The New York Times reports: The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T.
While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed N.S.A. documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”
AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the N.S.A. access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T. [Continue reading…]
The New York Times reports: Analysts at the National Security Agency will no longer be permitted to search a database holding five years of Americans’ domestic calling records after Nov. 29, the Obama administration said on Monday.
Legislation enacted in June barred the N.S.A. from collecting Americans’ calling records after 180 days, but did not say what would happen to the data already gathered. Under a new system laid out by the USA Freedom Act, the government will not hold the bulk data, which is used to analyze links between callers in search of terrorism suspects.
Earlier this month, the Office of the Director of National Intelligence declined to say whether the government would keep using the data collected under the old procedures or would purge it after the new system is in place. [Continue reading…]
The Intercept reports: Over six years, filmmaker Laura Poitras was searched, interrogated and detained more than 50 times at U.S. and foreign airports.
When she asked why, U.S. agencies wouldn’t say.
Now, after receiving no response to her Freedom of Information Act requests for documents pertaining to her systemic targeting, Poitras is suing the U.S. government.
In a complaint filed on Monday afternoon, Poitras demanded that the Department of Justice, the Department of Homeland Security, and the Office of the Director of National Intelligence release any and all documentation pertaining to her tracking, targeting and questioning while traveling between 2006 and 2012. [Continue reading…]
Pew Research Center: Revelations about the scope of American electronic surveillance efforts have generated headlines around the world over the past year. And a new Pew Research Center survey finds widespread global opposition to U.S. eavesdropping and a decline in the view that the U.S. respects the personal freedoms of its people. But in most countries there is little evidence this opposition has severely harmed America’s overall image.
In nearly all countries polled, majorities oppose monitoring by the U.S. government of emails and phone calls of foreign leaders or their citizens. In contrast, Americans tilt toward the view that eavesdropping on foreign leaders is an acceptable practice, and they are divided over using this technique on average people in other countries. However, the majority of Americans and others around the world agree that it is acceptable to spy on suspected terrorists, and that it is unacceptable to spy on American citizens.
Another high-profile aspect of America’s recent national security strategy is also widely unpopular: drones. In 39 of 44 countries surveyed, majorities or pluralities oppose U.S. drone strikes targeting extremists in countries such as Pakistan, Yemen and Somalia. Moreover, opposition to drone attacks has increased in many nations since last year. Israel, Kenya and the U.S. are the only nations polled where at least half of the public supports drone strikes. [Continue reading…]
The Intercept reports: One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.
The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers. [Continue reading…]
DefenseNews reports: The site of an Army golf course named for US President Dwight Eisenhower, one long drive from the National Security Agency, is an active construction site, the future of US military cyber.
Where there were once bunkers, greens and tees is a large gray building due to become an NSA-run 600,000-square-foot, state-of-the-art server farm, a skeletal structure that will one day house US Cyber Command’s joint operations center, with plots reserved for individual Marine Corps and Navy cyber facilities.
The plans reflect the growth in ambition, manpower and resources for the five-year-old US Cyber Command. One measure of this rapid expansion is the command’s budget — $120 million at its inception in 2010 rising to $509 million for 2015.
Another measure is the $1.8 billion in construction at Fort Meade, much of it related to Cyber Command. Though Cyber Command’s service components and tactical teams are spread across the country, the headquarters for Cyber Command, the NSA and Defense Information Systems Agency make Fort Meade a growing hub for military cyber.
Earlier this year, Defense Secretary Ash Carter announced a new cyber strategy that acknowledges in the strongest terms that the Pentagon may wage offensive cyber warfare. The strategy emphasizes deterrence and sets up a reliance on the commercial technology sector, hinging on a push to strengthen ties between Silicon Valley and the Pentagon. [Continue reading…]
The New York Times reports: The French government on Wednesday reacted angrily to revelations about extensive eavesdropping by the United States government on the private conversations of senior French leaders, including three presidents and dozens of senior government figures.
