Peter Koop writes: Documents recently disclosed by Edward Snowden show that the NSA’s fourth-largest cable tapping program, codenamed INCENSER, pulls its data from just one single source: a submarine fiber optic cable linking Asia with Europe.
Until now, it was only known that INCENSER was a sub-program of WINDSTOP and that it collected some 14 billion pieces of internet data a month. The latest revelations now say that these data are collected with the help of the British company Cable & Wireless (codenamed GERONTIC, now part of Vodafone) at a location in Cornwall in the UK, codenamed NIGELLA.
For the first time, this gives us a view on the whole interception chain, from the parent program all the way down to the physical interception facility. Here we will piece together what is known about these different stages and programs from recent and earlier publications. [Continue reading…]
Category Archives: surveillance
Spy cable revealed: How Cable and Wireless worked with GCHQ
Read more at Channel 4 News and Süddeutsche Zeitung.
UK inquiry criticizes U.S. tech companies for failing to engage in counter-terrorism surveilance
Wired reports: GCHQ has direct access to “major internet cables” and has systems to monitor communications as they “traverse the internet” an official government report has revealed. The spy agency, which has been heavily criticised in the wake of the Snowden leaks, also admits that it has more data than it can handle. Despite these capabilities the government is being urged to massively expand its surveillance powers.
The details come from the Intelligence Security Committee’s inquiry (PDF) into the murder of the fusilier Lee Rigby by Michael Adebolajo and Michael Adebowale in Woolwich, London in 2013. While crucial details have been redacted for security reasons, the report still reveals the scale of the surveillance powers at GCHQ’s disposal.
Detailing GCHQ’s capabilities it notes that the spy agency has access to around “*** percent of global internet traffic and approximately *** percent of internet traffic entering or leaving the UK”. Despite the redactions the report does reveal that GCHQ is currently overwhelmed by the amount of data it has to process:
“The resources required to process the vast quantity of data involved mean that, at any one time, GCHQ can only process approximately *** of what they can access.”
The inquiry, which was set up to investigate what could have prevented Rigby’s murder, clears both M15 and M16 of any fault. It reveals that both Adebolajo and Adebowale were known to British security agencies, but that no action was taken. As both men were seen as low priority targets they were not subject to any specialist surveillance by GCHQ or any other agency.
The committee was far more damning in its assessment of an as-yet-unnamed US internet company. In December 2012 an exchange between Adebowale and an individual overseas revealed his intention to murder a soldier. The exchange was not seen by UK security services until after the attack. The report intimates that all overseas internet companies risk becoming a “safe haven for terrorists”.
“This company does not appear to regard itself as under any obligation to ensure that its systems identify such exchanges, or to take action or notify the authorities when its communications services appear to be used by terrorists.”
The Guardian identifies this company as Facebook.
The Wired report continues: “When the intelligence services are gathering data about everyone of us but failing to act on intelligence about individuals, they need to get back to basics, and look at the way they conduct targeted investigations,” said Jim Killock, executive director of online privacy advocates the Open Rights Group.
“The committee is particularly misleading when it implies that US companies do not cooperate, and it is quite extraordinary to demand that companies pro-actively monitor email content for suspicious material. Internet companies cannot and must not become an arm of the surveillance state.”
Want to avoid government malware? Ask a former NSA hacker
The Guardian reports: Many of the brightest minds from the National Security Agency and GCHQ staff tire themselves out from long years of service, moving out into the comfort of the private sector.
Unsurprisingly, the security industry welcomes them with open arms. After all, who better to hand out advice than alumni of two of the most sophisticated intelligence agencies on the planet?
A young British company called Darktrace, whose technology was spawned in the classrooms and bedrooms of Cambridge University, can now boast a covey of former spies among their executive ranks. Jim Penrose, who spent 17 years at the NSA and was involved in the much-feared Tailored Access Operations group (TAO), is one of Darktrace’s latest hires.
