Search

band annie's Weblog

I have a parallel blog in French at http://anniebannie.net

Tag

Edward Snowden

“Right Out of a Spy Movie”: Glenn Greenwald on First Secret Meeting with NSA Leaker Edward Snowden

CLICK ON IMAGE

 

snowden

“Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N.

click on image
Glenn Greenwald

Nearly a year after he first met Edward Snowden, Pulitzer Prize-winning journalist Glenn Greenwald continues to unveil new secrets about the National Security Agency and the surveillance state. His new book, “No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State,” is being published today. It includes dozens of previously secret NSA documents, including new details on how the NSA routinely intercepts routers, servers and other computer hardware devices being exported from the United States. According to leaked documents published in the book, the NSA then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. This gives the NSA access to entire networks and all their users. The book includes one previously secret NSA file that shows a photo of an agent opening a box marked CISCO. Below it reads a caption: “Intercepted packages are opened carefully.” Another memo observes that some signals intelligence tradecraft is “very hands-on (literally!).”

Greenwald joins us in the studio to talk about this and other new revelations about the NSA, including its global economic espionage, spying at the United Nations, and attempting to monitor in-flight Internet users and phone calls. For his reporting on the NSA, Greenwald recently won a George Polk Award and was part of the team from The Guardian that just won the Pulitzer Prize in Public Service.

“Once people understood that this extraordinary system of suspicionless surveillance, which was truly unprecedented in scope, had been created completely in the dark, it became more than a surveillance story,” Greenwald says. “It became a story about government secrecy and accountability and the role of journalism, and certainly privacy and surveillance in the digital age.”

TRANSCRIPT

This is a rush transcript. Copy may not be in its final form.

AMY GOODMAN: Today we bring you a Democracy Now! special: the first of a two-day interview with investigative journalist Glenn Greenwald. He has just published a riveting new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. The book chronicles the inside story behind perhaps the biggest leak in the nation’s history.

Greenwald and filmmaker Laura Poitras were the journalists who first met former National Security Agency contractor Edward Snowden in Hong Kong last June. Days after their first meeting, Greenwald published an explosive article in The Guardian about the NSA collecting the phone records of millions of Verizon customers daily. It was the first of hundreds of articles based on documents leaked by Snowden. And more disclosures are now coming out. Greenwald’s book includes dozens of previously secret NSA documents.

For his reporting on the NSA, Glenn Greenwald recently won a George Polk Award and was part of the team from The Guardian that just won the Pulitzer Prize in Public Service.

Glenn Greenwald came to Democracy Now!’s studios on Monday.

see full transcript here

FULL: Edward Snowden and ACLU at SXSW

A selection from Democracy Now of Friday February 28 2014

Peeping Webcam? With NSA Help, British Spy Agency Intercepted Millions of Yahoo Chat Images

Worse than Big Brother 1984

Freed Bahraini Activist Zainab Alkhawaja on Her Year in Prison, Continued Detention of Her Father

I salute the courage of that woman who by speaking out now, could be sent back to jail

I Was Beaten, Tortured: Pakistani Anti-Drone Activist Karim Khan on Being Abducted by Masked Men

A Christmas Message From Edward Snowden

Vote for Edward Snowden as TIME’s 2013 Person of the Year

timepoy-snowdentimepoy-snowden-vs-obama

TIME:

As always, TIME’s editors will choose the Person of the Year, but that doesn’t mean readers shouldn’t have their say. Cast your vote for the person you think most influenced the news this year for better or worse – in both a straight yes/no poll and a candidate face-off. Voting closes at 11:59 p.m. on Dec. 4, and the combined winner of our reader polls will be announced on Dec. 6. TIME’s Person of the Year will be announced Dec. 11.

Screenshots @ 1AM EST, 11/26

timepoy-results

Ex-CIA Analyst on Snowden and Calling Journalists Terrorists

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say

In this slide from a National Security Agency presentation on “Google Cloud Exploitation,” a sketch shows where the “Public Internet” meets the internal “Google Cloud” where user data resides. Two engineers with close ties to Google exploded in profanity when they saw the drawing.

By Barton Gellman and Ashkan Soltani, Published: October 30 E-mail the writer

The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.

Graphic

How the NSA is hacking private networks, such as Google’s

Click Here to View Full Graphic Story

How the NSA is hacking private networks, such as Google’s

More on this story:

How MUSCULAR collects too much data from Yahoo and Google

How MUSCULAR collects too much data from Yahoo and Google

OCT 30

This NSA document describes a common problem of collecting too much information – and how the agency is attempting to control it.

Why the NSA wanted more access

Why the NSA wanted more access

Andrea Peterson OCT 30

The NSA already legally compelled tech companies to give it data via PRISM. So why did it hack into data links?

Full coverage: NSA Secrets

Full coverage: NSA Secrets

Read all of the stories in The Washington Post’s ongoing coverage of the National Security Agency’s surveillance programs.

According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including  “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.
The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters. From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.

The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.

In a statement, the NSA said it is “focused on discovering and developing intelligence about valid foreign intelligence targets only.”

“NSA applies Attorney General-approved processes to protect the privacy of U.S. persons — minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination,” it said.

In a statement, Google’s chief legal officer, David Drummond, said the company has “long been concerned about the possibility of this kind of snooping” and has not provided the government with access to its systems.

“We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” he said.