President François Hollande called an emergency meeting of the Defense Council on Wednesday morning to discuss the revelations published by the French news website Mediapart and the left-leaning newspaper Libération about spying by the National Security Agency.
He spoke with President Obama on Wednesday afternoon and made clear “the principles that must govern relations between allies on intelligence matters,” the Élysée Palace said in a statement, adding that senior French intelligence officials would soon travel to the United States for discussions. [Continue reading…]
National Journal reports: The secretive court that oversees U.S. spying programs selected to not consult a panel of privacy advocates in its first decision made since the enactment earlier this month of major surveillance reform, according to an opinion declassified Friday.
The Foreign Intelligence Surveillance Court opted to forgo appointing a so-called “amicus” of privacy advocates as it considered whether the USA Freedom Act could reinstate spying provisions of the Patriot Act even though they expired on June 1 amid an impasse in the Senate.
The Court ruled that the Freedom Act’s language — which will restore the National Security Agency’s bulk collection of U.S. call data for six months before transitioning to a more limited program — could revive those lapsed provisions, but in assessing that narrow legal question, Judge Dennis Saylor concluded that the Court did not first need confer with a privacy panel as proscribed under the reform law. [Continue reading…]
The Guardian reports: The hostile reaction of the British and US governments to the Snowden disclosures of mass surveillance only served to heighten public suspicion of the work of the intelligence agencies, according to an international conference of senior intelligence and security figures.
The recently published official account of a Ditchley Foundation conference last month says one of the event’s main conclusions was that greater transparency about the activities and capabilities of the security services would be essential if their credibility was to be preserved and enhanced around the world.
The account of the conference chaired by Sir John Scarlett, the former head of MI6, was published on Friday and makes clear the foundation recognised the widespread public unease following the revelations and that the conditions of data collection about individuals and who has access to it are legitimate areas of concern. [Continue reading…]
An article in Britain’s Sunday Times this weekend, claimed: “Russia and China have cracked the top-secret cache of files stolen by the fugitive US whistleblower Edward Snowden, forcing MI6 to pull agents out of live operations in hostile countries, according to senior officials in Downing Street, the Home Office and the security services.”
Glenn Greenwald writes:
The government accusers behind this story have a big obstacle to overcome: namely, Snowden has said unequivocally that when he left Hong Kong, he took no files with him, having given them to the journalists with whom he worked, and then destroying his copy precisely so that it wouldn’t be vulnerable as he traveled. How, then, could Russia have obtained Snowden’s files as the story claims — “his documents were encrypted but they weren’t completely secure ” — if he did not even have physical possession of them?
The only way this smear works is if they claim Snowden lied, and that he did in fact have files with him after he left Hong Kong.
In fact, the article says nothing about how the files were allegedly obtained by Russian and China, while Greenwald claims the only way they could have been accessed would be directly from Snowden.
Yet in 2013, Greenwald told the Daily Beast that Snowden “has taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.”
So aside from Snowden himself (who if taken at his word, no longer possesses the files) there many different people (we don’t know how many or who they all are) who also have or had the files.
Are we to assume that each and every one of them is an unfailing master of digital security and these files could never have been obtained by a third party?
In a world where a data security company like Kaspersky can get hacked, I wouldn’t put it outside the realms of possibility that by some means or other, Russia and/or China might have gained access to the files Snowden took.
There are, however, several reasons to question this report — not because it came from anonymous sources, or necessitates believing the Snowden has lied — but because had these sources been able to substantiate their claims with credible evidence, they would most likely have turned to a better newspaper.
The Guardian reports: Downing Street and the Home Office are being challenged to answer in public claims that Russia and China have broken into the secret cache of Edward Snowden files and that British agents have had to be withdrawn from live operations as a consequence.
The reports first appeared in the Sunday Times, which quoted anonymous senior officials in No 10, the Home Office and security services. The BBC also quoted an anonymous senior government source, who said agents had to be moved because Moscow gained access to classified information that reveals how they operate.
