Category Archives: Five Eyes

NSA pays £100m in secret funding for GCHQ. Is Britain now getting paid to do America’s dirty work?

The Guardian reports: The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain’s intelligence gathering programmes.

The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. “GCHQ must pull its weight and be seen to pull its weight,” a GCHQ strategy briefing said.

The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK’s biggest and most important intelligence agency, and whether Britain’s dependency on the NSA has become too great.

In one revealing document from 2010, GCHQ acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”. It said GCHQ “still remains short of the full NSA ask”.

Ministers have denied that GCHQ does the NSA’s “dirty work”, but in the documents GCHQ describes Britain’s surveillance laws and regulatory regime as a “selling point” for the Americans.

The papers are the latest to emerge from the cache leaked by the American whistleblower Edward Snowden, the former NSA contractor who has railed at the reach of the US and UK intelligence agencies. [Continue reading…]

Nick Hopkins writes: The influence the NSA has over GCHQ seems considerable. Whether this is down to the money, or the pressure a senior partner in a relationship can bring to bear, is not entirely clear.

Common sense suggests it’s a mixture of the two. What is clear is this: the Snowden files are littered with remarks from GCHQ senior and middle managers worrying about the NSA “ask” and whether the British agency is doing enough to meet it.

One budget report states GCHQ will spend money according to NSA and UK government requirements – in that order. Does GCHQ feel compromised by this? If it does, it seems the imperative of keeping close to the Americans is overriding. That appears to be the view of the Cabinet Office too.

Asked about the NSA payments, the American demands and the concerns that the UK might be vulnerable to being pushed about, the Cabinet Office said: “In a 60-year close alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

It may be entirely unsurprising in Whitehall that our subservience has been institutionalised in this way, but everyone else is entitled to ask whether that makes it healthy or right.

People are also entitled to ponder whether the price of keeping the Americans so close might involve undertaking some of their “dirty work” – developing intelligence-gathering techniques that are beyond the US legislative and judicial framework, but can be accommodated within ours. [Continue reading…]

Facebooktwittermail

When Snowden informs the public, it’s espionage; when Clapper reveals same information, it’s a ‘public service’

Tim Cushing writes: Perhaps spurred on by the success of the Snowden leaks, the NSA has made its own “me too” effort and declassified a few documents ahead of Senate Judiciary Committee hearing dealing with bulk records collection and FISA oversight.

Given the choice, I’m sure we’d all rather read the unredacted versions of these documents, like those supplied by Ed Snowden, but all the same, it’s refreshing to see an intelligence agency being forced into some minimal transparency.

What the NSA revealed isn’t necessarily a surprise, but there are a few (perhaps unintentional) aspects of the declassified documents that are worth noting.

The first notable aspect, one that simply can’t be ignored, is the statement from James Clapper’s office that accompanied the unveiling.

A statement issued by Clapper’s office said he “has determined that the release of these documents is in the public interest.”

So, when Clapper releases documents, it’s in the “public’s interest.” When Snowden does it, it’s espionage that does “grave and serious damage to national security.”

Granted, the NSA’s releases are heavily redacted (for security!), but if all that’s being sought is so-called “business records/metadata” that have no expectation of privacy, what difference does it make who breaks the news and how much they expose? It’s all above board and, according to the DNI’s general counsel, everyone affected already knows they have no “expectation of privacy” in terms of the data collected. If we follow that logic, there’s no reason these documents should ever have been classified. After all, it’s pretty much the NSA/FBI equivalent of a FOIA request — all public records, all available without a warrant. [Continue reading…]

Facebooktwittermail

The ECHELON trail — Part Four: The Omega Foundation

By Steve Wright

(The first part in this series can be read here, second part here, third part here, and an introduction to the series here.)

The Omega Foundation

It was a long time before I could create the requisite networks of solidarity and understanding, moving to Manchester in 1981 to return to my roots after the riots of the summer when I published a full page article in the Guardian about the hard military policing style which was on the horizon. Oftentimes I felt like a sorcer’s apprentice but in 1984 I succeeded in my application to become Head of Manchester City Council’s Police Monitoring Unit. This provided a firm grounding in politics as ‘the art of the possible’ as well as providing ample opportunities to re-examine police accountability. It also brought me back into contact with Tony Bunyan who had been a central figure in the ABC Defence Committee and a solid source of insight and support during those difficult times. Tony was now the head of London’s Police Monitoring Committee with an awesome remit. He was and is a great teacher on how even small group in civil society can make a political change.

