Category Archives: Five Eyes

NSA had test project to collect data on Americans’ cellphone locations, director says

The Washington Post reports: The National Security Agency began a test project in 2010 to collect data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value,” the agency’s director said Wednesday.

In response to questioning at a Senate hearing, Gen. Keith Alexander said that the secret effort ended in 2011 and that the data collected were never available for intelligence analysis purposes.

“This may be something that is a future requirement for the country, but it is not right now,” given that the FBI is able to gather the location of suspects’ cellphones by obtaining warrants from a court, Alexander told the Senate Judiciary Committee.

The disclosure came just a week after Alexander declined to answer whether the NSA had ever sought the authority to obtain such data. But Sen. Ron Wyden (D-Ore.), an Intelligence Committee member who has been pressing this issue for at least two years, suggested Wednesday that officials were still withholding significant information.

“After years of stonewalling on whether the government has ever tracked or planned to track the location of law abiding Americans through their cell phones, once again, the intelligence leadership has decided to leave most of the real story secret — even when the truth would not compromise national security,” Wyden said in a statement. [Continue reading…]

Facebooktwittermail

Germany asks U.S. why NSA critic was denied entry

The Associated Press reports: Germany’s Foreign Ministry says it has contacted U.S. authorities over their decision to deny a German author entry to the United States.

Ilija Trojanow says he was refused permission to board a flight from Salvador da Bahia, Brazil, to Miami on Monday without explanation. He told the Spiegel Online website that the denial of entry might be linked to his criticism of the U.S. National Security Agency.

Trojanow was one of several prominent German authors who signed an open letter to Chancellor Angela Merkel urging her to take a firm stance against the mass online surveillance allegedly conducted by the NSA.

Facebooktwittermail

Edward Snowden’s e-mail provider defied FBI demands to turn over crypto keys, documents show

Wired reports: The U.S. government in July obtained a search warrant demanding that Edward Snowden’s e-mail provider, Lavabit, turn over the private SSL keys that protected all web traffic to the site, according to to newly unsealed documents.

The July 16 order came after Texas-based Lavabit refused to circumvent its own security systems to comply with earlier orders intended to monitor a particular Lavabit user’s metadata, defined as “information about each communication sent or received by the account, including the date and time of the communication, the method of communication, and the source and destination of the communication.”

The name of the target is redacted from the unsealed records, but the offenses under investigation are listed as violations of the Espionage Act and theft of government property — the exact charges that have been filed against NSA whistleblower Snowden in the same Virginia court.

The records in the case, which is now being argued at the 4th U.S. Circuit Court of Appeals, were unsealed today by a federal judge in Alexandria, Virginia. They confirm much of what had been suspected about the conflict between the pro-privacy e-mail company and the federal government, which led to Lavabit voluntarily closing in August rather than compromise the security it promised users. [Continue reading…]

Facebooktwittermail

NSA stores metadata of millions of web users for up to a year, secret files show

The Guardian reports: The National Security Agency is storing the online metadata of millions of internet users for up to a year, regardless of whether or not they are persons of interest to the agency, top secret documents reveal.

Metadata provides a record of almost anything a user does online, from browsing history – such as map searches and websites visited – to account details, email activity, and even some account passwords. This can be used to build a detailed picture of an individual’s life.

The Obama administration has repeatedly stated that the NSA keeps only the content of messages and communications of people it is intentionally targeting – but internal documents reveal the agency retains vast amounts of metadata.

An introductory guide to digital network intelligence for NSA field agents, included in documents disclosed by former contractor Edward Snowden, describes the agency’s metadata repository, codenamed Marina. Any computer metadata picked up by NSA collection systems is routed to the Marina database, the guide explains. Phone metadata is sent to a separate system. [Continue reading…]

Facebooktwittermail

NSA gathers data on social connections of U.S. citizens

The New York Times reports: Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.

The policy shift was intended to help the agency “discover and track” connections between intelligence targets overseas and people in the United States, according to an N.S.A. memorandum from January 2011. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

N.S.A. officials declined to say how many Americans have been caught up in the effort, including people involved in no wrongdoing. The documents do not describe what has resulted from the scrutiny, which links phone numbers and e-mails in a “contact chain” tied directly or indirectly to a person or organization overseas that is of foreign intelligence interest.

