Search

band annie's Weblog

I have a parallel blog in French at http://anniebannie.net

Category

NSA

“Right Out of a Spy Movie”: Glenn Greenwald on First Secret Meeting with NSA Leaker Edward Snowden

CLICK ON IMAGE

 

snowden

NSA Has Built Its Own, Secret, Warrantless, Shadow Social Network, And You’ve Already Joined It

from the getprsm dept

Soon after the very earliest reporting on Ed Snowden’s leaked documents about PRISM, the folks from Datacoup put together the very amusing GETPRSM website, which looks very much like the announcement of a new social network, but (the joke is) it’s really the NSA scooping up all our data and making the connections.  It’s pretty funny.  Except, of course, when you find out that it’s real.  And, yes, that seems to be the latest revelation out of Ed Snowden’s leaks.  The NY Times has an article by James Risen and Laura Poitras (what a combo reporting team there!) detailing how the NSA has basically built its own “shadow” social network in which it tries to create a “social graph” of pretty much everyone that everyone knows, foreign or American, and it all happens (of course) without a warrant.  And, note, this is relatively new:

The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

There were apparently two policy changes that allowed this to happen, and both occurred in the past three years.  First, in November of 2010, the NSA was allowed to start looking at phone call and email logs of Americans to try to help figure out associations for “foreign intelligence purposes.”  Note that phrase.  We’ll come back to it.  For years, the NSA had been barred from viewing any content on US persons, and the NSA, President Obama and others have continued to insist to this day that there are minimization procedures that prevent spying on Americans.  Except, this latest revelation shows that, yet again, this isn’t actually true.

The second policy change came in January of 2011, when the NSA was told it could start creating this massive “social graph” on Americans without having to make sure they weren’t Americans any more, as indicated above.

Somewhat amazingly, the new report notes that in 2006, the NSA asked the Justice Department for permission to do exactly this sort of thing, and was rejected, saying that a “misuse” of that kind of data “could raise serious concerns.”  Indeed, it could, and does raise serious concerns, but apparently the current administration just doesn’t give a crap.If all of this sounds familiar, it’s almost exactly what the feds tried to setup in 2002 with the Orwellian name Total Information Awareness.   Except that time (right after 9/11, when you’d think the public would be at its most receptive to such programs), as word got out about the program, the public rightly flipped out, and we were told the program was shuttered.  Except, as some have been arguing for years, it was never shuttered, it was just rebuilt in secret.

And, of course, the NSA is still willing to defend this massive breach on Americans’ privacy:

An agency spokeswoman, asked about the analyses of Americans’ data, said, “All data queries must include a foreign intelligence justification, period.”

“All of N.S.A.’s work has a foreign intelligence purpose,” the spokeswoman added. “Our activities are centered on counterterrorism, counterproliferation and cybersecurity.”

Note the continued shift in language.  For a while, they kept saying that the NSA does no surveillance on Americans at all.  At all!  They insisted that would be illegal.  Then, later, people started to note that they would use the phrase “targeting foreign intelligence” which had just enough (barely) wiggle room to get people to think that they were only looking at non-US person data and content, but really meant as long as the overall investigation “targeted” foreign intelligence, it was fine.  Now they’re even walking back from that, and saying that apparently it’s fine to spy on Americans without a warrant so long as there’s “a foreign intelligence justification.”  In short: if you can come up with some excuse for how it might impact something foreign, the NSA can spy on Americans without a warrant.

That’s no limitation at all.  In fact, such a rule is meaningless.  We already know that the NSA gets every telephone record handed over because they claim it’s “necessary” to “connect the dots” on foreign terror plots.  And, similarly, now they’re arguing that they can look at anything else so long as they claim that there’s a “foreign intelligence justification.”  That means they have no limits.  They just have to come up with some wacky reason to claim that so-and-so might have foreign connections that are important to know about, and voila, their life is open for the NSA to dig in, all without any oversight or a warrant.

Somewhat surprisingly, the already disclosed phone metadata dragnet is actually not used for this social network effort, but that doesn’t mean the NSA is lacking in data with which to create this shadow spying social network. It uses the NSA’s taps on fiber optic networks, the ones that collect a ton of internet data, as Dianne Feinstein confirmed last week.

The N.S.A. documents show that one of the main tools used for chaining phone numbers and e-mail addresses has the code name Mainway. It is a repository into which vast amounts of data flow daily from the agency’s fiber-optic cables, corporate partners and foreign computer networks that have been hacked.

