The Guardian reports: The conservative Republican who co-authored America’s Patriot Act is preparing to unveil bipartisan legislation that would dramatically curtail the domestic surveillance powers it gives to intelligence agencies.
Congressman Jim Sensenbrenner, who worked with president George W Bush to give more power to US intelligence agencies after the September 11 terrorist attacks, said the intelligence community had misused those powers by collecting telephone records on all Americans, and claimed it was time “to put their metadata program out of business”.
His imminent bill in the House of Representatives is expected to be matched by a similar proposal from Senate judiciary committee chair Patrick Leahy, a Democrat. It pulls together existing congressional efforts to reform the National Security Agency in the wake of disclosures by whistleblower Edward Snowden.
Sensenbrenner has called his bill the Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection, and Online Monitoring Act – or USA Freedom Act, and a draft seen by the Guardian has four broad aims.
It seeks to limit the collection of phone records to known terrorist suspects; to end “secret laws” by making courts disclose surveillance policies; to create a special court advocate to represent privacy interests; and to allow companies to disclose how many requests for users’ information they receive from the USA. The bill also tightens up language governing overseas surveillance to remove a loophole which it has been abused to target internet and email activities of Americans. [Continue reading…]
Category Archives: Five Eyes
Beware of poison pill spying reform
At the ACLU, Robyn Greene writes: In the wake of revelations over the last few months about massive NSA surveillance programs that violate the privacy of millions of innocent Americans, members of the congressional Intelligence Committees have begun to draft legislation that they say will reform these authorities. There’s just one problem – unlike reform bills proposed by other members of Congress, the Intelligence Committees’ bills might do more to entrench domestic surveillance programs than rein them in.
At a Senate Intelligence Committee hearing last month, Sen. Dianne Feinstein (D-Calif.) described her proposals, and one thing is clear: they won’t fix anything. In fact, they may even make government surveillance worse. They include:
- Legalizing the warrantless wiretapping of people known to be located in the U.S. for 7 days where that surveillance began abroad; and
- Legalizing queries of U.S. persons’ names or e-mail addresses without probable cause, so long as it is for “articulable foreign intelligence purposes.”
These changes would represent significant expansions of the NSA’s domestic surveillance authorities under Section 702 of the FISA Amendments Act, an already overly broad law that authorizes the suspicionless surveillance and collection of millions of Americans’ communications, including the contents of their emails. [Continue reading…]
Editors on the NSA files: ‘What the Guardian is doing is important for democracy’
In response to an editorial in Britain’s Daily Mail, which described The Guardian as “The paper that helps Britain’s enemies,” The Guardian asked for comments from editors at the New York Times, Der Spiegel, Haaretz, Le Monde, El País, Slate, The Hindu, Clarin, Frankfurter Allgemeine Zeitung, the Washington Post, Sueddeutsche Zeitung, La Repubblica, Aftenposten, Dagens Nyheter, La Stampa, Neue Zürcher Zeitung, Tagesspiegel, Gazeta Wyborcza, Politiken, Buzzfeed, ORF-TV, Der Standard, Fairfax Media, Sydney Morning Herald, the Age, the Conversation, and Crikey.
None share the Mail’s assessment.
CIA warning on Snowden in 2009 went unheeded
The New York Times reports: Just as Edward J. Snowden was preparing to leave Geneva and a job as a C.I.A. technician in 2009, his supervisor wrote a derogatory report in his personnel file, noting a distinct change in the young man’s behavior and work habits, as well as a troubling suspicion.
The C.I.A. suspected that Mr. Snowden was trying to break into classified computer files to which he was not authorized to have access, and decided to send him home, according to two senior American officials.
But the red flags went unheeded. Mr. Snowden left the C.I.A. to become a contractor for the National Security Agency, and four years later he leaked thousands of classified documents. The supervisor’s cautionary note and the C.I.A.’s suspicions apparently were not forwarded to the N.S.A. or its contractors, and surfaced only after federal investigators began scrutinizing Mr. Snowden’s record once the documents began spilling out, intelligence and law enforcement officials said.