The new disclosures add to the growing body of knowledge in recent months about the N.S.A.’s access to and use of private information concerning Americans, prompting lawmakers in Washington to call for reining in the agency and President Obama to order an examination of its surveillance policies. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate. As far back as 2006, a Justice Department memo warned of the potential for the “misuse” of such information without adequate safeguards. [Continue reading…]

Facebooktwittermail

Senators push to preserve NSA phone surveillance

The New York Times reports: The Senate Intelligence Committee appears to be moving toward swift passage of a bill that would “change but preserve” the once-secret National Security Agency program that is keeping logs of every American’s phone calls, Senator Dianne Feinstein, the California Democrat who leads the panel, said Thursday.

Ms. Feinstein, speaking at a rare public hearing of the committee, said she and the top Republican on the panel, Senator Saxby Chambliss of Georgia, are drafting a bill that would be marked up — meaning that lawmakers could propose amendments to it before voting it out of committee — as early as next week.

After the existence of the program became public by leaks from the former N.S.A. contractor Edward J. Snowden, critics called for it to be dismantled. Ms. Feinstein said her bill would be aimed at increasing public confidence in the program, which she said she believed was lawful.

The measure would require public reports of how often the N.S.A. had used the calling log database, she said. It would also reduce the number of years — currently five — that the domestic calling log data is kept before it is deleted. It would also require the N.S.A. to send lists of the phone numbers it searches, and its rationale for doing so, to the Foreign Intelligence Surveillance Court for review.

By contrast, a rival bill drafted by skeptics of government surveillance, including two members of the committee, Senators Ron Wyden of Oregon and Mark Udall of Colorado, would ban the mass call log collection program. [Continue reading…]

Facebooktwittermail

To reform the NSA, fire officials who lie

James Goodale writes: The NSA has lied to the Congress, the courts, and perhaps even to the president himself, but no one seems to care.

The Director of National Intelligence James R Clapper admitted he lied to Congress about the NSA metadata collection program. He said the NSA had no such program – and then added that that was the least “untruthful” remark he could make. General Keith Alexander, director of the National Security Agency, lied in 2012 that the NSA does not hold data on US citizens, and repeated similar misstatements, under oath, to Congress about the program:

We’re not authorized to do it [data collection on US citizens], nor do we do it.

NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.

But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week. [Continue reading…]

Facebooktwittermail

Europe really, really doesn’t trust the NSA

Pacific Standard reports: A few days ago the European Parliament’s Office of Citizens’ Rights and Constitutional Affairs released a notably pointed briefing paper arguing for Europe to stop trusting American Internet services. The briefing and the committee are the latest forum to suggest that European states create domestic cloud computing capacities to provide member states legal protection for NSA data surveillance. The report has the not-at-all-subtle title “The US National Security Agency Surveillance Programmes (PRISM) Foreign Intelligence Surveillance (FISA) Activities and Their Impact on EU Citizens’ Fundamental Rights.” Among the findings:

Prominent notices should be displayed by every US web site offering services in the EU to inform consent to collect data from EU citizens. The users should be made aware that the data may be subject to surveillance (under FISA 702) by the US government for any purpose which furthers US foreign policy.

The argument there being that people will have an incentive to find other websites to use. Particularly for e-commerce. Companies like Amazon, and U.S. airlines and ticketing agencies—Expedia and the like—won’t be pleased, and that in turn will create economic pressure to alter surveillance strategy, the report argues.

A consent requirement will raise EU citizen awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact on US business and increase pressure on the US government to reach a settlement.

That isn’t all. The report argues for the European Union to simply swear off U.S.-based cloud computing, and to develop local capacity. [Continue reading…]

Facebooktwittermail

Brazil speech at U.N. lashes out at U.S. spy program

The Associated Press reports: Brazil’s president delivered a stinging rebuke Tuesday to the United States over its surveillance program that has swept up data from billions of telephone calls and emails that have passed through Brazil —including her own.

Addressing the U.N. General Assembly on the first day of its annual meeting, President Dilma Rousseff accused the U.S. of violating Brazil’s sovereignty with what she called a “grave violation of human rights and of civil liberties.”

“In the absence of the respect for sovereignty, there is no basis for the relationship among nations,” Rousseff said. “Friendly governments and societies that seek to build a true strategic partnership, as in our case, cannot allow recurring illegal actions to take place as if they were normal. They are unacceptable.”

Last week, she shelved an upcoming state trip to the U.S. in a show of anger over the U.S. National Security Agency program.