The documents show that significant amounts of information from the United States go into Mainway. An internal N.S.A. bulletin, for example, noted that in 2011 Mainway was taking in 700 million phone records per day. In August 2011, it began receiving an additional 1.1 billion cellphone records daily from an unnamed American service provider under Section 702 of the 2008 FISA Amendments Act, which allows for the collection of the data of Americans if at least one end of the communication is believed to be foreign.

Um. That’s an awful lot of records on Americans.  And yet, we’re still being told that the NSA doesn’t spy on Americans?  Yeah, right.

Anyway, it appears that the GETPRSM social network has been in existence for quite some time now, and don’t worry if you haven’t received your invite.  You’ve already joined.

source

Watch the NSA leak like a sieve

There is a world of in­tel­li­gence gath­er­ing that stag­gers in terms of size and depth.Here’s James Bam­ford in Wired on a fu­ture over which cit­i­zens have no say:

Phys­i­cally, the NSA has al­ways been well pro­tected by miles of high fences and elec­tri­fied wire, thou­sands of cam­eras, and gun-tot­ing guards. But that was to pro­tect the agency from those on the out­side try­ing to get in to steal se­crets. Now it is con­fronting a new chal­lenge: those on the in­side going out and giv­ing the se­crets away.

While the agency has had its share of spies, em­ploy­ees who have sold top-se­cret doc­u­ments to for­eign gov­ern­ments for cash, until the last few years it has never had to deal with whistle­blow­ers pass­ing top-se­cret in­for­ma­tion and doc­u­ments to the press be­cause their con­science de­manded it. This in a place where no em­ployee has ever writ­ten a book about the agency (un­like the pro­lific CIA, where it seems that a book con­tract is in­cluded in every exit pack­age).

As some­one who has writ­ten many books and ar­ti­cles about the agency, I have sel­dom seen the NSA in such a state. Like a night prowler with a bag of stolen goods sud­denly caught in a pow­er­ful Klieg light, it now finds it­self under the glare of non­stop press cov­er­age, ac­cused of rob­bing the pub­lic of its right to pri­vacy. De­spite the stan­dard de­nials from the agency’s pub­lic re­la­tions of­fice, the doc­u­ments out­line a mas­sive op­er­a­tion to se­cretly keep track of every­one’s phone calls on a daily basis – bil­lions upon bil­lions of pri­vate records; and an­other to reroute the pipes going in and out of Google, Apple, Yahoo, and the other In­ter­net gi­ants through Fort Meade – fig­u­ra­tively if not lit­er­ally. 

But long be­fore Ed­ward Snow­den walked out of the NSA with his trove of doc­u­ments, whistle­blow­ers there had been try­ing for years to bring at­ten­tion to the mas­sive turn to­ward do­mes­tic spy­ing that the agency was mak­ing. Last year in my Wired cover story on the enor­mous new NSA data cen­ter in Utah, Bill Bin­ney, the man who largely de­signed the agency’s world­wide eaves­drop­ping sys­tem, warned of the se­cret, na­tion­wide sur­veil­lance. He told how the NSA had gained ac­cess to bil­lions of billing records not only from AT&T but also from Ver­i­zon. “That mul­ti­plies the call rate by at least a fac­tor of five,” he said. “So you’re over a bil­lion and a half calls a day.” Among the top-se­cret doc­u­ments Snow­den re­leased was a For­eign In­tel­li­gence Sur­veil­lance Court order prov­ing the truth to Bin­ney’s claim and in­di­cat­ing that the op­er­a­tion was still going on.

I also wrote about Adri­enne J. Kinne, an NSA in­ter­cept op­er­a­tor who at­tempted to blow the whis­tle on the NSA’s il­le­gal eaves­drop­ping on Amer­i­cans fol­low­ing the 9/11 at­tacks. “Ba­si­cally all rules were thrown out the win­dow,” she said, “and they would use any ex­cuse to jus­tify a waiver to spy on Amer­i­cans.” Even jour­nal­ists call­ing home from over­seas were in­cluded. “A lot of time you could tell they were call­ing their fam­i­lies,” she says, “in­cred­i­bly in­ti­mate, per­sonal con­ver­sa­tions.” She only told her story to me after at­tempt­ing, and fail­ing, to end the il­le­gal ac­tiv­ity with ap­peals all the way up the chain of com­mand to Major Gen­eral Keith Alexan­der, head of the Army’s In­tel­li­gence and Se­cu­rity Com­mand at the time. 