“It slipped through the cracks,” one veteran law enforcement official said of the report. [Continue reading…]
Skype under investigation in Luxembourg over link to NSA
The Guardian reports: Skype is being investigated by Luxembourg’s data protection commissioner over concerns about its secret involvement with the US National Security Agency (NSA) spy programme Prism, the Guardian has learned.
The Microsoft-owned internet chat company could potentially face criminal and administrative sanctions, including a ban on passing users’ communications covertly to the US signals intelliigence agency.
Skype itself is headquartered in the European country, and could also be fined if an investigation concludes that the data sharing is found in violation of the country’s data-protection laws.
The Guardian understands that Luxembourg’s data-protection commissioner initiated a probe into Skype’s privacy policies following revelations in June about its ties to the NSA. [Continue reading…]
The Obama administration and the press: Leak investigations and surveillance in post-9/11 America
In a report for the Committee to Protect Journalists, Leonard Downie Jr., former editor of the Washington Post, writes: In the Obama administration’s Washington, government officials are increasingly afraid to talk to the press. Those suspected of discussing with reporters anything that the government has classified as secret are subject to investigation, including lie-detector tests and scrutiny of their telephone and e-mail records. An “Insider Threat Program” being implemented in every government department requires all federal employees to help prevent unauthorized disclosures of information by monitoring the behavior of their colleagues.
Six government employees, plus two contractors including Edward Snowden, have been subjects of felony criminal prosecutions since 2009 under the 1917 Espionage Act, accused of leaking classified information to the press — compared with a total of three such prosecutions in all previous U.S. administrations. Still more criminal investigations into leaks are under way. Reporters’ phone logs and e-mails were secretly subpoenaed and seized by the Justice Department in two of the investigations, and a Fox News reporter was accused in an affidavit for one of those subpoenas of being “an aider, abettor and/or conspirator” of an indicted leak defendant, exposing him to possible prosecution for doing his job as a journalist. In another leak case, a New York Times reporter has been ordered to testify against a defendant or go to jail.
Compounding the concerns of journalists and the government officials they contact, news stories based on classified documents obtained from Snowden have revealed extensive surveillance of Americans’ telephone and e-mail traffic by the National Security Agency. Numerous Washington-based journalists told me that officials are reluctant to discuss even unclassified information with them because they fear that leak investigations and government surveillance make it more difficult for reporters to protect them as sources. “I worry now about calling somebody because the contact can be found out through a check of phone records or e-mails,” said veteran national security journalist R. Jeffrey Smith of the Center for Public Integrity, an influential nonprofit government accountability news organization in Washington. “It leaves a digital trail that makes it easier for the government to monitor those contacts,” he said.
“I think we have a real problem,” said New York Times national security reporter Scott Shane. “Most people are deterred by those leaks prosecutions. They’re scared to death. There’s a gray zone between classified and unclassified information, and most sources were in that gray zone. Sources are now afraid to enter that gray zone. It’s having a deterrent effect. If we consider aggressive press coverage of government activities being at the core of American democracy, this tips the balance heavily in favor of the government.”
At the same time, the journalists told me, designated administration spokesmen are often unresponsive or hostile to press inquiries, even when reporters have been sent to them by officials who won’t talk on their own. Despite President Barack Obama’s repeated promise that his administration would be the most open and transparent in American history, reporters and government transparency advocates said they are disappointed by its performance in improving access to the information they need.
“This is the most closed, control freak administration I’ve ever covered,” said David E. Sanger, veteran chief Washington correspondent of The New York Times.
The Obama administration has notably used social media, videos, and its own sophisticated websites to provide the public with administration-generated information about its activities, along with considerable government data useful for consumers and businesses. However, with some exceptions, such as putting the White House visitors’ logs on the whitehouse.gov website and selected declassified documents on the new U.S. Intelligence Community website, it discloses too little of the information most needed by the press and public to hold the administration accountable for its policies and actions. “Government should be transparent,” Obama stated on the White House website, as he has repeatedly in presidential directives. “Transparency promotes accountability and provides information for citizens about what their government is doing.”
