Category Archives: surveillance

AT&T helped U.S. spy on internet on a vast scale

The New York Times reports: The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T.

While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed N.S.A. documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”

AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T has given the N.S.A. access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&T. [Continue reading…]

Facebooktwittermail

Duncan Campbell’s career exposing GCHQ’s secrets

Duncan Campbell writes: I stepped from the warmth of our source’s London flat. That February night in 1977, the air was damp and cool, the buzz of traffic muted in this leafy North London suburb, in the shadow of the iconic Alexandra Palace. A fellow journalist and I had just spent three hours inside, drinking Chianti and talking about secret surveillance with our source, and now we stood on the doorstep discussing how to get back to the south coast town where I lived.

Events were about to take me on a different journey. Behind me, sharp footfalls broke the stillness. A squad was running, hard, toward the porch of the house we had left. Suited men surrounded us. A burly middle-aged cop held up his police ID. We had broken “Section 2″ of Britain’s secrecy law, he claimed. These were “Special Branch,” then the elite security division of the British police.

For a split second, I thought this was a hustle. I knew that a parliamentary commission had released a report five years earlier that concluded that the secrecy law, first enacted a century ago, should be changed. I pulled out my journalist identification card, ready to ask them to respect the press.

But they already knew that my companion that evening, Time Out reporter Crispin Aubrey, and I were journalists. And they had been outside, watching our entire meeting with former British Army signals intelligence (Sigint) operator John Berry, who at the time was a social worker.

Aubrey and I were arrested on suspicion of possessing unauthorized information. They said we’d be taken to the local police station. But after being forced into cars, we were driven in the wrong direction, toward the center of London. I became uneasy. [Continue reading…]

Facebooktwittermail

New worry for tech firms that don’t want to hand data to the government: Hillary Clinton

The Los Angeles Times reports: When Hillary Rodham Clinton talks tough about diluting the influence of the sprawling Islamic State terrorist network, she sometimes skips the rhetoric on diplomatic and military strategy in the Middle East – and instead targets Silicon Valley.

Executives in the boardrooms of America’s big tech firms are taking notice as the Democratic front-runner in the presidential race warns about the impunity with which terrorists operate online. Clinton said the problem needs a “hard look” by government. Internet freedom is great, she told voters at a town hall in New Hampshire, “but I don’t believe we should give a free pass to a terrorist organization.”

The remarks haven’t been particularly controversial in the early voting states where Clinton is stumping. But across the country in the Bay Area, the social media industry is anxious about what exactly Clinton has in mind. Her focus comes as tech companies are engaged in a pitched battle with their state’s senior senator, Dianne Feinstein, over her push to require Internet companies to become government informants when they come across potentially troublesome communications.

At the core of the dispute is disagreement over how much companies should do to stop terrorist groups from using their platforms to recruit members and coordinate attacks. The firms, Feinstein said at a hearing last month, are taking down thousands of posts monthly that violate corporate bans on terrorism-related discussions – but they are not alerting law enforcement about any of that content. Feinstein made the comments after convening meetings with high-level officials at Google, Facebook, Yahoo, Twitter and Microsoft.

“The companies do not proactively monitor their sites to identify [terrorist] content, nor do they inform the FBI when they identified and remove their content,” she said. “I believe they should.” Soon after, the Senate Intelligence Committee, of which Feinstein is vice chair, tacked language onto a routine funding bill requiring the firms to share with law enforcement any such posts they come across. [Continue reading…]

Facebooktwittermail

Justice Dept. hit with lawsuit after refusing to disclose rules for spying on journalists

AllGov reports: The U.S. Department of Justice has refused to reveal its rules for spying on the media, prompting one group representing journalists to sue the agency in federal court.

The Freedom of the Press Foundation filed a lawsuit with the U.S. District Court in San Francisco seeking documents under the Freedom of Information Act that document Federal Bureau of Investigation (FBI) procedures for issuing national security letters to spy on the media. The Justice Department has so far refused to release the information or even respond to the FOIA request the foundation made in March.

Victoria Baranetsky, the foundation’s attorney, told Courthouse News Service obtaining the records and publishing them “is necessary to deter chilling effects on the press and its sources, especially given recent years during which the Obama Administration has increased surveillance of reporters.” [Continue reading…]

Facebooktwittermail

German justice minister fires top prosecutor for treason probe of bloggers

The Wall Street Journal reports: Germany’s justice minister fired the country’s top prosecutor on Tuesday over the prosecutor’s treason investigation of two prominent bloggers, culminating a dayslong fight among public officials over the limits of press freedom.

