The Washington Post reports: U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said.
The aim is to understand the scope and intent of the Russian campaign, which incorporates cyber-tools to hack systems used in the political process, enhancing Russia’s ability to spread disinformation.
The effort to better understand Russia’s covert influence operations is being coordinated by James R. Clapper Jr., the director of national intelligence. “This is something of concern for the DNI,” said Charles Allen, a former longtime CIA officer who has been briefed on some of these issues. “It is being addressed.”
A Russian influence operation in the United States “is something we’re looking very closely at,” said one senior intelligence official who, like others interviewed, spoke on the condition of anonymity to discuss a sensitive matter. Officials also are examining potential disruptions to the election process, and the FBI has alerted state and local officials to potential cyberthreats.
The official cautioned that the intelligence community is not saying it has “definitive proof” of such tampering, or any Russian plans to do so. “But even the hint of something impacting the security of our election system would be of significant concern,” the official said. “It’s the key to our democracy, that people have confidence in the election system.”
The Kremlin’s intent may not be to sway the election in one direction or another, officials said, but to cause chaos and provide propaganda fodder to attack U.S. democracy-building policies around the world, particularly in the countries of the former Soviet Union. [Continue reading…]
Category Archives: Five Eyes
Edward Snowden’s long, strange journey to Hollywood
Irina Aleksander writes: The summer light was fading to gold near Red Square as Oliver Stone maneuvered through the lobby bar of a five-star Moscow hotel last year. He walked past the marble staircase and the grand piano to a table in the back. A group of businessmen in suits lingered nearby. Stone grimaced.
“I think we should move,” he said. His producer, Moritz Borman, led the way to another corner. “How’s this?” Borman asked.
Stone didn’t answer. He eyed an older couple slurping soup and kept moving. A moment later, Stone finally settled in by a window, comfortably beyond earshot of the other patrons.
Such security precautions had become routine. Ever since Stone decided to make a biopic about Edward Snowden, the American whistle-blower currently holed up in Moscow somewhere, the director — who became a Buddhist while making “Heaven & Earth” and sampled a buffet of psychedelic drugs for “The Doors” — had gone all method again. On “Snowden,” he and Borman became so preoccupied with American government surveillance that they had their Los Angeles offices swept for bugs more than once.
The director hadn’t been sleeping well. Principal photography wrapped a month earlier, and now Stone had come to Moscow to film Snowden for the movie’s grand finale. He ordered a decaf coffee and began to lay out the events that led him and Borman to be hanging out in Russian hotels, on the lookout for potential spies. “Last January, Moritz calls me,” Stone said. “He says: ‘You got a call from this fella who represents Mr. Snowden. You’re invited to Moscow.’ ”
The call had come from Anatoly Kucherena, Snowden’s Russian lawyer. In the course of his career, Kucherena has represented Russian oligarchs, film directors, a few pop singers and a state minister. In 2012, he campaigned for Vladimir V. Putin, and soon after Snowden landed in Moscow, Kucherena showed up at Sheremetyevo Airport and offered his services. Then Kucherena wrote a novel about his new client. Titled “Time of the Octopus,” it follows a National Security Agency leaker named Joshua Cold who is marooned in the airport and the Russian advocate who liberates him. In January 2014, months before the book was published, Kucherena called Borman to see if Stone might like to make it into a Hollywood movie.
“And I know you from working on, what, three films?” Stone said at the bar.
“Five,” Borman said.
At the time, Stone and Borman were barely speaking after a falling-out during the making of “Savages,” a beachy Blake Lively thriller. “We’ve had our fights,” Stone said. “You know, he’s German; I’m American.” He didn’t elaborate.
“He calls, and I go: ‘Oh, [expletive]. Not again,’ ” Stone continued. It wasn’t just about Borman. Stone wanted nothing to do with another political docudrama. He spent two decades trying to get a biopic about the Rev. Dr. Martin Luther King Jr. off the ground, only to see “Selma” get made to critical acclaim. Then there was the My Lai massacre film. Merrill Lynch put up cash, Bruce Willis was set to star and Stone built an entire village in Thailand. As the economy collapsed in 2008, the financing evaporated. “You get these scars, and they don’t go away,” Stone said.
So Stone was skeptical. But this was Snowden, who single-handedly exposed the colossal scale on which the United States had been surveilling its citizens. Plus, the director needed a hit. After early successes like “Platoon” and “Wall Street,” his more recent films didn’t receive the attention he hoped. The Snowden story had all the ingredients of an epic Stone picture: politics, government conspiracy and, at the center of it all, an American patriot who had lost faith. If it panned out, it could be Stone’s millennial follow-up to “Born on the Fourth of July,” the Ron Kovic biopic that won him an Oscar in 1990.