But his administration’s actions have too often contradicted Obama’s stated intentions. “Instead,” New York Times public editor Margaret Sullivan wrote earlier this year, “it’s turning out to be the administration of unprecedented secrecy and unprecedented attacks on a free press.”
“President Obama had said that default should be disclosure,” Times reporter Shane told me. “The culture they’ve created is not one that favors disclosure.” [Continue reading…]
NSA reforms threatened by ‘business-as-usual brigade’, Ron Wyden warns
The Guardian reports: The Democratic senator leading congressional efforts to rein in the National Security Agency warned on Wednesday that senior intelligence and administration officials will attempt to block any meaningful change while publicly speaking the language of reform.
Ron Wyden, a member of the Senate intelligence committee, told a conference on the NSA and privacy at the Cato Institute in Washington that the reform campaign was at a pivotal moment, with the Senate and the House of Representatives to examine new surveillance legislation over the next few weeks.
But, Wyden said, the American public should not be fooled by what he called the “business-as-usual brigade” – made up of intelligence officials, their supporters in Congress, thinktanks and the media.
They will “try mightily to fog up the surveillance debate and convince Congress and the public that the real problem here is not overly intrusive, constitutionally flawed domestic surveillance, but sensationalistic media reporting”, Wyden said. “Their endgame is ensuring that any surveillance reforms are only skin deep.” [Continue reading…]
NSA’s own hardware backdoors may still be a ‘problem from hell’
MIT Technology Review: In 2011, General Michael Hayden, who had earlier been director of both the National Security Agency and the Central Intelligence Agency, described the idea of computer hardware with hidden “backdoors” planted by an enemy as “the problem from hell.” This month, news reports based on leaked documents said that the NSA itself has used that tactic, working with U.S. companies to insert secret backdoors into chips and other hardware to aid its surveillance efforts.
That revelation particularly concerned security experts because Hayden’s assessment is widely held to be true. Compromised hardware is difficult, and often impossible, to detect. Hardware can do things such as access data in ways invisible to the software on a computer, even security software. The possibility that computer hardware in use around the world might be littered with NSA backdoors raises the prospect that other nations’ agencies are doing the same thing, or that groups other than the NSA might find and exploit the NSA’s backdoors. Critics of the NSA say the untraceable nature of hardware flaws, and the potential for building them into many systems, also increases the risk that intelligence agencies that place them will be tempted to exceed legal restrictions on surveillance.
“Hardware is like a public good because everybody has to rely on it,” says Simha Sethumadhavan, an associate professor at Columbia University who researches ways to detect backdoors in computer chips. “If hardware is compromised in some way, you lose security in a very fundamental way.” [Continue reading…]
In speech to telecom industry, NSA chief criticizes coverage of surveillance
The Washington Post reports: Gen. Keith Alexander, head of the National Security Agency and the military’s Cyber Command, on Wednesday asked the telecommunications industry to help set the record straight on what he believes is a media mischaracterization of government surveillance programs.
Alexander said that the programs, first revealed in reports from The Washington Post and The Guardian, have strict oversight and are vital to preventing future terrorist attacks. In a speech at the Telecommunciations Industry Association conference, Alexander said that the revelations about surveillance programs run by the NSA have badly hurt the foundation of trust that the agency needs to do its work, and provided valuable information about the country’s security programs to the country’s enemies.
Alexander said that he agreed with public statements from the director general of of Britain’s Security Service, Andrew Parker, who said that the leaks were a “gift” for terrorists, according to reporting from The Guardian.
“I think Andrew Parker’s message is right,” Alexander said, calling media leaks “irresponsible” and saying that the leaks will cause “irreversible damage to our nation.”
He added that the leaks, have “impacted that foundation of trust that industry has with NSA, and that the NSA has with the American people.” [Continue reading…]
Video: Glenn Greenwald interviewed on Canadian television
Shadows of Stuxnet: Meltdowns hobble NSA data center
The Wall Street Journal reports: Chronic electrical surges at the massive new data-storage facility central to the National Security Agency’s spying operation have destroyed hundreds of thousands of dollars worth of machinery and delayed the center’s opening for a year, according to project documents and current and former officials.
