innocent Americans is itself an unconstitutional search, they argued, and under the government’s theory, the power to collect even more is “absolutely without limit.”
In the wake of the Snowden disclosures and the ensuing public debate, the agency and the intelligence court have declassified some rulings and other documents in an attempt to justify the various surveillance programs. But far from providing comfort, the releases have only highlighted the dubious grounds on which the programs have been approved, and how often and how systematically the N.S.A. violates the court’s orders.
However Judge Pauley and the other federal judges facing similar litigation eventually rule, the most important reforms to the programs must come from Congress, which has the power to end or drastically curtail the bulk data collection and to strengthen oversight and transparency of an agency that needs much more of both.
House intel bill adds $75 million to NSA budget to stop future Snowdens
Ars Technica reports: On Thursday, the House Intelligence Committee approved a spending bill to fund the National Security Agency and other intelligence organizations. Included in the bill is a provision that would set aside $75 million for the NSA to improve its internal security and mitigate insider threats to classified material. In other words, the bill seeks to prevent future Edward Snowdens.
How the government can discover your health problems, political beliefs, and religious practices using just your metadata
Dahlia Lithwick and Steve Vladeck write: This week brought a new round of revelations about yet another National Security Agency surveillance program, this one created to hoover up details about how individual Americans use the Internet. The new disclosures were met by most observers with a fatalistic shrug. After all, we’ve quickly grown accustomed — or at least desensitized — to the fact that the government is looking at much of the information we voluntarily provide to others. And the material being collected in this case was only “metadata”: the details of when, where, and how we used the Internet — not what we actually read or wrote.
Should NSA sweeps of our “to” and “from” lines be fair game? How much can the government really learn about us without knowing what we’re saying in the text?
The legality of the “telephony metadata” program — the initiative revealed by Glenn Greenwald in the Guardian in June that showed the government collecting telephone records of Americans on a mass scale — will be considered by a federal district judge in Manhattan on Friday. According to the now disclosed orders of the secret Foreign Intelligence Surveillance Court, such “metadata” includes “the originating and terminating telephone number and the time and duration of any call.” It also includes information about the location of both parties to the call and the international mobile subscriber identity (IMSI) and international mobile station equipment identity (IMEI) numbers, which allow Uncle Sam to “identify the user or device that is making or receiving a call.” But because it doesn’t include the content of the phone calls, the story goes, there’s no invasion of our privacy. Nothing, therefore, to worry about?
As Professor Edward Felten, director of the Center for Information Technology Policy at Princeton University, explains in a declaration filed in that phone records case, our metadata in fact tells the government a lot more about us than we might realize, especially when different types of metadata are aggregated together. Consider calls to single-purpose hotlines: NSA collection of our metadata means the government knows when we’ve called a rape hotline, a domestic violence hotline, an addiction hotline, or a support line for gay teens. Hotlines for whistleblowers in every agency are fair game, as are police hotlines for “anonymous” reports of crimes. Charities that make it possible to text a donation to a particular cause (say, Planned Parenthood) or political candidate or super PAC could reveal an enormous amount about our political activities. And calling patterns can reveal our religious beliefs (no calls on Sabbath? Heaps of calls on Christmas?) or new medical conditions. If, for instance, the government knows that, within an hour, we called an HIV testing service, then our doctor, and then our health insurance company, they may not “know” what was discussed, but anyone with common sense — even a government official — could probably figure it out. [Continue reading…]
Meet the spies doing the NSA’s dirty work
Shane Harris writes: With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU. [Continue reading…]