But first Stone and Borman had to make sure Kucherena was for real. Borman asked the lawyer to send the book and two first-class tickets to Moscow. Both arrived the next day. In case they still had doubts, Kucherena’s office gave Borman a number to call. On the other end was an employee of the Russian consulate in San Francisco, who turned out to be a big fan of “The Life of David Gale,” a film Borman produced. They were issued visas that same week. (Kucherena denies buying first-class tickets for Stone and Borman or helping expedite their visas.)
“When that happened,” Borman said, “I thought, O.K., I guess Kucherena can pull the strings.” [Continue reading…]
Release of NSA hacking tools exposes risk of keeping software vulnerabilities secret
The Washington Post reports: To penetrate the computers of foreign targets, the National Security Agency relies on software flaws that have gone undetected in the pipes of the Internet. For years, security experts have pressed the agency to disclose these bugs so they can be fixed, but the agency hackers have often been reluctant.
Now with the mysterious release of a cache of NSA hacking tools over the weekend, the agency has lost an offensive advantage, experts say, and potentially placed at risk the security of countless large companies and government agencies worldwide.
Several of the tools exploited flaws in commercial firewalls that remain unpatched, and they are out on the Internet for all to see. Anyone from a basement hacker to a sophisticated foreign spy agency has access to them now, and until the flaws are fixed, many computer systems may be in jeopardy.
The revelation of the NSA cache, which dates to 2013 and has not been confirmed by the agency, also highlights the administration’s little-known process for figuring out which software errors to disclose and which to keep secret.
The hacker tools’ release “demonstrates the key risk of the U.S. government stockpiling computer vulnerabilities for its own use: Someone else might get a hold of them and use them against us,” said Kevin Bankston, director of New America’s Open Technology Institute.
“This is exactly why it should be U.S. government policy to disclose to software vendors the vulnerabilities it buys or discovers as soon as possible, so we can all better protect our own cybersecurity.” [Continue reading…]
Possible NSA hacking could signal warning shot from Russia
The New York Times reports: The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America’s own elite operatives have been hacked and their methods revealed.
Most outside experts who examined the posts, by a group calling itself the Shadow Brokers, said they contained what appeared to be genuine samples of the code — though somewhat outdated — used in the production of the N.S.A.’s custom-built malware.
Most of the code was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the N.S.A. to place “implants” in the system, which can lurk unseen for years and be used to monitor network traffic or enable a debilitating computer attack.
According to these experts, the coding resembled a series of “products” developed inside the N.S.A.’s highly classified Tailored Access Operations unit, some of which were described in general terms in documents stolen three years ago by Edward J. Snowden, the former N.S.A. contractor now living in Russia.
But the code does not appear to have come from Mr. Snowden’s archive, which was mostly composed of PowerPoint files and other documents that described N.S.A. programs. The documents released by Mr. Snowden and his associates contained no actual source code used to break into the networks of foreign powers.
Whoever obtained the source code apparently broke into either the top-secret, highly compartmentalized computer servers of the N.S.A. or other servers around the world that the agency would have used to store the files. The code that was published on Monday dates to mid-2013, when, after Mr. Snowden’s disclosures, the agency shuttered many of its existing servers and moved code to new ones as a security measure.
By midday Tuesday Mr. Snowden himself, in a Twitter message from his exile in Moscow, declared that “circumstantial evidence and conventional wisdom indicates Russian responsibility” for publication, which he interpreted as a warning shot to the American government in case it was thinking of imposing sanctions against Russia in the cybertheft of documents from the Democratic National Committee. [Continue reading…]
8) Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant:
— Edward Snowden (@Snowden) August 16, 2016
9) This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server.
— Edward Snowden (@Snowden) August 16, 2016
10) That could have significant foreign policy consequences. Particularly if any of those operations targeted US allies.
— Edward Snowden (@Snowden) August 16, 2016
11) Particularly if any of those operations targeted elections.
— Edward Snowden (@Snowden) August 16, 2016
12) Accordingly, this may be an effort to influence the calculus of decision-makers wondering how sharply to respond to the DNC hacks.
— Edward Snowden (@Snowden) August 16, 2016
13) TL;DR: This leak looks like a somebody sending a message that an escalation in the attribution game could get messy fast.