There have been 10 meltdowns in the past 13 months that have prevented the NSA from using computers at its new Utah data-storage center, slated to be the spy agency’s largest, according to project documents reviewed by The Wall Street Journal.
One project official described the electrical troubles—so-called arc fault failures—as “a flash of lightning inside a 2-foot box.” These failures create fiery explosions, melt metal and cause circuits to fail, the official said.
The causes remain under investigation, and there is disagreement whether proposed fixes will work, according to officials and project documents. One Utah project official said the NSA planned this week to turn on some of its computers there.
NSA spokeswoman Vanee Vines acknowledged problems but said “the failures that occurred during testing have been mitigated. A project of this magnitude requires stringent management, oversight, and testing before the government accepts any building.”
The Utah facility, one of the Pentagon’s biggest U.S. construction projects, has become a symbol of the spy agency’s surveillance prowess, which gained broad attention in the wake of leaks from NSA contractor Edward Snowden. It spans more than one-million square feet, with construction costs pegged at $1.4 billion—not counting the Cray supercomputers that will reside there.
Exactly how much data the NSA will be able to store there is classified. Engineers on the project believe the capacity is bigger than Google’s largest data center. Estimates are in a range difficult to imagine but outside experts believe it will keep exabytes or zettabytes of data. An exabyte is roughly 100,000 times the size of the printed material in the Library of Congress; a zettabyte is 1,000 times larger.
But without a reliable electrical system to run computers and keep them cool, the NSA’s global surveillance data systems can’t function. The NSA chose Bluffdale, Utah, to house the data center largely because of the abundance of cheap electricity. It continuously uses 65 megawatts, which could power a small city of at least 20,000, at a cost of more than $1 million a month, according to project officials and documents. [Continue reading…]
Fact: the NSA gets negligible intel from Americans’ metadata. So end collection
Yochai Benkler writes: Congress may be on the verge of prohibiting the NSA from continuing its bulk telephony metadata collection program. Two weeks ago, the Senate national security dissenters: Wyden, Udall, Paul, and Blumenthal proposed prohibition. Last week, the move received a major boost from a bipartisan proposal by core establishment figures: Senator Patrick Leahy, and Representatives Jim Sensenbrenner and John Conyers.
It’s a prohibition whose time has come. Dragnet surveillance, or bulk collection, goes to the heart of what is wrong with the turn the NSA has taken since 2001. It implements a perpetual “state of emergency” mentality that inverts the basic model outlined by the fourth amendment: that there are vast domains of private action about which the state should remain ignorant unless it provides clear prior justification. And all public evidence suggests that, from its inception in 2001 to this day, bulk collection has never made more than a marginal contribution to securing Americans from terrorism, despite its costs.
In a 2 October hearing of the Senate judiciary committee, Senator Leahy challenged the NSA chief, General Keith Alexander:
Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and that of the 54 only 13 had some nexus to the US? Would you agree with that, yes or no?
Alexander responded:
Yes.
Leahy then demanded that Alexander confirm what his deputy, Christopher Inglis, had said in the prior week’s testimony: that there is only one example where collection of bulk data is what stopped a terrorist activity. Alexander responded that Inglis might have said two, not one.
In fact, what Inglis had said the week before was that there was one case “that comes close to a but-for example and that’s the case of Basaaly Moalin“. So, who is Moalin, on whose fate the NSA places the entire burden of justifying its metadata collection program? Did his capture foil a second 9/11?
A cabby from San Diego, Moalin had immigrated as a teenager from Somalia. In February, he was convicted of providing material assistance to a terrorist organization: he had transferred $8,500 to al-Shabaab in Somalia.