Privacy campaigners questioned the timing of the report, coming days after a 373-page report by the independent reviewer of terrorism legislation, David Anderson QC, which was commissioned by David Cameron. Anderson was highly critical of the existing system of oversight of the surveillance agencies and set out a series of recommendations for reform. [Continue reading…]
The Guardian reports: GCHQ, the Cheltenham-based monitoring agency, is collecting “bulk personal datasets” from millions of people’s phone and internet records using techniques now banned in the US, according to Privacy International.
In a fresh legal claim filed at the Investigatory Powers Tribunal (IPT), the campaign group calls for an end to the harvesting of information about those who have no ties to terrorism and are not suspected of any crime.
The IPT is the judicial body that hears complaints about the intelligence services and surveillance by public organisations. The tribunal has received dozens of submissions in the wake of Edward Snowden’s revelations about interception of internet traffic by the US National Security Agency (NSA) and Britain’s GCHQ. [Continue reading…]
Edward Snowden writes: Two years ago today, three journalists and I worked nervously in a Hong Kong hotel room, waiting to see how the world would react to the revelation that the National Security Agency had been making records of nearly every phone call in the United States. In the days that followed, those journalists and others published documents revealing that democratic governments had been monitoring the private activities of ordinary citizens who had done nothing wrong.
Within days, the United States government responded by bringing charges against me under World War I-era espionage laws. The journalists were advised by lawyers that they risked arrest or subpoena if they returned to the United States. Politicians raced to condemn our efforts as un-American, even treasonous.
Privately, there were moments when I worried that we might have put our privileged lives at risk for nothing — that the public would react with indifference, or practiced cynicism, to the revelations.
Never have I been so grateful to have been so wrong. [Continue reading…]
The Associated Press reports: The surveillance law enacted this week stands as the most significant curb on the government’s investigative authorities since the 1970s. But it’s practically inconsequential in the universe of the National Security Agency’s vast digital spying operations, a technical overhaul of a marginal counterterrorism program that some NSA officials wanted to jettison anyway.
After a six-month transition, the new law will end the NSA’s bulk collection of Americans’ phone records, moving instead to a system of case-by-case searches of records held by phone companies.
The existence of the program, in place since shortly after the attacks of Sept. 11, 2001, was perhaps the most startling secret revealed by former NSA contractor Edward Snowden, because it so directly affected the privacy of Americans. It was the first Snowden disclosure published by the journalists with whom he shared documents, and it landed with a thunderclap.
But in the two years since Snowden took up exile in Russia to avoid prosecution in the U.S., his documents have fueled dozens of revelations of NSA surveillance operations, disclosing how the agency seeks to exploit Internet communications. None of those programs are affected by the law President Barack Obama signed Tuesday night. [Continue reading…]
By Julia Angwin and Jeff Larson, ProPublica, Charlie Savage, the New York Times, and Henrik Moltke, special to ProPublica, June 4, 2015
This story was co-published with the New York Times.
Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.
In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad 2014 including traffic that flows to suspicious Internet addresses or contains malware, the documents show.
The Justice Department allowed the agency to monitor only addresses and “cybersignatures” 2014 patterns associated with computer intrusions 2014 that it could tie to foreign governments. But the documents also note that the NSA sought to target hackers even when it could not establish any links to foreign powers.
The disclosures, based on documents provided by Edward J. Snowden, the former NSA contractor, and shared with the New York Times and ProPublica, come at a time of unprecedented cyberattacks on American financial institutions, businesses and government agencies, but also of greater scrutiny of secret legal justifications for broader government surveillance.
While the Senate passed legislation this week limiting some of the NSA’s authority, it involved provisions in the U.S.A. Patriot Act and did not apply to the warrantless wiretapping program.
Reuters: The U.S. government will rely on phone companies to keep data on customers once the USA Freedom Act is signed into law, but the bill avoids companies’ main concern: it does not force them to change how they collect and store data.
The bill, passed by the Senate late on Tuesday and expected to be signed into law by President Barack Obama, stops the government’s practice of routinely scooping up telephone metadata — dialed numbers and call lengths but not the content — from companies in bulk.