Brazil is an important hub for trans-Atlantic fiber optic cables. The NSA, tasked with intercepting potential terror communications, also reportedly hacked into the computer network of state-run oil company Petrobras.

Rousseff said the NSA also collected economic and strategic corporate data, as well as messages by Brazilian diplomats, including to the United Nations, and from her own office. [Continue reading…]

Facebooktwittermail

Bruce Schneier: NSA spying is making us less safe

Bruce Schneier, a cryptographer and author on security topics, is now helping The Guardian sift through documents leaked by Edward Snowden. He talked to MIT Technology Review about what he is learning.

MIT Technology Review: Taken together, what do all of the Snowden documents leaked thus far reveal that we didn’t know already?

Bruce Schneier: Those of us in the security community who watch the NSA had made assumptions along the lines of what Snowden revealed. But there was scant evidence and no proof. What these leaks reveal is how robust NSA surveillance is, how pervasive it is, and to what degree the NSA has commandeered the entire Internet and turned it into a surveillance platform.

We are seeing the NSA collecting data from all of the cloud providers we use: Google and Facebook and Apple and Yahoo, etc. We see the NSA in partnerships with all the major telcos in the U.S., and many others around the world, to collect data on the backbone. We see the NSA deliberately subverting cryptography, through secret agreements with vendors, to make security systems less effective. The scope and scale are enormous.

The only analogy I can give is that it’s like death. We all know how the story ends. But seeing the actual details, and seeing the actual programs, is very different than knowing it theoretically.

The NSA mission is national security. How is the snooping really affecting the average person?

The NSA’s actions are making us all less safe. They’re not just spying on the bad guys, they’re deliberately weakening Internet security for everyone—including the good guys. It’s sheer folly to believe that only the NSA can exploit the vulnerabilities they create. Additionally, by eavesdropping on all Americans, they’re building the technical infrastructure for a police state.

We’re not there yet, but already we’ve learned that both the DEA and the IRS use NSA surveillance data in prosecutions and then lie about it in court. Power without accountability or oversight is dangerous to society at a very fundamental level. [Continue reading…]

Facebooktwittermail

How the NSA is damaging the American economy

Network World reports: The spectacle of National Security Agency contractor Edward Snowden exposing the covert spying nature of US federal officials has sent ripple waves through the technology industry — especially in the outsourcing arena.

Experts predict the NSA fiasco could result in the loss of business for some hosting vendors, but it’s hard to say exactly what the impact has been or will be.

The head of a European cloud computing provider said recently though that he’s seen a “measurable impact” from companies looking to use its services to escape what they fear could be the prying eyes of the US NSA.

“It has not been a profound surge, but there is definitely a measureable impact,” says Robert Jenkins, co-founder and CTO of Cloud Sigma, which is headquartered in Switzerland and has data centers across Europe and the United States. “We’ve definitely seen cases where people are turning to us because of this.”

Forrester analyst and cloud tracker James Staten predicted this could happen in a blog post in the summer. Information Technology & Innovation Foundation (ITIF) estimated in a report that the US cloud computing market could stand to lose up to $35 billion by 2016 because of vendors bypassing US providers and looking to overseas competitors. Staten says that’s the low end of an estimate though. [Continue reading…]

Facebooktwittermail

In secret, Fisa court contradicted U.S. supreme court on constitutional rights

Yochai Benkler writes: On Tuesday, the Foreign Intelligence Surveillance Court (FISC) declassified an opinion in which it explained why the government’s collection of records of all Americans’ phone calls is constitutional, and that if there is a problem with the program, it is a matter of political judgment, not constitutional law. So, should Americans just keep calm and carry on phoning? Not really.

Instead, we should worry about a court that, lacking a real adversarial process to inform it, failed while taking its best shot at explaining its position to the public to address the most basic, widely-known counter-argument to its position. The opinion does not even mention last year’s unanimous US supreme court decision on the fourth amendment and GPS tracking, a decision in which all three opinions include strong language that may render the NSA’s phone records collection program unconstitutional. No court that had been briefed by both sides would have ignored the grave constitutional issues raised by the three opinions of Justices Scalia, Sotomayor, and Alito in United States v Jones. And no opinion that fails to consider these should calm anyone down.

The newly-released FISC opinion, the first to opine on the legality of the phone metadata collection program since the Snowden leaks brought the program to national attention, is based on two straightforward points.