In 1989, after the demise of the Police monitoring initiatives in the UK as the leftwing Labour City Hall Council’s which had originally financed them, lost ground to the Labour political right, I went on to work a trusted friend to set up the Omega Foundation, to track the proliferation of military, police and security equipment to the torturing states.

Scientific And Technological Options Assessment (Stoa) And An Appraisal Of The Technology Of Political Control

In 1996, the Omega Foundation was commissioned by the European Parliament to write ‘An Appraisal of the Technologies of Political Control.’ Late in the day, I decided that maybe the time was right to raise the issue of the interception of communications. Duncan Campbell had returned to the subject in 19881 and recently that work had been extended by the New Zealander Nicky Hager in his book Secret Power.2 It was complete serendipity since I accidentally came across adverts for the book in Washington whilst visiting Terry Allen, then editor of Covert Action Quarterly.

It raised important issues about political control of a system which could technologically bypass any constitutional guarantees any state had protecting citizens from illegal surveillance. Its existence went beyond just privacy, a global network of surveillance which could target financial and political institutions was an instrument for political management: ubiquitous but invisible.

I also wanted to include new work on the FBI’s collusion with EC authorities to get more intimate access to European telecommunications for policing purposes. Tony Bunyan had hundreds of documents on this but in the winter of 1996 had yet to write them up. I inadvertently gate crashed the Statewatch staff Christmas party and in an expansive mood, Tony Bunyan agreed to publish his findings in the next issue of Statewatch. I could then quote his report as an authoritative source in the report I was writing for the European parliament’s Science & Technological Options Panel, which was deadlined for March 1997. However, it did not go to committee until December 1997 and would have been largely ignored had it not been for a Daily Telegraph article by Simon Davies which alerted the international media.

ECHELON Exposed

The section dealing with ECHELON in the STOA report only ran to a few pages. The paragraph which drew most attention concluded:

Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London, then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed for primarily non-military targets: governments, organisations and businesses in virtually every country. The ECHELON system works by indiscriminately intercepting very large quantities of communications then siphoning out what is valuable using artificial intelligence aids like Memex to find key words. Whilst there is much information gathered about potential terrorists, there is a lot of economic intelligence, notably intensive monitoring of all the countries participating in the GATT negotiations. With no system of accountability, it is difficult to discover what criteria determine who is not a target.

Nothing in the STOA report was new but its packaging in a formal report for the European Parliament led to a ‘tipping point’. Interest in ECHELON mushroomed and all the European Member States had parliamentary debates about it. In September 1998, I was asked to produce an edited study updating the earlier report and included calls for a series of new studies to determine the level and extent of ECHELON’s activities. Of these, Duncan Campbell’s Interception Capabilities 2000 was the most informative and helped to redefine our knowledge of the role, function and activities of ECHELON.3

These reports laid the foundation of the European Parliament’s temporary ECHELON Committee, which created some of the best most informed organised knowledge on the existence of ECHELON, its activities and limitations.4 Almost every serious newspaper in the world has now covered ECHELON. Why? Because one package of organised knowledge, put together in a serious format was able to catalyse subsequent interest. Nevertheless, that package in itself was the fruit of scores of other researchers’ activities, not least, the courageous Menwith Hill Women’s camp activists who gleaned much of the secret documentation on which Duncan Campbell based his studies. The documents were ‘liberated’ via the time honoured research methodology of ‘bin-ology’ – the illegal raiding of bins and plastic rubbish bags inside the base.

Conclusion

The moral of the ECHELON story is that a network of researchers can both model, reinterpret, understand and politically challenge even awesomely funded and politically sensitive surveillance organisations such as the NSA (although I might admit to having second thoughts if I had seen the Gene Hackman movie ‘Enemy of the State’ before I wrote the STOA report.) Even at that juncture, the early reception of the European Parliament was hostile in some quarters with questions about whether ECHELON even existed.

However, the STOA report contained detailed recommendations for further work on understanding new surveillance technologies and their political impact including the commissioning of new work on ECHELON. It was no coincidence that on my recommendation, the author of the key final document proving ECHELON’s role was Duncan Campbell, the original ECHELON researcher and ABC defendant. His report, to STOA, Interception Capabilities 2000 remains one of the clearest expositions on the way that ECHELON works as well as a healthy self-critique of some of the assumptions made including the capacity of the NSA to do continuous real time speech recognition, authentication and direct printout. There were limits but these were burgeoning new research areas too. These reports provoked an intense debate in the European Parliament and the setting up of a Temporary ECHELON Committee5 There is now a rich literature on ECHELON which stretches way beyond what any one researcher could have accomplished. The more important sites are available via Surveillance and Society home pages. How was that paradigm shift achieved? Essentially by a network of researchers working on a variety of different jigsaw puzzle pieces – with one researcher injecting these findings into an appropriate political arena, at the right time.