With­out doc­u­ments to prove their claims, the agency sim­ply dis­missed them as false­hoods and much of the main­stream press sim­ply ac­cepted that. “We don’t hold data on U.S. cit­i­zens,” Alexan­der said in a talk at the Amer­i­can En­ter­prise In­sti­tute last sum­mer, by which time he had been serv­ing as the head of the NSA for six years. Di­rec­tor of Na­tional In­tel­li­gence James Clap­per made sim­i­lar claims. At a hear­ing of the Sen­ate In­tel­li­gence Com­mit­tee last March, he was asked, “Does the NSA col­lect any type of data at all on mil­lions or hun­dreds of mil­lions of Amer­i­cans?” To which Clap­per re­sponded, “No, sir.” The doc­u­ments re­leased by Snow­den, point­ing to the na­tion­wide col­lec­tion of tele­phone data records and not de­nied by gov­ern­ment of­fi­cials, prove the re­sponses un­true.

The de­cep­tion by Gen­eral Alexan­der is es­pe­cially trou­bling. In my new cover story for Wired’s July issue, which will be pub­lished on­line Thurs­day, I show how he has be­come the most pow­er­ful in­tel­li­gence chief in the na­tion’s his­tory. Never be­fore has any­one in Amer­ica’s in­tel­li­gence sphere come close to his de­gree of power, the num­ber of peo­ple under his com­mand, the ex­panse of his rule, the length of his reign, or the depth of his se­crecy. A four-star Army gen­eral, his au­thor­ity ex­tends across three do­mains: He is di­rec­tor of the world’s largest in­tel­li­gence ser­vice, the Na­tional Se­cu­rity Agency; chief of the Cen­tral Se­cu­rity Ser­vice; and com­man­der of the U.S. Cyber Com­mand. As such, he has his own se­cret mil­i­tary, pre­sid­ing over the Navy’s 10th Fleet, the 24th Air Force, and the Sec­ond Army.

The ar­ti­cle also sheds light on the enor­mous pri­va­ti­za­tion not only of the in­tel­li­gence agen­cies but now also of Cyber Com­mand, with thou­sands of peo­ple work­ing for lit­tle-known com­pa­nies hired to de­velop the weapons of cyber war, cyber tar­get­ing, and cyber ex­ploita­tion. The Snow­den case demon­strates the po­ten­tial risks in­volved when the na­tion turns its spy­ing and eaves­drop­ping over to com­pa­nies with lax se­cu­rity and in­ad­e­quate per­son­nel poli­cies. The risks in­crease ex­po­nen­tially when those same peo­ple must make crit­i­cal de­ci­sions in­volv­ing choices that may lead to war, cyber or oth­er­wise.

At a time when the NSA has lost its way and is in­creas­ingly in­fring­ing on the pri­vacy of or­di­nary Amer­i­cans, it shouldn’t come as much of a sur­prise that NSA em­ploy­ees —  whether work­ing for the agency or for one of its con­trac­tors — would feel the oblig­a­tion to alert the pub­lic to the se­cret acts being car­ried out in its name. The only sur­prise is that we haven’t seen more such dis­clo­sures. Gen­eral Alexan­der will surely use all his con­sid­er­able power to pre­vent them. Don’t be sur­prised if he fails.

Inside Obama’s “Orwellian World” Where Whistleblowing Has Become Espionage: The Case of Thomas Drak

click on image

National Security Agency whistleblower Thomas Drake faces 35 years in prison on espionage charges for alleged unauthorized “willful retention” of five classified documents. “Espionage is the last thing my whistleblowing and First Amendment activities and actions were all about,” Drake said recently in a public speech. “This has become the specter of a truly Orwellian world where whistleblowing has become espionage.” According to The New Yorker, the Obama administration has used the Espionage Act of 1917 to press criminal charges in five alleged instances of national security leaks—more such prosecutions than have occurred in all previous administrations combined. We play excerpts of Thomas Drake’s first public comments and talk to former Justice Department whistleblower, Jesselyn Radack.

Biggest Spy Center (Watch What You Say)

By 

Photo: Name Withheld; Digital Manipulation: Jesse Lenz

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

Magazine2004

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.

Read full article here 

Listen to Democracy Now

Blog at WordPress.com.

Up ↑