Though he declined to confirm or deny any of the claims made about TAO’s operations, including Edward Snowden leaks that showed it had hacked into between 85,000 and 100,000 machines around the world, Penrose spoke with the Guardian about how people might want to defend themselves from government-sponsored cyber attacks. [Continue reading…]
Utah considers cutting off water to the NSA’s monster data center
Wired reports: Lawmakers are considering a bill that would shut off the water spigot to the massive data center operated by the National Security Agency in Bluffdale, Utah.
The legislation, proposed by Utah lawmaker Marc Roberts, is due to go to the floor of the Utah House of Representatives early next year, but it was debated in a Public Utilities and Technology Interim Committee meeting on Wednesday. The bill, H.B. 161, directs municipalities like Bluffdale to “refuse support to any federal agency which collects electronic data within this state.”
The NSA brought its Bluffdale data center online about a year ago, taking advantage Utah’s cheap power and a cut-rate deal for millions of gallons of local water, used to cool the 1-million-square-foot building’s servers. Roberts’ bill, however, would prohibit the NSA from negotiating new water deals when its current Bluffdale agreement runs out in 2021.
The law seems like a long-shot to clear legislative hurdles when Utah’s legislature re-convenes next year, but Wednesday’s committee hearing was remarkable, nonetheless, says Nate Carlisle, a reporter with the Salt Lake Tribune who has waged a fight with the NSA and Bluffdale officials to determine how much water the data center is actually using. “What’s noteworthy is no one on the panel said: ‘Hey, wait a minute, we can’t do this,’” he says. “They had some specific concerns about the language of the bill, but there was no outright opposition.” [Continue reading…]
UK police spied on reporters for years, documents show
The Associated Press reports: In January, freelance video journalist Jason Parkinson returned home from vacation to find a brown paper envelope in his mailbox. He opened it to find nine years of his life laid out in shocking detail.
Twelve pages of police intelligence logs noted which protests he covered, who he spoke to and what he wore — all the way down to the color of his boots. It was, he said, proof of something he’d long suspected: The police were watching him.
“Finally,” he thought as he leafed through documents over a strong black coffee, “we’ve got them.”
Parkinson’s documents, obtained through a public records request, are the basis of a lawsuit being filed by the National Union of Journalists against London’s Metropolitan Police and Britain’s Home Office. The lawsuit, announced late Thursday, along with a recent series of revelations about the seizure of reporters’ phone records, is pulling back the curtain on how British police have spent years tracking the movements of the country’s news media.
“This is another extremely worrying example of the police monitoring journalists who are undertaking their proper duties,” said Paul Lashmar, who heads the journalism department at Britain’s Brunel University. [Continue reading…]
Jason Parkinson writes: Now the National Union of Journalists (NUJ) and our lawyers at Bhatt Murphy are bringing a judicial review in the high court. Our group of six NUJ members will challenge the collection and retention of this data. We want our files erased and we want a policy to protect all journalists and trade union activists from future state surveillance.
Around 2007, police interest in journalists increased. In those days, it was the infamous forward intelligence teams, or FIT squads. Many journalists faced stop-and-search, often under the Terrorism Act. Just trying to get to a protest we had been hired to cover was a job in itself.
After several years of complaints and launching campaign group I’m a Photographer Not a Terrorist, the NUJ launched an investigation into surveillance of its members, in particular police surveillance at the Kingsnorth climate camp and gave evidence to the joint committee on human rights on the scale of the problem. NUJ-funded films Collateral Damage and Hostile Reconnaissance exposed what was happening on the ground, including increased violence towards the press. [Continue reading…]
Americans’ cellphones targeted in secret U.S. spy program
The Wall Street Journal reports: The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.
The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.
Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information. [Continue reading…]
More federal agencies are using undercover operations
The New York Times reports: The federal government has significantly expanded undercover operations in recent years, with officers from at least 40 agencies posing as business people, welfare recipients, political protesters and even doctors or ministers to ferret out wrongdoing, records and interviews show.
At the Supreme Court, small teams of undercover officers dress as students at large demonstrations outside the courthouse and join the protests to look for suspicious activity, according to officials familiar with the practice.
At the Internal Revenue Service, dozens of undercover agents chase suspected tax evaders worldwide, by posing as tax preparers, accountants drug dealers or yacht buyers and more, court records show.