The federal prosecutor general, Harald Range, said earlier Tuesday that the government in Berlin was inappropriately trying to block his investigation of the two journalists, who published classified documents on the domestic intelligence service’s plans to expand Internet surveillance.

But Justice Minister Heiko Maas countered hours later that Mr. Range’s claim was wrong. Mr. Maas said the prosecutor had in fact agreed on Friday to suspend the probe pending a legal review by the Justice Ministry. Mr. Maas — who had earlier expressed doubt that the journalists’ actions amounted to treason — said on Tuesday that he and the office of Chancellor Angela Merkel agreed that Mr. Range, who is 67 years old, should give up his post.

“I have let Federal Prosecutor General Range know that my trust in his service has suffered lasting damage,” Mr. Maas told reporters in a brief statement in Berlin. “As agreed with the Chancellery, I will ask the Federal President today to move him into retirement.”

Mr. Maas’s firing of Germany’s top prosecutor — who investigates sensitive terrorism cases and other major crimes — marked a crescendo in a case that has embarrassed Ms. Merkel’s government and touched off debate over how to balance freedom of speech, privacy, and security in the European Union’s most populous country. [Continue reading…]

Facebooktwittermail

Why the fear over ubiquitous data encryption is overblown

Mike McConnell, former director of the National Security Agency and director of national intelligence, Michael Chertoff, former homeland security secretary, and William Lynn, former deputy defense secretary, write: More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well-being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.

In the wake of global controversy over government surveillance, a number of U.S. technology companies have developed and are offering their users what we call ubiquitous encryption — that is, end-to-end encryption of data with only the sender and intended recipient possessing decryption keys. With this technology, the plain text of messages is inaccessible to the companies offering the products or services as well as to the government, even with lawfully authorized access for public safety or law enforcement purposes.

The FBI director and the Justice Department have raised serious and legitimate concerns that ubiquitous encryption without a second decryption key in the hands of a third party would allow criminals to keep their communications secret, even when law enforcement officials have court-approved authorization to access those communications. There also are concerns about such encryption providing secure communications to national security intelligence targets such as terrorist organizations and nations operating counter to U.S. national security interests.

Several other nations are pursuing access to encrypted communications. In Britain, Parliament is considering requiring technology companies to build decryption capabilities for authorized government access into products and services offered in that country. The Chinese have proposed similar approaches to ensure that the government can monitor the content and activities of their citizens. Pakistan has recently blocked BlackBerry services, which provide ubiquitous encryption by default.

We recognize the importance our officials attach to being able to decrypt a coded communication under a warrant or similar legal authority. But the issue that has not been addressed is the competing priorities that support the companies’ resistance to building in a back door or duplicated key for decryption. We believe that the greater public good is a secure communications infrastructure protected by ubiquitous encryption at the device, server and enterprise level without building in means for government monitoring. [Continue reading…]

Facebooktwittermail

Sen. Wyden objects to anti-terrorism rules for websites

The Associated Press reports: Sen. Ron Wyden, an Oregon Democrat and skeptic of broad government surveillance, objected Tuesday to a bill that would have required social media and online sites like Google, Yahoo, Twitter and Facebook to alert federal authorities of any terrorist activity.

The proposal, by Sen. Dianne Feinstein, D-Calif., had been tucked into a broader bill authorizing intelligence programs throughout the 2016 budget year and became the subject of several private meetings on Capitol Hill between congressional staff and industry officials.

In a statement submitted into the Congressional Record, Wyden said the Senate had been asked on Tuesday to approve the intelligence authorization bill by unanimous consent. Doing so would bypass any debate. A spokesman for Senate Majority Leader Mitch McConnell, R-Ky., confirmed that leadership had hoped to pass the bill before the August recess, but that not all senators were on board. [Continue reading…]

Facebooktwittermail

NSA will not be allowed to keep old phone records

The New York Times reports: Analysts at the National Security Agency will no longer be permitted to search a database holding five years of Americans’ domestic calling records after Nov. 29, the Obama administration said on Monday.

Legislation enacted in June barred the N.S.A. from collecting Americans’ calling records after 180 days, but did not say what would happen to the data already gathered. Under a new system laid out by the USA Freedom Act, the government will not hold the bulk data, which is used to analyze links between callers in search of terrorism suspects.