— Edward Snowden (@Snowden) August 16, 2016
Karen Greenberg on the making of the modern security state
Brian O’Neill writes: For people not intimately involved in national security debates, and who haven’t closely followed how we arrived at the modern security state, the decade-and-a-half following the surreal terror of September 11 have felt like an unmoored drift, a country floating aimlessly, if recklessly, down a river of indecision. The internet’s rising ubiquity, followed by the dominance of social media, allowed many of us to unwittingly shrug off privacy concerns, while simultaneously ignoring others’ indefinite detention, the torture of strangers, and sky-borne assassination overseas, until we looked around and the sky was speckled with revelations. It’s easy to feel like the new relationship we have with our government “only just happened.”
In Rogue Justice, Karen Greenberg, the director of the Center on National Security at Fordham University School of Law, puts that feeling of aimless drift mostly to rest. This detailed and meticulously researched book shows how the willingness to make every citizen a suspect, and to give the executive branch immense powers to surveil, detain, torture, and murder were not just a product of collective fear and indifference, but the deliberate actions of a surprisingly small group of people. I say “mostly” because the decisions were made by officials within the Bush and (to a lesser extent) Obama administrations, but they were also enabled by the assumed (and granted) complicity of many others.
This complicity came from careerists worried about rocking the boat, politicians in both parties worried about being painted as weak on terror (with notable and noble exceptions), and to an uncomfortable extent, the general public. The terrorist attacks in 2001 made everyone realize that anyone could be a target, but we didn’t see — or didn’t want to see — that in a very real way, we also became a target of the government. Many of the policies enacted in the wake of 9/11 made everyone a suspect as much as a target. Through official secrecy aided by general indifference, we allowed ourselves to be passively dragooned into being on both sides of a war. [Continue reading…]
The U.S. could have destroyed Iran’s entire infrastructure without dropping a single bomb
Tech Insider reports: The United States had a top-secret operation that gave it the ability to shut down much of Iran’s infrastructure ahead of a full-scale war, without a single bomb being dropped.
The incredible insight into a highly-classified cyber operation called Nitro Zeus was first exposed in the film “Zero Days” and later corroborated by The New York Times, which interviewed intelligence and military officials who were involved.
The film, directed by Alex Gibney, premieres on Friday.
“We spent hundreds of millions, maybe billions on it,” an anonymous National Security Agency source says in the film. “We were inside, waiting, watching. Ready to disrupt, degrade, and destroy those systems with cyber attacks. In comparison, Stuxnet was a back alley operation. [Nitro Zeus] was the plan for a full scale cyber war with no attribution.”
The source, whose face and voice are concealed throughout the film, is later revealed to be an actor reciting lines from testimony offered to Director Alex Gibney by CIA and NSA employees.
The focus of the “Zero Days” film is on Stuxnet — the world’s first cyber weapon — that was used against Iran’s nuclear facilities. But in researching for the film, Gibney found that malicious software was just one small piece of a much larger puzzle. [Continue reading…]
State of Surveillance: Edward Snowden and Shane Smith
Eric Holder says Edward Snowden performed a ‘public service’
CNN reports: Former U.S. Attorney General Eric Holder says Edward Snowden performed a “public service” by triggering a debate over surveillance techniques, but still must pay a penalty for illegally leaking a trove of classified intelligence documents.
“We can certainly argue about the way in which Snowden did what he did, but I think that he actually performed a public service by raising the debate that we engaged in and by the changes that we made,” Holder told David Axelrod on “The Axe Files,” a podcast produced by CNN and the University of Chicago Institute of Politics.
“Now I would say that doing what he did — and the way he did it — was inappropriate and illegal,” Holder added. [Continue reading…]
House advances Email Privacy Act, setting the stage for vital privacy reform
Electronic Frontier Foundation: The U.S. House of Representatives passed the Email Privacy Act (H.R. 699) yesterday, which would require the government to get a probable cause warrant from a judge before obtaining private communications and documents stored online with companies such as Google, Facebook, and Dropbox.
The bill provides a long-overdue update to the Electronic Communications Privacy Act (ECPA), first passed in 1986. The bill also codifies the Sixth Circuit’s ruling in U.S. v. Warshak, which held that the Fourth Amendment demands that the government first obtain a warrant before accessing emails stored with cloud service providers.
The House vote is historic, given that H.R. 699 has an amazing 315 cosponsors, almost three quarters of the entire House. The House voted unanimously, following a unanimous vote by the House Judiciary Committee earlier this month. [Continue reading…]
What cyberwar against ISIS should look like
Fred Kaplan writes: Pentagon officials have publicly said, in recent weeks, that they’re hitting ISIS not only with bullets and bombs but also with cyberoffensive operations. “We are dropping cyberbombs,” Robert Work, deputy secretary of defense, is quoted as proclaiming in Monday’s New York Times. Similar, if less colorful, statements have been made by Secretary of Defense Ash Carter and,a week ago, President Obama.