Has the debate continued? Well yes and no. Immediately after the terrorist attacks on New York in 2001, I requested the STOA committee investigate the political implications of the failure of ECHELON to pre-empt the attack on the basis that such a highly invasive intelligence set up could only justify its existence if it was a prophylactic entity preventing such atrocities before they happened. STOA did commission the report but to its own chosen think-tank. There was not going to be any deeply critical NGO questioning of the role and functioning of sensitive intelligence agencies this time.

After 9/11, the debate rumbles on and many are beginning to fear that in the future such collaborative research will be thwarted by bogus security requirements and restrictions. Research scholars have to take the long view, assemble their findings and grow the supportive networks necessary for sustaining their effective work in the future. To quote my former supervisor, Paul Smoker – every major change requires a happener – and if it has happened – it’s possible! It would be good to see these pages being used to explore the new role of ECHELON post 9/11. At a time when the newly joined former Eastern European states are being used for ‘rendering’ a.k.a. torturing political detainees, we might anticipate that ECHELON is being offered to many more policing and foreign intelligence agencies in the so called ‘War Against Terror’. It is fairly probable that new algorithms for tracking down friendship networks and associates have emerged, based on what could well be dodgy social science assumptions of ‘proximity equals collusion’. How can we locate the new ECHELON in the new world order? In the surveillance world, ECHELON and the NSA are the equivalent of the 900 lb gorilla. It is a challenge that future surveillance scholars will have to face.

1. Campbell, D. 1988 They’ve got it taped, New Statesman, 12 August.

2. Hager, N. (1996) Secret Power: New Zealand’s Role in the International Spy Network, Craig Potton Publishing, PO Box 555, Nelson, New Zealand.

3. See http://www.iptvreports.mcmail.com/ic2kreport.htm accessed December 2005

4. For the final report see http://cryptome.org/ECHELON-ep-fin.htm accessed December 2005

5. A full copy of interception capability 2000 can be found at http://www.iptvreports.mcmail.com/interception_capabilities_2000.htm accessed December 2005

References

Campbell, D. (1988) They’ve got it taped, New Statesman, 12 August.

Hager, N. (1996) Secret Power: New Zealand’s Role in the International Spy Network Nelson, New Zealand: Craig Potton Publishing

Inglis, B. (1986) The Hidden Power London: Jonathon Cape Laurie, P. (1970) Beneath the City Streets, Harmondsworth: Penguin

Lawrence, B. (1977) Nasty Branch hit Bailrigg, Scan 1, 26 April: 1

Snow, C.P. (1959) The Two Cultures and the Scientific Revolution, Cambridge: Cambridge University Press

Wood, D. (2001) The Hidden Geography of Transnational Surveillance, Unpublished PhD thesis, University of Newcastle upon Tyne, UK. http://www.staff.ncl.ac.uk/d.f.j.wood/thesis.htm [Accessed 01/12/05]

(This article originally appeared in Surveillance & Society 3 (2/3) and is republished here with the permission of the author.)

Facebooktwittermail

Obama presents Boston bombings as an NSA success story

Mike Masnick writes: Huffington Post has an article about how President Obama is meeting with many of the biggest Congressional critics of the NSA surveillance programs to discuss their concerns. However, on Wednesday he also met with larger groups in the House and Senate, where he continued to stand behind the programs. At the very bottom of the article is this stunning tidbit:

Obama reiterated his call for a “balance” between privacy and national security, but also invoked the Boston Marathon bombings as an example of where data collected by the NSA helped “identify whether there was a great plot.”

Right. So, after there was a bombing which no intelligence agency spotted beforehand, he’s now claiming that the NSA got to jump into action to find out that there wouldn’t be any more bombings because there was no bigger plot. We’re not even in the silly debunked realm of “preventing terrorist events” anymore. Now we’re at “Great work everyone! We found out that there’s no larger plot to worry about — sorry about the explosions and related mess.”

Facebooktwittermail

Black Hat doesn’t welcome NSA ‘bullshit’

Andy Greenberg: When NSA Director Keith Alexander appeared at the Las Vegas security conference Black Hat Wednesday morning, he hoped to mend the NSA’s reputation in the eyes of thousands of the conference’s hackers and security professionals. It didn’t go exactly as planned.