Earlier this month, the Office of the Director of National Intelligence declined to say whether the government would keep using the data collected under the old procedures or would purge it after the new system is in place. [Continue reading…]

Facebooktwittermail

Pakistan tried to tap international web traffic via underwater cables, report says

AFP reports: Pakistani intelligence sought to tap worldwide internet traffic via underwater cables that would have given the country a digital espionage capacity to rival the US, according to a report by Privacy International.

The report says the country’s Inter-Services Intelligence (ISI) agency hired intermediary companies to acquire spying toolkits from western and Chinese firms for domestic surveillance.

It also claims the ISI sought access to tap data from three of the four “landing sites” that pass through the country’s port city of Karachi, effectively giving it access to internet traffic worldwide. [Continue reading…]

Facebooktwittermail

Privacy campaigners win concessions in UK surveillance report

The Guardian reports: Privacy campaigners have secured significant concessions in a key report into surveillance by the British security agencies published on Tuesday.

The 132-page report, A Democratic Licence To Operate, which Nick Clegg commissioned last year in the wake of revelations by the US whistleblower Edward Snowden, acknowledges the importance of privacy concerns.

“Privacy is an essential prerequisite to the exercise of individual freedom, and its erosion weakens the constitutional foundations on which democracy and good governance have traditionally been based in this country,” the report says. [Continue reading…]

Facebooktwittermail

MIT report: Giving government special access to data poses major security risks

MIT’s Computer Science and Artificial Intelligence Lab: In recent months, government officials in the United States, the United Kingdom, and other countries have made repeated calls for law-enforcement agencies to be able to access, upon due authorization, encrypted data to help them solve crimes.

Beyond the ethical and political implications of such an approach, though, is a more practical question: If we want to maintain the security of user information, is this sort of access even technically possible?

That was the impetus for a report — titled “Keys under doormats: Mandating insecurity by requiring government access to all data and communications” — just published by security experts from MIT’s Computer Science and Artificial Intelligence Lab (CSAIL), alongside other leading researchers from the U.S. and the U.K.

The report argues that such mechanisms “pose far more grave security risks, imperil innovation on which the world’s economies depend, and raise more thorny policy issues than we could have imagined when the Internet was in its infancy.” [Continue reading…]

Facebooktwittermail

Most people don’t like being spied on by the U.S. and oppose drones

Pew Research Center: Revelations about the scope of American electronic surveillance efforts have generated headlines around the world over the past year. And a new Pew Research Center survey finds widespread global opposition to U.S. eavesdropping and a decline in the view that the U.S. respects the personal freedoms of its people. But in most countries there is little evidence this opposition has severely harmed America’s overall image.

In nearly all countries polled, majorities oppose monitoring by the U.S. government of emails and phone calls of foreign leaders or their citizens. In contrast, Americans tilt toward the view that eavesdropping on foreign leaders is an acceptable practice, and they are divided over using this technique on average people in other countries. However, the majority of Americans and others around the world agree that it is acceptable to spy on suspected terrorists, and that it is unacceptable to spy on American citizens.

Another high-profile aspect of America’s recent national security strategy is also widely unpopular: drones. In 39 of 44 countries surveyed, majorities or pluralities oppose U.S. drone strikes targeting extremists in countries such as Pakistan, Yemen and Somalia. Moreover, opposition to drone attacks has increased in many nations since last year. Israel, Kenya and the U.S. are the only nations polled where at least half of the public supports drone strikes. [Continue reading…]

Facebooktwittermail

East German domestic surveillance went far beyond the Stasi

Der Spiegel reports: One day in September 1987, the phone rang at the headquarters of the Volkspolizei, East Germany’s police force, in the town of Döbeln, not far from Dresden. On the other end of the line was the voice of an unknown man.

“Good evening. I have some information for you. Grab a pen!”
“I’m listening.”
“Ms. Marianne Schneider is traveling on Wednesday, Sept. 14, to West Berlin for a visit. She doesn’t intend to return.”
“And who are you?”
Silence.
“You would like to remain anonymous?”
“Yes.”
“What is the basis for your information?”
“She said so, to her closest friends.”

Then, the mysterious caller hung up. And Marianne Schneider [not her real name] had a problem. Officials immediately revoked her travel permit and began monitoring her phone and mail in addition to questioning her neighbors and friends.

This story is one of spies and informers of the kind that were largely ignored by historians of the German Democratic Republic (DDR) until recently — because they were spies and informers that were not connected to the Stasi, as East Germany’s feared Ministry for State Security was popularly known. Instead, they were totally normal citizens of East Germany who betrayed others: neighbors reporting on neighbors, schoolchildren informing on classmates, university students passing along information on other students, managers spying on employees and Communist bosses denouncing party members.