What does it mean? And what effects are these new weapons having on the overall war? After dropping his “cyberbombs” bombshell, Work said, “We have never done that before.” But in fact, the United States has done it before, against Iraqi insurgents, including al-Qaida fighters, back in 2007. And, as I discovered while researching my book Dark Territory: The Secret History of Cyber War, the effects were devastating.
Standard accounts have credited President George W. Bush’s troop surge and Gen. David Petraeus’ counterinsurgency strategy for turning the Iraq conflict in the coalition’s favor in 2007. These accounts aren’t wrong, as far as they go, but they leave out another crucial factor — cyberoffensive warfare, as conducted by the Joint Special Operations Command and the National Security Agency. [Continue reading…]
Snowden seeks assurance from Norway it won’t extradite him
The Wall Street Journal reports: Edward Snowden, the former defense contractor charged by U.S. authorities for leaking classified documents to the media, is seeking assurance that Norway won’t extradite him if he comes here to collect a free-speech prize.
Mr. Snowden, who resides in Russia, has petitioned a Norwegian court, asking it to rule that the espionage charges filed by the U.S. Justice Department against him wouldn’t constitute grounds for extradition.
The Schjodt law firm, which filed the motion with the Oslo District Court on Mr. Snowden’s behalf, said Thursday that political crimes were formally excluded from a bilateral treaty and other rules governing extradition between Norway and the U.S.
“Mr. Snowden’s whistleblower activities must undoubtedly be seen as matters of political character,” the law firm said in its motion to the court.
The law firm said it has evidence that the U.S. has filed an extradition request to Norwegian authorities in the event Mr. Snowden arrives in Norway.
A spokesman at Norway’s Justice Ministry declined to comment on a court matter. The court said it hadn’t yet received Mr. Snowden’s documents. The U.S. Justice Department didn’t respond to a request for comment.
Debates inside and outside the courts over Mr. Snowden’s petition could challenge relations between the U.S. and the small Nordic country, traditionally a strong U.S. ally but also a strong advocate of whistleblower rights. [Continue reading…]
UK spy agencies have collected bulk personal data since 1990s, files show
The Guardian reports: Britain’s intelligence agencies have been secretly collecting bulk personal data since the late 1990s and privately admit they have gathered information on people who are “unlikely to be of intelligence or security interest”.
Disclosure of internal MI5, MI6 and GCHQ documents reveals the agencies’ growing reliance on amassing data as a prime source of intelligence even as they concede that such “intrusive” practices can invade the privacy of individuals.
A cache of more than 100 memorandums, forms and policy papers, obtained by Privacy International during a legal challenge over the lawfulness of surveillance, demonstrates that collection of bulk data has been going on for longer than previously disclosed while public knowledge of the process was suppressed for more than 15 years.
The files show that GCHQ, the government’s electronic eavesdropping centre based in Cheltenham, was collecting and developing bulk data sets as early as 1998 under powers granted by section 94 of the 1984 Telecommunications Act.
The documents offer a unique insight into the way MI5, MI6, and GCHQ go about collecting and storing bulk data on individuals, as well as authorising discovery of journalists’ sources.
Bulk personal data includes information extracted from passports, travel records, financial data, telephone calls, emails and many other open or covert sources. Often they are “fused” together to help pinpoint suspects. [Continue reading…]
German spies imply Snowden leaked files for Russia
The Local reports: NSA whistleblower Edward Snowden could have been acting under the influence of the Russian government, the heads of Germany’s foreign and domestic intelligence agencies said on Friday.
“It’s very remarkable that he exclusively published files about the work of the NSA with the BND [Germany’s foreign intelligence service] or the British secret service GCHQ,” BND head Gerhard Schindler told Focus magazine.
“Leaking the secret service files is an attempt to drive a wedge between western Europe and the USA – the biggest since the Second World War,” Hans-Georg Maaßen, head of Germany’s domestic intelligence agency (Verfassungsschutz), told Focus in the double interview. [Continue reading…]
Intelligence community olive branch on data sharing greeted with skepticism
The Intercept reports: Top intelligence community lawyer Robert Litt has offered a rare olive branch to privacy advocates, in the form of information.
In a post on one of the intelligence community’s favorite blogs on Wednesday, Litt, general counsel for the Office of the Director of National Intelligence, outlined new intelligence data-sharing guidelines that he said will be released soon.