Alexander was about a half hour into his talk when a 30-year-old security consultant named Jon McCoy shouted “Freedom!”

“Exactly,” responded Alexander. “We stand for freedom.”

“Bullshit!” McCoy shouted.

“Not bad,” Alexander said, as applause broke out in the crowd. “But I think what you’re saying is that in these cases, what’s the distinction, where’s the discussion and what tools do we have to stop this.”

“No, I’m saying I don’t trust you!” shouted McCoy.

“You lied to Congress. Why would people believe you’re not lying to us right now?” another voice in the crowd added.

“I haven’t lied to Congress,” Alexander responded, visibly tensing. “I do think it’s important for us to have this discussion. Because in my opinion, what you believe is what’s written in the press without looking at the facts. This is the greatest technical center of gravity in the world. I ask that you all look at those facts.”

Facebooktwittermail

What is XKEYSCORE?

Marc Ambinder writes: XKEYSCORE is not a thing that DOES collecting; it’s a series of user interfaces, backend databases, servers and software that selects certain types of metadata that the NSA has ALREADY collected using other methods. XKEYSCORE, as D.B. Grady and I reported in our book, is the worldwide base level database for such metadata. XKEYSCORE is useful because it gets the “front end full take feeds” from the various NSA collection points around the world and importantly, knows what to do with it to make it responsive to search queries. As the presentation says, the stuff itself is collected by some entity called F6 and something else called FORNSAT and then something with the acronym SSO.

Deciphered, F6 means a Special Collection Service site located in a U.S. embassy or consulate overseas. The stuff is shunted by these sites to the SCS’s headquarters in Beltsville, Maryland, because the F6 sites are located in countries where it would be impossible to use regular telephonic or fiber optic cables to send it back to HQ. I should probably refrain from being more specific. FORNSAT simply means “foreign satellite collection,” which refers to NSA tapping into satellites that process data used by other countries. And SSO — Special Source Operations — refers to the branch of NSA’s Signals Intelligence Division that taps cables, finds microwave paths, and otherwise collects data not generated by F6 or foreign satellites. Basically, everything else. The presentation [published by The Guardian] suggests that the NSA collects internet traffic from 150 sites — specific facilities — worldwide.

Much of the presentation instructs analysts to query their targets carefully because there’s so much stuff that the NSA can’t even retain it all. I should amend that sentence to add that there are so many different types of data, too, that asking for “all the Internet traffic associated with Pakistan” is going to blow some circuits. Fortunately, the program is set up to allow analysts to look at slices of data that XKEYSCORE has structured. If the NSA needs to figure out the new virtual private networks that the Haqqani network is using in Pakistan, an analyst can task XKEYSCORE to provide it with a list of VPNs that the collection systems have picked up within a particular timeframe. The analyst will then use other databases and tools to figure out where and when the VPN came online, who might be using it, and what subset of other internet data he or she needs to see. [Continue reading…]

Facebooktwittermail

Russia grants Snowden one year asylum

The New York Times reports: After a month holed up in the transit zone of Moscow’s Sheremetyevo airport, Edward J. Snowden, the former intelligence contractor wanted by the United States for leaking details of surveillance programs, has received temporary refugee status in Russia and left the airport, his lawyer said Thursday.

The movement from the airport’s international transit zone marked a significant change in Mr. Snowden’s status for the first time since he left the United States and began leaking details of the National Security Agency’s surveillance.

The refugee status in Russia marks the first formal support from another government for Mr. Snowden, 30, and seems likely to elicit strong objections from the United States.

The temporary refugee status allows Mr. Snowden to move freely within the country and is valid for one year, Anatoly Kucherena, a Russian lawyer assisting Mr. Snowden with the asylum request, said in a telephone interview.

Facebooktwittermail

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

Glenn Greenwald reports: A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. [Continue reading…]

The complete XKeyscore Power Point presentation can be viewed here.

Facebooktwittermail

The ECHELON trail — Part Three: The Special Branch raid on Lancaster University

By Steve Wright

(The first part in this series can be read here, second part here, and an introduction to the series here.)

The Special Branch Raid On Lancaster University

Not all knowledge is from rational sources. Even the term paranoia literally means ‘beyond knowledge (para: beyond; noia: knowledge). On the night of 5th April 1977 I had a stormy, seemingly pointless argument with my wife. In frustration I declared that my wife didn’t understand the work in which I was engaged and ‘one day my work would walk through the front door.’ The instant response, quite deservedly, was ‘you’re being melodramatic – I’m going to bed!’ I reflected on this afterwards thinking it was a bit melodramatic and that I was making needless emotional waves.