At the Agriculture Department, more than 100 undercover agents pose as food stamp recipients at thousands of neighborhood stores to spot suspicious vendors and fraud, officials said.
Undercover work, inherently invasive and sometimes dangerous, was once largely the domain of the F.B.I. and a few other law enforcement agencies at the federal level. But outside public view, changes in policies and tactics over the last decade have resulted in undercover teams run by agencies in virtually every corner of the federal government, according to officials, former agents and documents. [Continue reading…]
ISIS keeps getting better at dodging U.S. spies
The Daily Beast reports: On Thursday, around the same time ISIS leader Abu Bakr al Baghdadi announced that he had survived a U.S. airstrike and promised in a recorded message to “erupt volcanos of jihad,” American officials were meeting to discuss just how hard it was to track the militant group.
Baghdadi and his followers have proven exceptionally difficult to track and kill because they’re encrypting their communications and taking steps to avoid being detected by U.S. surveillance, according to several current and former officials. Without American intelligence operatives on the ground in ISIS’s home base of Syria—and with only a limited number of surveillance planes in the air—those communications are one of the only surefire ways to keep tabs on ISIS.
In addition to encryption that American officials say has proven very difficult to crack, ISIS is also using a commercially available service that permanently deletes messages sent via the Internet, making them nearly impossible to intercept, according to an individual who was briefed on the issue Thursday. This person didn’t name the service, but one application widely used in Iraq is called FireChat, which allows users to send messages to each other without connecting to the Internet. [Continue reading…]
Why Google is scarier than the NSA
For anyone who is really afraid of what the NSA might do with its information gathering capabilities, there’s a simple personal solution: stop using electronic devises.
Simple, but not easy — at least for most people.
Given that most Americans are now tied to their devices as though they were dialysis machines on which our lives depend, we should probably be more concerned, however, about how we are being watched constantly and the information gathered is constantly being used not by the Big Brother of our fears but instead by the Big Brother that truly follows our every step.
James Robinson writes: I’ve been in Boston all week. I had to tell my mother where I was, but not Google. Its seamlessness in switching up my Google ad results, changing its suggestions to me of places to visit and ads to click on, was instantaneous.
Google knew where I was going, as I was making the trip. We’re used to this by now. It’s justified under the umbrella of modern convenience. But should it be?
This morning, a new Public Citizen report, “Mission Creep-y: Google is Quietly Becoming One of the Nation’s Most Powerful Political Forces While Expanding Its Information-Collecting Empire” came across my desk. It doesn’t break news. But it is an exhausting catalog of Google’s powerful information gathering apparatus, its missteps, and its massive social ambition.
When you put the isolated pieces together, it can kind of make you choke on your breakfast.
At a consumer level, Google is all over you. Its search algorithm takes in 200 different variables about you, pulling in information it gleans from your use of all of its products: Maps, YouTube, Gmail, and more. These are services you use, like, all of the time that can reveal very personal things. Since 2012, Google has made it its stated policy to track you as one user across all of its services, no matter what device you’re using. (This “comingling” of information, e.g. search history with chat transcripts, resulted in several lawsuits from privacy groups.)
Through its acquisition of DoubleClick Google knows what websites you were on when you saw a certain ad. Like all companies, it tracks your web history by placing a cookie in your browser. But because of the prevalence of Google Analytics and DoubleClick across the web now, once Google has identified you, it’s really, really difficult for you to ever be out of the company’s sight. [Continue reading…]
Tracking ISIS, stalking the CIA: how anyone can be big brother online
Tom Fox-Brewster writes: “Our choice isn’t between a world where either the good guys spy or the bad guys spy. It’s a choice of everybody gets to spy or nobody gets to spy.” So said the security luminary Bruce Schneier at BBC Future’s World-Changing Ideas Summit in October. He was considering a world in which the metadata zipping around us and the static information sitting on web servers across the globe is accessible to those with the means and the will to collect it all.