First, in 1979, the supreme court held in Smith v Maryland that using “pen registers” that record what number called what other number, when, and for how long, did not violate the fourth amendment. The court in Smith reasoned that individuals have no expectation of privacy in information they knowingly hand over to the phone company. The FISC reasoned that even though the NSA metadata program collected more information than the program the supreme court upheld 35 years ago, the details did not make a constitutional difference. Individuals have no fourth amendment rights in their phone call metadata.

The second component of the FISC argument was that “grouping together a large number of individuals”, no single one of whom has “a fourth amendment interest”, “cannot result in a fourth amendment interest springing into existence ex nihilo”. Adding up many zeros doesn’t create a positive value; bulk collection of unprotected materials over a sustained period of years raises no special constitutional considerations.

Standing on its own, this logic may seem persuasive. But only until you think about how last year’s Jones decision by the supreme court destabilizes this logic. [Continue reading…]

Facebooktwittermail

Close the NSA’s back doors

An editorial in the New York Times says: In 2006, a federal agency, the National Institute of Standards and Technology, helped build an international encryption system to help countries and industries fend off computer hacking and theft. Unbeknown to the many users of the system, a different government arm, the National Security Agency, secretly inserted a “back door” into the system that allowed federal spies to crack open any data that was encoded using its technology.

Documents leaked by Edward Snowden, the former N.S.A. contractor, make clear that the agency has never met an encryption system that it has not tried to penetrate. And it frequently tries to take the easy way out. Because modern cryptography can be so hard to break, even using the brute force of the agency’s powerful supercomputers, the agency prefers to collaborate with big software companies and cipher authors, getting hidden access built right into their systems.

The New York Times, The Guardian and ProPublica recently reported that the agency now has access to the codes that protect commerce and banking systems, trade secrets and medical records, and everyone’s e-mail and Internet chat messages, including virtual private networks. In some cases, the agency pressured companies to give it access; as The Guardian reported earlier this year, Microsoft provided access to Hotmail, Outlook.com, SkyDrive and Skype. According to some of the Snowden documents given to Der Spiegel, the N.S.A. also has access to the encryption protecting data on iPhones, Android and BlackBerry phones.

These back doors and special access routes are a terrible idea, another example of the intelligence community’s overreach. Companies and individuals are increasingly putting their most confidential data on cloud storage services, and need to rely on assurances their data will be secure. Knowing that encryption has been deliberately weakened will undermine confidence in these systems and interfere with commerce.

The back doors also strip away the expectations of privacy that individuals, businesses and governments have in ordinary communications. If back doors are built into systems by the N.S.A., who is to say that other countries’ spy agencies — or hackers, pirates and terrorists — won’t discover and exploit them?

The government can get a warrant and break into the communications or data of any individual or company suspected of breaking the law. But crippling everyone’s ability to use encryption is going too far, just as the N.S.A. has exceeded its boundaries in collecting everyone’s phone records rather than limiting its focus to actual suspects.

Representative Rush Holt, Democrat of New Jersey, has introduced a bill that would, among other provisions, bar the government from requiring software makers to insert built-in ways to bypass encryption. It deserves full Congressional support. In the meantime, several Internet companies, including Google and Facebook, are building encryption systems that will be much more difficult for the N.S.A. to penetrate, forced to assure their customers that they are not a secret partner with the dark side of their own government.

Facebooktwittermail

Edward Snowden has started a global debate. So why the silence in Britain?

Simon Jenkins writes: The Brazilian president cancels a state visit to Washington. The German justice minister talks of “a Hollywood nightmare“. His chancellor, Angela Merkel, ponders offering Edward Snowden asylum. The EU may even end the “safe harbour” directive which would force US-based computer servers to relocate to European regulation. Russians and Chinese, so often accused of cyber-espionage, hop with glee.

In response, an embarrassed Barack Obama pleads for debate and a review of the Patriot Acts. Al Gore refers to the Snowden revelations as “obscenely outrageous“. The rightwing John McCain declares a review “entirely appropriate“. The Senate holds public hearings and summons security chiefs, who squirm like mafia bosses on the run. America’s once dominant internet giants, with 80% of the globe under their sway, now face “Balkanised” regulation round the world as nation states seek to repatriate digital sovereignty.

And in Britain? Nothing. From parliament, the courts, and most of the media, nothing. Snowden, the most significant whistleblower of modern times, briefly amused London when he turned scarlet pimpernel in the summer; then the capital was intrigued when David Miranda was seized by Heathrow police on bogus “terrorism” charges. But the British establishment cannot get excited. It hates whistleblowers, regarding them as not proper chaps. [Continue reading…]

Facebooktwittermail

Brazil looks to break from U.S.-centric Internet

Phys.org: Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward fracturing a global network built with minimal interference by governments.