A Yahoo spokeswoman said, “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

Under PRISM, the NSA gathers huge volumes of online communications records by legally compelling U.S. technology companies, including Yahoo and Google, to turn over any data that match court-approved search terms. That program, which was first disclosed by The Washington Post and the Guardian newspaper in Britain, is authorized under Section 702 of the FISA Amendments Act  and overseen by the Foreign ­Intelligence Surveillance Court (FISC).

read on here

NSA Has Built Its Own, Secret, Warrantless, Shadow Social Network, And You’ve Already Joined It

from the getprsm dept

Soon after the very earliest reporting on Ed Snowden’s leaked documents about PRISM, the folks from Datacoup put together the very amusing GETPRSM website, which looks very much like the announcement of a new social network, but (the joke is) it’s really the NSA scooping up all our data and making the connections.  It’s pretty funny.  Except, of course, when you find out that it’s real.  And, yes, that seems to be the latest revelation out of Ed Snowden’s leaks.  The NY Times has an article by James Risen and Laura Poitras (what a combo reporting team there!) detailing how the NSA has basically built its own “shadow” social network in which it tries to create a “social graph” of pretty much everyone that everyone knows, foreign or American, and it all happens (of course) without a warrant.  And, note, this is relatively new:

The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

There were apparently two policy changes that allowed this to happen, and both occurred in the past three years.  First, in November of 2010, the NSA was allowed to start looking at phone call and email logs of Americans to try to help figure out associations for “foreign intelligence purposes.”  Note that phrase.  We’ll come back to it.  For years, the NSA had been barred from viewing any content on US persons, and the NSA, President Obama and others have continued to insist to this day that there are minimization procedures that prevent spying on Americans.  Except, this latest revelation shows that, yet again, this isn’t actually true.

The second policy change came in January of 2011, when the NSA was told it could start creating this massive “social graph” on Americans without having to make sure they weren’t Americans any more, as indicated above.

Somewhat amazingly, the new report notes that in 2006, the NSA asked the Justice Department for permission to do exactly this sort of thing, and was rejected, saying that a “misuse” of that kind of data “could raise serious concerns.”  Indeed, it could, and does raise serious concerns, but apparently the current administration just doesn’t give a crap.If all of this sounds familiar, it’s almost exactly what the feds tried to setup in 2002 with the Orwellian name Total Information Awareness.   Except that time (right after 9/11, when you’d think the public would be at its most receptive to such programs), as word got out about the program, the public rightly flipped out, and we were told the program was shuttered.  Except, as some have been arguing for years, it was never shuttered, it was just rebuilt in secret.

And, of course, the NSA is still willing to defend this massive breach on Americans’ privacy:

An agency spokeswoman, asked about the analyses of Americans’ data, said, “All data queries must include a foreign intelligence justification, period.”

“All of N.S.A.’s work has a foreign intelligence purpose,” the spokeswoman added. “Our activities are centered on counterterrorism, counterproliferation and cybersecurity.”

Note the continued shift in language.  For a while, they kept saying that the NSA does no surveillance on Americans at all.  At all!  They insisted that would be illegal.  Then, later, people started to note that they would use the phrase “targeting foreign intelligence” which had just enough (barely) wiggle room to get people to think that they were only looking at non-US person data and content, but really meant as long as the overall investigation “targeted” foreign intelligence, it was fine.  Now they’re even walking back from that, and saying that apparently it’s fine to spy on Americans without a warrant so long as there’s “a foreign intelligence justification.”  In short: if you can come up with some excuse for how it might impact something foreign, the NSA can spy on Americans without a warrant.

That’s no limitation at all.  In fact, such a rule is meaningless.  We already know that the NSA gets every telephone record handed over because they claim it’s “necessary” to “connect the dots” on foreign terror plots.  And, similarly, now they’re arguing that they can look at anything else so long as they claim that there’s a “foreign intelligence justification.”  That means they have no limits.  They just have to come up with some wacky reason to claim that so-and-so might have foreign connections that are important to know about, and voila, their life is open for the NSA to dig in, all without any oversight or a warrant.

Somewhat surprisingly, the already disclosed phone metadata dragnet is actually not used for this social network effort, but that doesn’t mean the NSA is lacking in data with which to create this shadow spying social network. It uses the NSA’s taps on fiber optic networks, the ones that collect a ton of internet data, as Dianne Feinstein confirmed last week.

The N.S.A. documents show that one of the main tools used for chaining phone numbers and e-mail addresses has the code name Mainway. It is a repository into which vast amounts of data flow daily from the agency’s fiber-optic cables, corporate partners and foreign computer networks that have been hacked.

The documents show that significant amounts of information from the United States go into Mainway. An internal N.S.A. bulletin, for example, noted that in 2011 Mainway was taking in 700 million phone records per day. In August 2011, it began receiving an additional 1.1 billion cellphone records daily from an unnamed American service provider under Section 702 of the 2008 FISA Amendments Act, which allows for the collection of the data of Americans if at least one end of the communication is believed to be foreign.

Um. That’s an awful lot of records on Americans.  And yet, we’re still being told that the NSA doesn’t spy on Americans?  Yeah, right.

Anyway, it appears that the GETPRSM social network has been in existence for quite some time now, and don’t worry if you haven’t received your invite.  You’ve already joined.

source

Blog at WordPress.com.

Up ↑