Up to now, the broad network of so-called “unofficial informants” (IMs) maintained by the Stasi has dominated the popular view of East Germany’s surveillance state. Files full of IM reports became indispensable sources for Stasi victims, politicians, historians and journalists who sought to learn more about either their own personal pasts or about DDR spying practices.

By contrast, audio tapes belonging to the Volkspolizei were largely ignored, as were written testimonials from almost every area of East German society. Government agencies, political parties, associations, companies, universities, cultural institutions: Everywhere, people reported incriminating information about those around them. [Continue reading…]

Facebooktwittermail

A detailed look at Hacking Team’s emails about its repressive clients

The Intercept reports: Documents obtained by hackers from the Italian spyware manufacturer Hacking Team confirm that the company sells its powerful surveillance technology to countries with dubious human rights records.

Internal emails and financial records show that in the past five years, Hacking Team’s Remote Control System software — which can infect a target’s computer or phone from afar and steal files, read emails, take photos and record conversations — has been sold to government agencies in Ethiopia, Bahrain, Egypt, Kazakhstan, Morocco, Russia, Saudi Arabia, South Sudan, Azerbaijan and Turkey. An in-depth analysis of those documents by The Intercept shows Hacking Team’s leadership was, at turns, dismissive of concerns over human rights and privacy; exasperated at the bumbling and technical deficiency of some of its more controversial clients; and explicitly concerned about losing revenue if cut off from such clients.

Hacking Team has an unusually public profile for a purveyor of surreptitious technology, and it has drawn criticism because its malware has shown up on the computers of activists and journalists. Most of the countries identified in the leaked files have previously been connected to Hacking Team by human rights researchers working with computer forensics experts. The company has long denied any implication in human rights abuses, regularly pointing reporters to a policy on its website that says it only sells to governments, investigates allegations of human rights abuses and complies with international blacklists. [Continue reading…]

Facebooktwittermail

XKEYSCORE: NSA’s Google for the world’s private communications

The Intercept reports: One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers. [Continue reading…]

Facebooktwittermail

FISA Court skips talking to privacy advocates

National Journal reports: The secretive court that oversees U.S. spying programs selected to not consult a panel of privacy advocates in its first decision made since the enactment earlier this month of major surveillance reform, according to an opinion declassified Friday.

The Foreign Intelligence Surveillance Court opted to forgo appointing a so-called “amicus” of privacy advocates as it considered whether the USA Freedom Act could reinstate spying provisions of the Patriot Act even though they expired on June 1 amid an impasse in the Senate.

The Court ruled that the Freedom Act’s language — which will restore the National Security Agency’s bulk collection of U.S. call data for six months before transitioning to a more limited program — could revive those lapsed provisions, but in assessing that narrow legal question, Judge Dennis Saylor concluded that the Court did not first need confer with a privacy panel as proscribed under the reform law. [Continue reading…]

Facebooktwittermail

Snowden leak: Governments’ hostile reaction fuelled public’s distrust of spies

The Guardian reports: The hostile reaction of the British and US governments to the Snowden disclosures of mass surveillance only served to heighten public suspicion of the work of the intelligence agencies, according to an international conference of senior intelligence and security figures.

The recently published official account of a Ditchley Foundation conference last month says one of the event’s main conclusions was that greater transparency about the activities and capabilities of the security services would be essential if their credibility was to be preserved and enhanced around the world.

The account of the conference chaired by Sir John Scarlett, the former head of MI6, was published on Friday and makes clear the foundation recognised the widespread public unease following the revelations and that the conditions of data collection about individuals and who has access to it are legitimate areas of concern. [Continue reading…]

Facebooktwittermail

UK intelligence agencies should keep mass surveillance powers, report says

The Guardian reports: UK intelligence agencies should be allowed to retain controversial intrusive powers to gather bulk communications data but ministers should be stripped of their powers to authorise surveillance warrants, according to a major report on British data law.

The 373-page report published on Thursday – A Question of Trust, by David Anderson QC – calls for government to adopt “a clean-slate” approach in legislating later this year on surveillance and interception by GCHQ and other intelligence agencies.

However, Downing Street hinted that David Cameron was unlikely to accept one of his key recommendations: shifting the power to agree to warrants from home and foreign secretaries to a proposed new judicial commissioner. [Continue reading…]

Facebooktwittermail