After the Westgate Mall attack in Nairobi, few would argue that al-Shabaab is not a terrorist organization. But al-Shabaab is involved in a local war, and is not invested in attacking the US homeland. The indictment against Moalin explicitly stated that al-Shabaab’s enemies were the present Somali government and “its Ethiopian and African Union supporters”. Perhaps, it makes sense for prosecutors to pursue Somali Americans for doing essentially what some Irish Americans did to help the IRA; perhaps not. But this single successful prosecution, under a vague criminal statute, which stopped a few thousand dollars from reaching one side in a local conflict in the Horn of Africa, is the sole success story for the NSA bulk domestic surveillance program. [Continue reading…]
Internet companies push for NSA data-request transparency
Time reports: The largest Internet companies in the U.S. are preparing for a showdown with the U.S. government over their campaign to be more transparent about national-security-data requests. Google, Microsoft, Facebook, Yahoo and LinkedIn have until Oct. 21 to file a brief with the Foreign Intelligence Surveillance Court (FISC) after the Department of Justice formally opposed their request to disclose statistics about the nature and scope of government requests made under the Foreign Intelligence Surveillance Act (FISA).
The impending FISC showdown comes as U.S. lawmakers are weighing two bills that would give the companies the right to publish basic statistics about the government’s national-security-data demands. Since the initial revelations about the National Security Agency’s (NSA) surveillance programs were published in June — thanks to documents leaked by former NSA contractor Edward Snowden — the tech titans have been waging a battle to be more transparent about such data requests in an effort to demonstrate that they are not serving as NSA stooges.
The companies have repeatedly argued that their inability to be more transparent with the public undermines user trust, which in turn could have adverse consequences for their businesses.
The NSA is making us all less safe
Computers are everywhere. They are now something we put our whole bodies into—airplanes, cars—and something we put into our bodies—pacemakers, cochlear implants. They HAVE to be trustworthy. — Electronic Freedom Frontier Fellow Cory Doctorow
Cindy Cohn and Trevor Timm write: Cory’s right, of course. And that’s why the recent New York Times story on the NSA’s systematic effort to weaken and sabotage commercially available encryption used by individuals and businesses around the world is so important — and not just to people who care about political organizing, journalists or whistleblowers. Thanks to additional reporting, we now know it matters deeply to companies including Brazil’s Petrobras and Belgium’s Belgacom, who are concerned about protecting their infrastructure, negotiating strategies and trade secrets. But really, it matters to all of us.
We all live in an increasingly networked world. And one of the preconditions of that world has to be basic computer security — freedom to use strong technologies that are fully trustworthy.
Every casual Internet user, whether they know it or not, uses encryption daily. It’s the “s” in https and the little lock you see in your browser — signifying a secure connection — when you purchase something online, when you’re at your bank’s website or accessing your webmail, financial records, and medical records. Cryptography security is also essential in the computers in our cars, airplanes, houses and pockets.
By weakening encryption, the NSA allows others to more easily break it. By installing backdoors and other vulnerabilities in systems, the NSA exposes them to other malicious hackers—whether they are foreign governments or criminals. As security expert Bruce Schneier explained, “It’s sheer folly to believe that only the NSA can exploit the vulnerabilities they create.” [Continue reading…]
The NSA’s struggle against Tor
The Register reports: An NSA presentation released by Edward Snowden contains mixed news for Tor users. The anonymizing service itself appears to have foxed US and UK government snoops, but instead they are using a zero-day flaw in the Firefox browser bundled with Tor to track users.
“These documents give Tor a huge pat on the back,” security guru Bruce Schneier told The Register. “If I was a Tor developer, I’d be really smiling after reading this stuff.”
The PowerPoint slide deck, prepared in June last year and entitled “Tor stinks”, details how the NSA and the UK’s Government Communications Headquarters (GCHQ) have been stymied by trying to track Tor users, thanks to the strength of the open source system.
“We will never be able to de-anonymize all Tor users all the time,” the presentation states. “With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user.”
The presentation says that both the NSA and GCHQ run Tor nodes themselves (the Brits use Amazon Web Services for this under a project entitled Newton’s Cradle), but these are only a very small number in comparison to the whole system. This makes tracking users using traditional signals-intelligence methods impossible.