A few hours later loud knocks on the door heralded the arrival of six Special Branch officers who make it clear that they wanted co-operation otherwise they will use ‘blatant search techniques’. This implied that not only would they turn the place over but that the search would become very obvious to the neighbours. Without the argument of the night before, I might have caved in. Because of it and a silly sense of ‘I told you so’ I calmly suggested that what they were doing infringed academic freedom and was unprecedented. This episode of déjà vu was so well documented in the light of subsequent events, Brian Inglis used it in his book, the Hidden Power. The lesson here is whilst one should never give way to paranoia, it is useful to develop and trust your intuition. Our minds are capable of intuitive leaps which are ours to use even if we can not necessarily rationally explain them and the history of science is full of such episodes. Our challenge is to use hunches as a methodology to conjecture with or refute.

In fact my then neighbours were so alarmed by the presence of six burly strangers strolling around our house they called the local police! The officer knocked on our door and was given short shrift by Detective Chief Inspector Moffat of Scotland Yard, who told him, ‘It’s official so piss off’. I queried what it was that I was alleged to have done and the Kafkaesque atmosphere was heightened by the response that it is an official secret and I cannot be told. In the meantime, my diaries and entire research correspondence were removed. I discovered later that the police don’t steal, the technical term is detinue – i.e. they hold on to items longer than they should, a matter which can be devastating if a researcher is working to pre-set deadlines.

In this heavy atmosphere of confrontation with secret police officers, it would have been easy to roll over but I felt it was important to stand up to their infringement of my rights to research. How was another matter. I could easily see how my academic future could be blown out of the water if a full secrets trial resulted from what was to all intents and purposes a fishing expedition.

I was taken by car to Lancaster University. It was the Easter holiday period and the special branch officers expected ‘that a bit of arm twisting’ would give them easy access to my offices in an otherwise empty campus. But the politics department was crawling with academics who were demanding proper procedures be followed. After some delay, I thanked the officers for their lift to campus and announced that I had work to do and proceeded to exit the car. This forced their hand and I was arrested under the official secrets legislation and taken to meet with Professor Phillip Reynolds the Pro-Vice Chancellor, together with various university and college officials who had assembled: Dr Roxbee Cox, Fylde principal and Mr. Forrester, Academic Registrar.

The atmosphere was tense. Special Branch demanded access to my room and I pointed out that principles of academic freedom were involved. After all I had only ever used open sources, had simply followed the university motto and no one had explained the nature of any charges laid against me. Detective Chief Inspector Moffat replied that ‘this was an issue of national security’ and told me that they had a warrant. Professor Reynolds demanded that they go through the proper channels, to which Moffat replied that he had six men present and would start breaking down doors in the department if access was denied. People began sweating – it was an unforgettable moment. I broke it by emphasizing that I had nothing to hide and suggested that they could search to their hearts’ content.1 The atmosphere was thankfully lightened a bit later with the arrival of my supervisor, Dr Paul Smoker, who amidst the hub bub in the corridors managed to give me a burst of the Beatles hit, ‘Listen Do You Want To Know A Secret – Do you Promise Not to Tell?’ Perfect: but I was later held in Lancaster Police Station for several hours, refused a solicitor and when finally released was told, sometimes you fellows are too clever for your own good.’

The raid turned my research plans upside down not to mention the impact it had on my personal life. However it was many times worse for the main researchers, Crispin Aubrey, John Berry and Duncan Campbell (now deemed the ABC defendants), who were facing the full rigours of an official secrets act trial. And yet there was a puzzle: why had Special Branch undertaken such a foolhardy exercise as to raid a British University – how come I’d touched on a raw nerve? It quickly dawned on me that I had inadvertently stumbled on a network connected with the configuration of the antennae I had photographed on the Quenmore Moor, which the authorities were desperate to keep secret. It seemed incomprehensible. I knew that Menwith Hill was a US base, but what was the link with UK phone lines, and especially the link to Northern Ireland? Just where were the results being transmitted – to the US, but how – by satellite? The system must be huge. It felt like a science fiction movie. Continue reading

Facebooktwittermail

McClatchy asks whether U.S. spied on its reporter

The Associated Press reports: The McClatchy news organization asked National Intelligence Director James Clapper on Tuesday whether U.S. intelligence agencies monitored cellphone calls between a McClatchy freelance reporter and his sources in Afghanistan.

In a letter to Clapper, Anders Gyllenhaal, McClatchy’s vice president of news, and Karole Morgan-Prager, vice president, corporate development and general counsel, called the allegations that U.S. intelligence agencies helped target a journalist working for a U.S. news organization “disturbing.”