With so many cheap or free tools out there, it is easy for anyone to set up their own NSA-esque operations and collect all this data. Though breaching systems and taking data without authorisation is against the law, it is possible to do a decent amount of surveillance entirely legally using open-source intelligence (OSINT) tools. If people or organisations release data publicly, whether or not they mean to do so, users can collect it and store it in any way they see fit.
That is why, despite having a controversial conviction to his name under the Computer Misuse Act, Daniel Cuthbert, chief operating officer of security consultancy Sensepost, has been happily using OSINT tool Maltego (its open-source version is charmingly called Poortego) to track a number of people online.
Over a few days this summer, he was “stalking” a Twitter user who appeared to be working at the Central Intelligence Agency. Maltego allowed him to collect all social media messages sent out into the internet ether in the area around the CIA’s base in Langley, Virginia. He then picked up on the location of further tweets from the same user, which appeared to show her travelling between her own home and a friend or partner’s house. Not long after Cuthbert started mapping her influence, her account disappeared.
But Cuthbert has been retrieving far more illuminating data by running social network accounts related to Islamic State through Maltego. By simply adding names to the OSINT software and asking it to find links between accounts using commands known as “transforms”, Maltego draws up real-time maps showing how users are related to each other and then uncovers links between their followers. It is possible to gauge their level of influence and which accounts are bots rather than real people. Where GPS data is available, location can be ascertained too, though it is rare to find accounts leaking this – only about 2% of tweets have the feature enabled, says Cuthbert. [Continue reading…]
A spy’s deceptive complaints
Who is more delusional: the spies, for saying Silicon Valley is in bed with ISIS, or Silicon Valley, for denying it's in bed with the spies?
— Evgeny Morozov (@evgenymorozov) November 4, 2014
In an editorial, the New York Times says: Robert Hannigan, the new director of Britain’s electronic intelligence agency, threw down quite a gauntlet with an op-ed article in The Financial Times arguing that the ever more secure communications services provided by the American technology companies that dominate the web have become the “command-and-control networks of choice for terrorists and criminals.” He is not the first spy to complain that post-Snowden concerns over privacy, including increased encryption on the web, have put serious constraints on fighting terrorism, though his phrasing is the toughest yet.
Mr. Hannigan primarily makes two points. One, quite familiar, is that the Islamic State has been spectacularly successful in using the web to promote itself, intimidate enemies and radicalize recruits. The other is that tougher privacy controls have enabled the terrorists to conceal their operations, while impeding “lawful investigation by security and law enforcement agencies.” But the crocodile tears of the intelligence chiefs overlook the fact that before those barriers were put in place, the United States National Security Agency and Mr. Hannigan’s GCHQ misused their powers for an illegal dragnet surveillance operation. The technology companies are doing their job in protecting people’s private data precisely because the intelligence agencies saw fit to rummage through that data.
Mr. Hannigan’s argument overlooks the many legal avenues intelligence agencies have to seek data. Demanding that the technology companies leave “back doors” open to their software or hardware also potentially assists Chinese, Russian and other hackers in accessing reams of data.
Still, there is a terrorist threat; it is dispersed around the world and it does have a global tool on the web and in social networks. At the same time, there are powerful reasons for technology companies to protect the economic interests, personal privacy and civil liberties of their clients.
The ways to solve potential conflicts include requiring court orders for data mining, restrictions on specific practices such as exploiting the back doors, and far stronger oversight of the intelligence community. They do not include blaming technology companies for doing their job.
Yes, ISIS exploits technology. But that’s no reason to compromise our privacy
John Naughton writes: A headline caught my eye last Tuesday morning. “Privacy not an absolute right, says GCHQ chief”, it read. Given that GCHQ bosses are normally sensibly taciturn types, it looked puzzling. But it turns out that Sir Iain Lobban has retired from GCHQ to spend more time with his pension, to be followed no doubt, after a discreet interval, with some lucrative non-exec directorships. His successor is a Foreign Office smoothie, name of Robert Hannigan, who obviously decided that the best form of defence against the Snowden revelations is attack, which he mounted via an op-ed piece in the Financial Times, in the course of which he wrote some very puzzling things.