President Dilma Rousseff ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the U.S. National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to U.S. tech companies such as Facebook and Google.

The leader is so angered by the espionage that on Tuesday she postponed next month’s scheduled trip to Washington, where she was to be honored with a state dinner.

Internet security and policy experts say the Brazilian government’s reaction to information leaked by former NSA contractor Edward Snowden is understandable, but warn it could set the Internet on a course of Balkanization.

“The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.”

While Brazil isn’t proposing to bar its citizens from U.S.-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ Internet use to protect them from NSA snooping.

The danger of mandating that kind of geographic isolation, Meinrath said, is that it could render inoperable popular software applications and services and endanger the Internet’s open, interconnected structure. [Continue reading…]

Facebooktwittermail

Fisa court: no telecoms company has ever challenged phone records orders

The Guardian reports: No telecommunications company has ever challenged the secretive Foreign Intelligence Surveillance court’s orders for bulk phone records under the Patriot Act, the court revealed on Tuesday.

The secretive Fisa court’s disclosure came inside a declassification of its legal reasoning justifying the National Security Agency’s ongoing bulk collection of Americans’ phone records.

Citing the “unprecedented disclosures” and the “ongoing public interest in this program”, Judge Claire V Eagan on 29 August not only approved the Obama administration’s request for the bulk collection of data from an unidentified telecommunications firm, but ordered it declassified. Eagan wrote that despite the “lower threshold” for government bulk surveillance under Section 215 of the Patriot Act compared to other laws, the telephone companies who have received Fisa court orders for mass customer data have not challenged the law.

“To date, no holder of records who has received an Order to produce bulk telephony metadata has challenged the legality of such an Order,” Eagan wrote. “Indeed, no recipient of any Section 215 Order has challenged the legality of such an order, despite the mechanism for doing so.”

That complicity has not been total. Before the Bush administration moved the bulk phone records collection under the authority of the Fisa court, around 2006, Qwest Communications refused to participate in the effort. [Continue reading…]

Facebooktwittermail

‘Follow the Money’: NSA spies on international payments

Der Spiegel reports: The United States’ NSA intelligence agency is interested in international payments processed by companies including Visa, SPIEGEL has learned. It has even set up its own financial database to track money flows through a “tailored access operations” division.

The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL.

The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called “Follow the Money” (FTM). The collected information then flows into the NSA’s own financial databank, called “Tracfin,” which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions.

Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company’s complex transaction network for tapping possibilities.

Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to “collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions.” In response to a SPIEGEL inquiry, however, a VISA spokeswoman ruled out the possibility that data could be taken from company-run networks.

The NSA’s Tracfin data bank also contained data from the Brussels-based Society for Worldwide Interbank Financial Telecommunication (SWIFT), a network used by thousands of banks to send transaction information securely. SWIFT was named as a “target,” according to the documents, which also show that the NSA spied on the organization on several levels, involving, among others, the agency’s “tailored access operations” division. One of the ways the agency accessed the data included reading “SWIFT printer traffic from numerous banks,” the documents show. [Continue reading…]

Facebooktwittermail

Time to tame the NSA behemoth trampling our rights

Yochai Benkler writes: The spate of new NSA disclosures substantially raises the stakes of this debate. We now know that the intelligence establishment systematically undermines oversight by lying to both Congress and the courts. We know that the NSA infiltrates internet standard-setting processes to security protocols that make surveillance harder. We know that the NSA uses persuasion, subterfuge, and legal coercion to distort software and hardware product design by commercial companies.

We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted a systematic campaign against the foundations of American power: constitutional checks and balances, technological leadership, and market entrepreneurship. The NSA scandal is no longer about privacy, or a particular violation of constitutional or legislative obligations. The American body politic is suffering a severe case of auto-immune disease: our defense system is attacking other critical systems of our body.

First, the lying. The National Intelligence University, based in Washington, DC, offers a certificate program called the denial and deception advanced studies program. That’s not a farcical sci-fi dystopia; it’s a real program about countering denial and deception by other countries. The repeated misrepresentations suggest that the intelligence establishment has come to see its civilian bosses as adversaries to be managed through denial and deception. [Continue reading…]

Facebooktwittermail