“Absent a well-founded, good faith belief that a journalist is engaged in terrorist activities, compiling and analyzing a journalist’s metadata would violate core First Amendment principles, and U.S. law,” Gyllenhaal and Morgan-Prager wrote.

They asked Clapper whether any U.S. intelligence agencies helped in the “collection, use or analysis” of any metadata from McClatchy freelancer Jon Stephenson’s cellphone while he worked in Afghanistan last year.

Facebooktwittermail

Senators sick of being lied to by intelligence officials

The Guardian reports: The bipartisan leaders of a powerful Senate committee questioned the truthfulness of the US intelligence community in a heated Wednesday morning hearing as intelligence officials conceded that their controversial bulk phone records collection of millions of Americans was not “the most important tool”.

“We need straightforward answers, and I’m concerned we’re not getting them,” said Patrick Leahy, the Vermont Democrat and chairman of the Senate judiciary committee.

Leahy, joined by ranking Republican Chuck Grassley of Iowa, blasted James Clapper, the US director of national intelligence, for making untruthful statements to Congress in March about the bulk phone records collection on Americans, and NSA director Keith Alexander for overstating the usefulness of that collection for stopping terrorist attacks.

Grassley called Clapper’s recent apology to senator Ron Wyden and the intelligence community “especially disturbing”.

“Nothing can excuse this kind of behavior from a senior administration official,” Grassley said. “Especially on a matter of such importance.” [Continue reading…]

Facebooktwittermail

NSA suspected of spying on McClatchy newspaper correspondent

Nicky Hager* reports: The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war.

Stephenson has described the revelation as a serious violation of his privacy, and the intrusion into New Zealand media freedom has been slammed as an abuse of human rights.

The spying came at a time when the New Zealand Defence Force was unhappy at Stephenson’s reporting of its handling of Afghan prisoners and was trying to find out who was giving him confidential information.

The monitoring occurred in the second half of last year when Stephenson was working as Kabul correspondent for the US McClatchy news service and for various New Zealand news organisations.

The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

And since early in the Afghanistan war, the GCSB has secretly posted staff to the main US intelligence centre at Bagram, north of Kabul. They work in a special “signals intelligence” unit that co-ordinates electronic surveillance to assist military targeting. It is likely to be this organisation that monitored Stephenson. [Continue reading…]

*Nicky Hager is an investigative journalist from New Zealand who has been exposing the NSA’s global surveillance operations since the 1990s, and is the author of Secret Power (1997) which can be downloaded as a free e-book here.

Facebooktwittermail

The ECHELON trail — Part Two: Truth lies open to all?

By Steve Wright, Surveillance & Society, 2005

(The first part in this series can be read here and an introduction to the series here.)

Truth Lies Open To All?

Lancaster University’s motto – ‘Omnibus Patet Veritas’ very much appealed to me. It means ‘truth lies open to all’. I was fascinated by the contradictions between this ideal and the hidden dimensions of political control – especially in the UK where civil servants were required to sign the Official Secrets Act.

I was working on a range of different techniques for assessing new technologies of political control. This included an examination of the growth of surveillance in the UK, which had significantly changed over the last two decades. It is useful to look at the context in which this research was taking place. For example in 1957 when Lord Birkett produced the official report on telephone interception in the UK, telephone tapping was very much a cottage industry. Since then telephone interception has grown into today’s hitech networks.

Nevertheless when figures were officially updated in 1980, many MP’s were surprised by the relatively modest official increase over the intervening 23 years: from 129 warrants in 1958 to 411 in 1979 for England and Wales. However the 1980 paper on the Interception of Communications did admit that one warrant could cover multiple intercepts on an entire organisation and its members e.g. CND. It was also revealed that the Secretary of State ‘may delegate’ to the civil service the power to amend a warrant. Thus the total number of lines monitored was going to be substantially more than the number of warrants issued.

Another anomaly was revealed when MP Clement Freud asked whether the number of interception orders currently in force was cumulative or whether the number given simply indicated how many new orders had been published. The then Home Secretary, William Whitelaw, refused to answer leaving open the possibility that key permanent warrants for MI5 & Special Branch were only issued once. It might also have been supposed that the development of international terrorism in the early Seventies had further fuelled the growth of telephone surveillance. However the public record showed a different story. The sharp boom in UK telephone tapping came immediately after Birkett, who recommended that in future official figures on tapping should not be made public.