Much of his piece is a rehearsal of how good Isis has become at exploiting social media. Its members “use messaging and social media services such as Twitter, Facebook and WhatsApp, and a language their peers understand. The videos they post of themselves attacking towns, firing weapons or detonating explosives have a self-conscious online gaming quality. Their use of the World Cup and Ebola hashtags to insert the Isis message into a wider news feed, and their ability to send 40,000 tweets a day during the advance on Mosul without triggering spam controls, illustrates their ease with new media. There is no need for today’s would-be jihadis to seek out restricted websites with secret passwords: they can follow other young people posting their adventures in Syria as they would anywhere else.”
All of which is spot-on. From the very beginning, Isis fanatics have been up to speed on this stuff. Which raises an interesting question: how come that GCHQ and the other intelligence agencies failed to notice the rise of the Isis menace until it was upon us? Were they so busy hoovering metadata and tapping submarine cables and “mastering the internet” (as the code name of one of their projects puts it) that they didn’t have time to see what every impressionable Muslim 14-year-old in the world with an internet connection could see? [Continue reading…]
Federal judge says public has a right to know about FBI’s facial recognition database
Nextgov reports: A federal judge has ruled that the FBI’s futuristic facial-recognition database is deserving of scrutiny from open-government advocates because of the size and scope of the surveillance technology.
U.S. District Judge Tanya Chutkan said the bureau’s Next Generation Identification program represents a “significant public interest” due to concerns regarding its potential impact on privacy rights and should be subject to rigorous transparency oversight.
“There can be little dispute that the general public has a genuine, tangible interest in a system designed to store and manipulate significant quantities of its own biometric data, particularly given the great numbers of people from whom such data will be gathered,” Chutkan wrote in an opinion released late Wednesday.
Her ruling validated a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center that last year made a 2010 government report on the database public and awarded the group nearly $20,000 in attorneys’ fees. That government report revealed the FBI’s facial-recognition technology could fail up to 20 percent of the time. Privacy groups believe that failure rate may be even higher, as a search can be considered successful if the correct suspect is listed within the top 50 candidates. [Continue reading…]
Shamsi and Harwood: An electronic archipelago of domestic surveillance
Let me tell you my modest post-9/11 dream. One morning, I’ll wake up and see a newspaper article that begins something like this: “The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to curtail the agency’s significant powers to hack into and carry out surveillance of computers.” Now, wouldn’t that be amazing? Unfortunately, as you’ve undoubtedly already guessed, that day didn’t come last week. To create that sentence I had to fiddle with the odd word or two in the lead sentence of an article about the FBI’s attempt to gain “significant new powers to hack into and carry out surveillance of computers throughout the U.S. and around the world.”
When it comes to the expansion of our national security-cum-surveillance state, last week was just another humdrum seven days of news. There were revelations about the widespread monitoring of the snail mail of Americans. (“[T]he United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations.”) There was the news that a “sneak and peek” provision in the Patriot Act that “allows investigators to conduct searches without informing the target of the search” was now being used remarkably regularly. Back in 2001, supporters of the Act had sworn that the provision would only be applied in rare cases involving terrorism. Last week we learned that it is being used thousands of times a year as a common law enforcement tool in drug cases. Oh, and on our list should go the FBI’s new push to get access to your encrypted iPhones!
And don’t forget the reports on the Bureau’s remarkably creative attempts to cross various previously forbidden search and surveillance lines. Last week, for instance, we learned that FBI agents impersonated a media outfit, creating a fake Associated Press article in 2007 in order to implant malware on the computer of a 15-year-old suspected of making bomb threats. (“The AP said the plan undermined the independence of the press. The story also compromised its credibility to gather news safely and effectively, especially in parts of the world where its credibility relies on its independence.”) Similarly, news tumbled out about a recent investigation into illegal gambling in which the FBI turned off the Internet in three Las Vegas luxury “villas” that belonged to the Caesar’s Palace Hotel and Casino and then sent in its agents without warrants as “repairmen,” in the process secretly making videos that led to arrests.