There’s also a case of diminishing returns as Tor becomes more popular. With each user acting as a transport node, the sheer scale of the system means it becomes steadily more difficult for the intelligence community to run enough nodes to be useful for tracking.
Bruce Schneier reports: The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.
According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.
The NSA refers to these capabilities as CNE, or computer network exploitation.
The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the internet. This is done via the agency’s partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.
The NSA creates “fingerprints” that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see “almost everything” a target does on the internet.
Using powerful data analysis tools with codenames such as Turbulence, Turmoil and Tumult, the NSA automatically sifts through the enormous amount of internet traffic that it sees, looking for Tor connections.
Last month, Brazilian TV news show Fantastico showed screenshots of an NSA tool that had the ability to identify Tor users by monitoring internet traffic.
The very feature that makes Tor a powerful anonymity service, and the fact that all Tor users look alike on the internet, makes it easy to differentiate Tor users from other web users. On the other hand, the anonymity provided by Tor makes it impossible for the NSA to know who the user is, or whether or not the user is in the US. [Continue reading…]
Everything you need to know about the NSA and Tor in one FAQ.
Reports in The Guardian and the Washington Post, and the leaked documents: Tor: ‘The king of high-secure, low-latency anonymity’ and ‘Tor stinks’.
How Britain became the most spied on, monitored and surveilled democratic society there has ever been
John Lanchester writes: In August, the editor of the Guardian rang me up and asked if I would spend a week in New York, reading the GCHQ files whose UK copy the Guardian was forced to destroy. His suggestion was that it might be worthwhile to look at the material not from a perspective of making news but from that of a novelist with an interest in the way we live now.
I took Alan Rusbridger up on his invitation, after an initial reluctance that was based on two main reasons. The first of them was that I don’t share the instinctive sense felt by many on the left that it is always wrong for states to have secrets. I’d put it more strongly than that: democratic states need spies.
The philosopher Karl Popper, observing the second world war from his academic post in New Zealand, came up with a great title for his major work of political thought: The Open Society and Its Enemies. It is, in its way, a shocking phrase – why would the open society have enemies? (But then, the title of Charles Repington’s The First World War, published in 1920, was shocking too, because it implied that there would be another one.)
We do have enemies, though, enemies who are in deadly earnest; enemies who wish you reading this dead, whoever you are, for no other reason than that you belong to a society like this one. We have enemies who are seeking to break into our governments’ computers, with the potential to destroy our infrastructure and, literally, make the lights go out; we have enemies who want to kill as many of us, the more innocent the better, as possible, by any means possible, as a deliberate strategy; we have enemies who want to develop nuclear weapons, and thereby vastly raise the stakes for international diplomacy and the threat of terrorism; and we have common-or-garden serious criminals, who also need watching and catching.
I get all that. It doesn’t thrill me to bits that the state has to use the tools of electronic surveillance to keep us safe, but it seems clear to me that it does, and that our right to privacy needs to be qualified, just as our other rights are qualified, in the interest of general security and the common good.
My week spent reading things that were never meant to be read by outsiders was, from this point of view, largely reassuring. Most of what GCHQ does is exactly the kind of thing we all want it to do. It takes an interest in places such as the Horn of Africa, Iran, and North Korea; it takes an interest in energy security, nuclear proliferation, and in state-sponsored computer hacking.
There doesn’t seem to be much in the documents about serious crime, for which GCHQ has a surveillance mandate, but it seems that much of this activity is covered by warrants that belong to other branches of the security apparatus. Most of this surveillance is individually targeted: it concerns specific individuals and specific acts (or intentions to act), and as such, it is not the threat.
Even Julian Assange thinks that, and said as much in his alarming and perceptive book Cypherpunks: “Individual targeting is not the threat.” When the state has specific enemies and knows who they are and the kind of harm they intend, it is welcome to target them to make the rest of our polity safe. I say again, on the evidence I’ve seen, this is mainly what GCHQ does. I would add that the Guardian and its partners have gone to a lot of trouble to prevent any unnecessarily damaging detail about this work being published.