Thus the main growth period in telecommunications surveillance occurred in the Sixties before international terrorism – the ostensible reason for official surveillance in the Eighties – had become a major problem. If anything, the official record shows that the growth rate slackened in 1970, just as terrorism, particularly in Northern Ireland, had intensified. It could not be the full story. In this respect the White Paper gave a clue. It did not cover telephone tapping in the Province, nor did it cover warrants signed by the Foreign Secretary for the Government Communications Headquarters (GCHQ1) and the Secret Intelligence Services, nor tapping warrants signed by the Prime Minister.

These were particularly significant omissions, given that just one permanent warrant signed in 1967 authorized GCHQ to intercept all overseas telegrams. Indeed the sudden drop in Home Secretary warrants after 1975 can be partially explained by this transfer of the surveillance workload from MI5 to GCHQ in conjunction with the US National Security Agency (NSA) and without reference to parliament.

Bypassing formal democratic authorisation and transparency of interceptions thus became a state norm – but how could surveillance researchers ever hope to get evidence of such a top secret network – especially since the penalties under the Official Secrets Act were draconian – up to 14 years in jail? The short answer, as is often the case, was by accident. Continue reading

Facebooktwittermail

Major opinion shifts, in the U.S. and Congress, on NSA surveillance and privacy

Glenn Greenwald writes: Numerous polls taken since our reporting on previously secret NSA activities first began have strongly suggested major public opinion shifts in how NSA surveillance and privacy are viewed. But a new comprehensive poll released over the weekend weekend by Pew Research provides the most compelling evidence yet of how stark the shift is.

Among other things, Pew finds that “a majority of Americans – 56% – say that federal courts fail to provide adequate limits on the telephone and internet data the government is collecting as part of its anti-terrorism efforts.” And “an even larger percentage (70%) believes that the government uses this data for purposes other than investigating terrorism.” Moreover, “63% think the government is also gathering information about the content of communications.” That demonstrates a decisive rejection of the US government’s three primary defenses of its secret programs: there is adequate oversight; we’re not listening to the content of communication; and the spying is only used to Keep You Safe™.

But the most striking finding is this one:

“Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person’s civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004.”

For anyone who spent the post-9/11 years defending core liberties against assaults relentlessly perpetrated in the name of terrorism, polling data like that is nothing short of shocking. [Continue reading…]

Facebooktwittermail

Letter to President Obama from Edward Snowden’s father, Lon Snowden

Re: Civil Disobedience, Edward J. Snowden, and the Constitution

Dear Mr. President:

You are acutely aware that the history of liberty is a history of civil disobedience to unjust laws or practices. As Edmund Burke sermonized, “All that is necessary for the triumph of evil is that good men do nothing.”

Civil disobedience is not the first, but the last option. Henry David Thoreau wrote with profound restraint in Civil Disobedience: “If the injustice is part of the necessary friction of the machine of government, let it go, let it go: perchance it will wear smooth certainly the machine will wear out. If the injustice has a spring, or a pulley, or a rope, or a crank, exclusively for itself, then perhaps you may consider whether the remedy will not be worse than the evil; but if it is of such a nature that it requires you to be the agent of injustice to another, then, I say, break the law. Let your life be a counter-friction to stop the machine.”

Thoreau’s moral philosophy found expression during the Nuremburg trials in which “following orders” was rejected as a defense. Indeed, military law requires disobedience to clearly illegal orders.

A dark chapter in America’s World War II history would not have been written if the then United States Attorney General had resigned rather than participate in racist concentration camps imprisoning 120,000 Japanese American citizens and resident aliens.

Civil disobedience to the Fugitive Slave Act and Jim Crow laws provoked the end of slavery and the modern civil rights revolution.

We submit that Edward J. Snowden’s disclosures of dragnet surveillance of Americans under § 215 of the Patriot Act, § 702 of the Foreign Intelligence Surveillance Act Amendments, or otherwise were sanctioned by Thoreau’s time-honored moral philosophy and justifications for civil disobedience. Since 2005, Mr. Snowden had been employed by the intelligence community. He found himself complicit in secret, indiscriminate spying on millions of innocent citizens contrary to the spirit if not the letter of the First and Fourth Amendments and the transparency indispensable to self-government. Members of Congress entrusted with oversight remained silent or Delphic. Mr. Snowden confronted a choice between civic duty and passivity. He may have recalled the injunction of Martin Luther King, Jr.: “He who passively accepts evil is as much involved in it as he who helps to perpetrate it.” Mr. Snowden chose duty. Your administration vindictively responded with a criminal complaint alleging violations of the Espionage Act.