Call it just another week of ho-hum news about American intelligence and law enforcement outfits running roughshod over American rights and the Constitution. And then, of course, there are those ever-expanding watchlists meant to keep you safe from “terrorism.” As Hina Shamsi and Matthew Harwood of the ACLU point out, the web of watchlists on which Americans might now find their names circulating is staggeringly, redundantly vast and still expanding. It essentially adds up to a post-9/11 secret system of identification, they write, that once would have boggled the American imagination but is now just an accepted part of the American way of life. Tom Engelhardt
Uncle Sam’s databases of suspicion
A shadow form of national ID
By Hina Shamsi and Matthew HarwoodIt began with an unexpected rapping on the front door.
When Wiley Gill opened up, no one was there. Suddenly, two police officers appeared, their guns drawn, yelling, “Chico Police Department.”
“I had tunnel vision,” Gill said, “The only thing I could see was their guns.”
Government requests for Facebook user data are up 24% in six months
The Los Angeles Times reports: Government requests for Facebook data increased 24% in just six months, the social media giant said Tuesday, and nearly half of those requests came from the United States.
Between January and June, governments across the globe made 34,946 requests for data, according to the Menlo Park, Calif., company’s latest transparency report. The United States was responsible for 15,433 of those requests, spanning 23,667 accounts.
Facebook turned over data in about 80% of the cases; many of the requests were parts of search warrants or subpoenas, the report shows. The amount of content restricted or removed because of local laws increased about 19% since the end of 2013.
The world’s largest social network began releasing transparency reports in June 2013, after revelations that the company shared user data with the National Security Agency’s secret Internet surveillance program, Prism.
“We scrutinize every government request we receive for legal sufficiency under our terms and the strict letter of the law, and push back hard when we find deficiencies or are served with overly broad requests,” Facebook’s deputy general counsel, Chris Sonderby, said in a statement.
Over the same period, Twitter received 2,058 government requests, 1,257 of which were from the U.S. government, according to its September transparency report. It shared data in 73% of those cases.
Google has seen a 15% increase in requests since the second half of last year, and a 150% jump since the company began publishing such data in 2009. In the United States, requests have hiked 19% and 250%, respectively.
The PR departments inside the social media giants must love reports like this. Facebook, Twitter et al, get to play victims of government power and cast themselves as heroic defenders of public interest, dedicated to transparency and strict compliance with the law.
What gets glossed over is the fact that the data buccaneer, the NSA, that would have no data to plunder if it wasn’t being gathered by the internet companies in the first place.
New GCHQ chief spouts fiery rhetoric but spying agenda is same as before
James Ball reports: The new chief of GCHQ, Robert Hannigan, had two options when taking his post. As a relative outsider, joining the organisation from the Foreign Office, he could choose to strike a new, conciliatory tack in the post-Snowden surveillance debate – or he could defend the agency’s practices.
Barely six days into the job, Hannigan has signalled he will go with the latter. In a Financial Times opinion piece, he went much further than his predecessor’s valedictory address in pushing the traditional spy agency pro-surveillance agenda.
US technology giants, he said, have become “the command-and-control networks of choice for terrorists and criminals”. Privacy “has never been an absolute right”. Even principles of free speech are terror aids: Isis are “capitalising on western freedom of expression”, he stated.
By the usually moribund rhetorical standards of senior UK intelligence officials, this is fiery stuff. But the agenda behind it is very much business as usual. The UK’s intelligence agencies take the approach that they will get little credit for protecting civil liberties, but would be on the receiving end of huge opprobrium were they to fail prevent an attack. As a result, they lobby successive governments every year for ever-more powers, a small step at a time. [Continue reading…]
The FBI’s secret House meeting to get access to your iPhone
National Journal reports: The Obama administration is ramping up its campaign to force technology companies to help the government spy on their users.
FBI and Justice Department officials met with House staffers this week for a classified briefing on how encryption is hurting police investigations, according to staffers familiar with the meeting.
The briefing included Democratic and Republican aides for the House Judiciary and Intelligence Committees, the staffers said. The meeting was held in a classified room, and aides are forbidden from revealing what was discussed.