The post, on Just Security, was essentially a response to reporting last month from the New York Times’s Charlie Savage that the NSA would soon be sharing with other government agencies the raw, unfiltered intelligence from the depths of its massive overseas spying programs.
“There has been a lot of speculation about the content of proposed procedures that are being drafted to authorize the sharing of unevaluated signals intelligence,” Litt wrote.
The New York Times story raised concerns that the data, which inevitably includes information about Americans, would become too easily accessible by intelligence agencies including the FBI, potentially leading to fishing expeditions. [Continue reading…]
BuzzFeed reports: Just days after breaking into a terrorist’s iPhone using a mysterious third-party technique, FBI officials on Friday told local law enforcement agencies it will assist them with unlocking phones and other electronic devices.
The advisory, obtained by BuzzFeed News, was sent in response to law enforcement inquiries about its new method of unlocking devices — a technique the FBI said was successful at gaining access to the iPhone 5C belonging to one of the shooters in the deadly San Bernardino, California, attack.
“In mid-March, an outside party demonstrated to the FBI a possible method for unlocking the iPhone,” the message said. “That method for unlocking that specific iPhone proved successful.” [Continue reading…]
Mass surveillance silences minority opinions, according to study
Karen Turner reports: A new study shows that knowledge of government surveillance causes people to self-censor their dissenting opinions online. The research offers a sobering look at the oft-touted “democratizing” effect of social media and Internet access that bolsters minority opinion.
The study, published in Journalism and Mass Communication Quarterly, studied the effects of subtle reminders of mass surveillance on its subjects. The majority of participants reacted by suppressing opinions that they perceived to be in the minority. This research illustrates the silencing effect of participants’ dissenting opinions in the wake of widespread knowledge of government surveillance, as revealed by whistleblower Edward Snowden in 2013.
The “spiral of silence” is a well-researched phenomenon in which people suppress unpopular opinions to fit in and avoid social isolation. It has been looked at in the context of social media and the echo-chamber effect, in which we tailor our opinions to fit the online activity of our Facebook and Twitter friends. But this study adds a new layer by explicitly examining how government surveillance affects self-censorship. [Continue reading…]
Lawmakers warn of ‘radical’ move by NSA to share information
The Hill reports: A bipartisan pair of lawmakers is expressing alarm at reported changes at the National Security Agency that would allow the intelligence service’s information to be used for policing efforts in the United States.
“If media accounts are true, this radical policy shift by the NSA would be unconstitutional, and dangerous,” Reps. Ted Lieu (D-Calif.) and Blake Farenthold (R-Texas) wrote in a letter to the spy agency this week. “The proposed shift in the relationship between our intelligence agencies and the American people should not be done in secret.
“NSA’s mission has never been, and should never be, domestic policing or domestic spying.” [Continue reading…]
Corrected: Edward Snowden ‘ready to return to States’
Correction: Oops! This story is a year old.
AFP reports: Edward Snowden, the fugitive whistleblower who has been given refuge in Russia, is willing to return to the United States if he is given a fair trial, his lawyer said Tuesday.
“He is thinking about it. He has a desire to return and we are doing everything we can to make it happen,” Anatoly Kucherena, the Russian lawyer who represents the former National Security Agency contractor, told a news conference.
Snowden was given political asylum in Russia in the summer of 2013 after the US revoked his passport. He now leads a reclusive life there.
“With a group of lawyers from other countries, we are working on the question of his return to America,” Kucherena said.
“Snowden is ready to return to the States, but on the condition that he is given a guarantee of a legal and impartial trial,” he said. [Continue reading…]
Warnings about risks posed by encryption have been wildly overblown by intelligence agencies, says report
The New York Times reports: For more than two years the F.B.I. and intelligence agencies have warned that encrypted communications are creating a “going dark” crisis that will keep them from tracking terrorists and kidnappers.
Now, a study in which current and former intelligence officials participated concludes that the warning is wildly overblown, and that a raft of new technologies — like television sets with microphones and web-connected cars — are creating ample opportunities for the government to track suspects, many of them worrying.
“ ‘Going dark’ does not aptly describe the long-term landscape for government surveillance,” concludes the study, to be published Monday by the Berkman Center for Internet and Society at Harvard.
The study argues that the phrase ignores the flood of new technologies “being packed with sensors and wireless connectivity” that are expected to become the subject of court orders and subpoenas, and are already the target of the National Security Agency as it places “implants” into networks around the world to monitor communications abroad. [Continue reading…]