From the commencement of your administration, your secrecy of the National Security Agency’s Orwellian surveillance programs had frustrated a national conversation over their legality, necessity, or morality. That secrecy (combined with congressional nonfeasance) provoked Edward’s disclosures, which sparked a national conversation which you have belatedly and cynically embraced. Legislation has been introduced in both the House of Representatives and Senate to curtail or terminate the NSA’s programs, and the American people are being educated to the public policy choices at hand. A commanding majority now voice concerns over the dragnet surveillance of Americans that Edward exposed and you concealed. It seems mystifying to us that you are prosecuting Edward for accomplishing what you have said urgently needed to be done!

The right to be left alone from government snooping–the most cherished right among civilized people — is the cornerstone of liberty. Supreme Court Justice Robert Jackson served as Chief Prosecutor at Nuremburg. He came to learn of the dynamics of the Third Reich that crushed a free society, and which have lessons for the United States today.

Writing in Brinegar v. United States, Justice Jackson elaborated:

The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

These, I protest, are not mere second-class rights but belong in the catalog of indispensable freedoms. Among deprivations of rights, none is so effective in cowing a population, crushing the spirit of the individual and putting terror in every heart. Uncontrolled search and seizure is one of the first and most effective weapons in the arsenal of every arbitrary government. And one need only briefly to have dwelt and worked among a people possessed of many admirable qualities but deprived of these rights to know that the human personality deteriorates and dignity and self-reliance disappear where homes, persons and possessions are subject at any hour to unheralded search and seizure by the police.

We thus find your administration’s zeal to punish Mr. Snowden’s discharge of civic duty to protect democratic processes and to safeguard liberty to be unconscionable and indefensible.

We are also appalled at your administration’s scorn for due process, the rule of law, fairness, and the presumption of innocence as regards Edward.

On June 27, 2013, Mr. Fein wrote a letter to the Attorney General stating that Edward’s father was substantially convinced that he would return to the United States to confront the charges that have been lodged against him if three cornerstones of due process were guaranteed. The letter was not an ultimatum, but an invitation to discuss fair trial imperatives. The Attorney General has sneered at the overture with studied silence.

We thus suspect your administration wishes to avoid a trial because of constitutional doubts about application of the Espionage Act in these circumstances, and obligations to disclose to the public potentially embarrassing classified information under the Classified Information Procedures Act.

Your decision to force down a civilian airliner carrying Bolivian President Eva Morales in hopes of kidnapping Edward also does not inspire confidence that you are committed to providing him a fair trial. Neither does your refusal to remind the American people and prominent Democrats and Republicans in the House and Senate like House Speaker John Boehner, Congresswoman Nancy Pelosi, Congresswoman Michele Bachmann, and Senator Dianne Feinstein that Edward enjoys a presumption of innocence. He should not be convicted before trial. Yet Speaker Boehner has denounced Edward as a “traitor.” Ms. Pelosi has pontificated that Edward “did violate the law in terms of releasing those documents.” Ms. Bachmann has pronounced that, “This was not the act of a patriot; this was an act of a traitor.” And Ms. Feinstein has decreed that Edward was guilty of “treason,” which is defined in Article III of the Constitution as “levying war” against the United States, “or in adhering to their enemies, giving them aid and comfort.”

You have let those quadruple affronts to due process pass unrebuked, while you have disparaged Edward as a “hacker” to cast aspersion on his motivations and talents. Have you forgotten the Supreme Court’s gospel in Berger v. United States that the interests of the government “in a criminal prosecution is not that it shall win a case, but that justice shall be done?”

We also find reprehensible your administration’s Espionage Act prosecution of Edward for disclosures indistinguishable from those which routinely find their way into the public domain via your high level appointees for partisan political advantage. Classified details of your predator drone protocols, for instance, were shared with the New York Times with impunity to bolster your national security credentials. Justice Jackson observed in Railway Express Agency, Inc. v. New York: “The framers of the Constitution knew, and we should not forget today, that there is no more effective practical guaranty against arbitrary and unreasonable government than to require that the principles of law which officials would impose upon a minority must be imposed generally.”

In light of the circumstances amplified above, we urge you to order the Attorney General to move to dismiss the outstanding criminal complaint against Edward, and to support legislation to remedy the NSA surveillance abuses he revealed. Such presidential directives would mark your finest constitutional and moral hour.

Sincerely,

Bruce Fein

Counsel for Lon Snowden

Lon Snowden

source: http://msnbcmedia.msn.com/i/msnbc/sections/tvnews/dateline%20nbc/obama.pdf

Facebooktwittermail