Instead, the National Security Agency and others in the U.S. intelligence community would have to request more targeted data from companies with a court order.
The day millions of Americans have been eagerly awaiting — they can once again enjoy their lost freedoms:
When the Patriot Act expires I'm gonna check out some rude-ass library books
— the beverage hunk (@pareene) June 1, 2015
can't wait for the Patriot Act to expire I haven't called all my terrorist buds in like 14 years
— the beverage hunk (@pareene) May 31, 2015
The New York Times reports: For the first time since the aftermath of the terrorist attacks of Sept. 11, 2001, Americans will again be free to place phone calls — to friends, lovers, business associates, political groups, doctors and pizza restaurants — without having logs of those contacts vacuumed up in bulk by the National Security Agency.
And for the first time in nearly 14 years, if government agents identify new phone numbers that they suspect are linked to terrorism, they will have to subpoena phone companies for associated calling records and wait for the response to see if anyone in the United States has been in contact with that number. The N.S.A. can no longer simply query its database for the information.
This unusual situation may last only a few days, until Congress can reach an accommodation over three counterterrorism laws that expired at 12:01 a.m. Monday.
Nonetheless, the fact that Congress allowed the laws to lapse — the most important of them is the purported legal basis for the bulk records collection program — is an extraordinary moment in the story of the tensions between post-9/11 policies and privacy rights. It has led to heated warnings in the political realm about exposing the country to heightened risk of attack.
A few hours before the Senate convened on Sunday, John O. Brennan, the C.I.A. director, warned on the CBS program “Face the Nation” that if lawmakers let those laws lapse, the F.B.I. would “not have the ability then to track these various elements that we are looking at who are trying to carry out attacks here in the homeland.”
But interviews with law enforcement and intelligence officials about what they will do in the interim suggest there are multiple workarounds to the gap.
One of the expired laws permitted wiretap orders of “lone wolf” terrorism suspects who are not part of a foreign group, a provision that has apparently never been used. A second permitted “roving” wiretap orders that follow suspects who change phones, a provision that apparently has been used only rarely.
The third permitted court orders requiring businesses to turn over records that are relevant to a national security investigation, the provision known as Section 215 of the Patriot Act. In addition to the bulk phone records program, the F.B.I. used Section 215 about 160 times last year to obtain particular business records, like suspects’ Internet activity logs.
All three of the expired laws contained a so-called grandfather clause that permits their authority to continue indefinitely for any investigation that had begun before June 1.
Law enforcement officials have made it clear that the F.B.I. has long-running, open-ended “enterprise” investigations into groups that pose a threat to public safety, like Al Qaeda. A senior intelligence official recently told The New York Times that the administration was open to invoking the grandfather clause to get the records if a need arose during any lapse. [Continue reading…]
The Washington Post reports: Sen. Rand Paul (R-Ky.) vowed that he would force the Patriot Act to expire Sunday when the Senate reconvenes after not taking action last week to extend or replace a controversial surveillance program.
“Tomorrow, I will force the expiration of the NSA illegal spy program,” the Republican presidential candidate said in a statement, which was first reported by Politico.
The Senate will convene a rare Sunday session after it rejected a compromise bill on bulk surveillance by the National Security Agency last week. The bill would prohibit the government from engaging in the mass collection of phone records, but would leave those records in the hands of private telephone companies, which would keep them for 18 months. The Sunday session will take place hours before the Patriot Act expires.
Paul said Saturday that he would disrupt efforts to extend the Patriot Act or green light the compromise bill, known as the USA Freedom Act.
“I am ready and willing to start the debate on how we fight terrorism without giving up our liberty,” Paul said in the statement. “Sometimes when the problem is big enough, you just have to start over.”
Paul plans to prevent Senate Majority Leader Mitch McConnell (R-Ky.) from expediting debate on the USA Freedom Act. Even if a vast majority of senators agree to extend some version of the Patriot Act, Senate rules would allow Paul to force about five days of debate over the issue, which would lead to a temporary halt to some techniques used by the nation’s spy agencies. [Continue reading…]