The problems with GCHQ are to be found in the margins of the material – though they are at the centre of the revelations that have been extracted from the Snowden disclosures, and with good reason. The problem and the risk comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital.
In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information “in real time”, ie immediately, from a gigantic amount of hoovered-up data.
In addition, the NSA has encouraged technology companies to install secret weaknesses or “backdoors” into their commercially available, supposedly secure products. They have spent a very great deal of money ($250m a year alone on weakening encryption), on breaking commercially available security products. Other revelations have been published in Der Spiegel, and concern the NSA exploitation of technology such as the iPhone.
What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service.
Using that “selector”, the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what’s on your mind.
To get a rough version of this knowledge, a state once had to bug phones manually, break into houses and intercept letters, and deploy teams of trained watchers to follow your whereabouts. Even then it was a rough and approximate process, vulnerable to all sorts of human error and countermeasures. It can now have something much better than that, a historically unprecedented panoply of surveillance, which it can deploy in a matter of seconds.
This process is not without supervision, of course. In order to target you via one of these “selectors” – that’s the technical term – the agent of the state will have to type into a box on his or her computer screen a Miranda number, to show that the process is taking place in response to a specific request for information, and will also need to select a justification under the Human Rights Act. That last isn’t too arduous, because the agent can choose the justification from a drop-down menu. This is the way we live now.
And yet nobody, at least in Britain, seems to care. In the UK there has been an extraordinary disconnect between the scale and seriousness of what Snowden has revealed, and the scale and seriousness of the response. One of the main reasons for that, I think, is that while some countries are interested in rights, in Britain we are more focused on wrongs. [Continue reading…]
Video: BBC Newsnight interview with Glenn Greenwald
NSA admits grossly exaggerating effectiveness of mass surveillance in thwarting terrorism
The Washington Times reports: The Obama administration’s credibility on intelligence suffered another blow Wednesday as the chief of the National Security Agency admitted that officials put out numbers that vastly overstated the counterterrorism successes of the government’s warrantless bulk collection of all Americans’ phone records.
Pressed by the Democratic chairman of the Senate Judiciary Committee at an oversight hearing, Gen. Keith B. Alexander admitted that the number of terrorist plots foiled by the NSA’s huge database of every phone call made in or to America was only one or perhaps two — far smaller than the 54 originally claimed by the administration.
Gen. Alexander and other intelligence chiefs have pleaded with lawmakers not to shut down the bulk collection of U.S. phone records despite growing unease about government overreach in the program, which was revealed in documents leaked by former NSA contractor Edward Snowden.
“There is no evidence that [bulk] phone records collection helped to thwart dozens or even several terrorist plots,” Sen. Patrick J. Leahy, Vermont Democrat and committee chairman, told Gen. Alexander of the 54 cases that administration officials — including the general himself — have cited as the fruit of the NSA’s domestic snooping.
“These weren’t all plots and they weren’t all foiled,” he said.
Mr. Leahy and Rep. F. James Sensenbrenner Jr., Wisconsin Republican and author of the USA Patriot Act, which the government says allows bulk data collection, are working on a bill to roll back that authority.
In a summary they floated to colleagues Wednesday, the men said they would end bulk collection and require the NSA to show that the data it is seeking are relevant to an authorized investigation and involve a foreign agent.
The two lawmakers also proposed a special advocacy office with appellate powers to be part of the proceedings in the secret Foreign Intelligence Surveillance Court, and requiring the court to release secret opinions that lay out major interpretations of law.
Mr. Leahy, who has been a chief critic of the NSA, asked Gen. Alexander to admit that only 13 of the 54 cases had any connection at all to the U.S., “Would you agree with that, yes or no?”
“Yes,” Gen. Alexander replied in a departure from normal practice.
Administration officials giving testimony to Congress, even when asked to confine themselves to a simple yes or no, rarely do.
In response to a follow-up question, Gen. Alexander also acknowledged that only one or perhaps two of even those 13 cases had been foiled with help from the NSA’s vast phone records database. [Continue reading…]