We Are All Persons of Interest Melancholy of Future Living

Moderators: Elvis, DrVolin, Jeff

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Wed Jun 12, 2013 3:20 pm

SECTION 215

NSA Surveillance Program Oversight: White House, Congress Point Fingers At Each Other
Posted: 06/07/2013 8:58 pm EDT | Updated: 06/08/2013 11:10 am EDT

WASHINGTON -- Revelations of massive data mining by the National Security Agency have prompted a blame game between the White House and Congress over how much responsibility each has for the program.

President Barack Obama on Friday defended his administration’s broad surveillance operations by arguing that checks and balances ensure privacy concerns were addressed. If they weren’t, he added, citizens could point the finger at Congress in addition to him.

“These programs are subject to congressional oversight and congressional reauthorization and congressional debate,” Obama said. “And if there are members of Congress who feel differently, then they should speak up.”

The president made references to congressional oversight 15 times during his remarks. In a separate comment to The Huffington Post, a senior administration official said on the condition of anonymity that the administration has held at least 13 briefing sessions with members of Congress on the Patriot Act and its provisions.

While the administration sought to share responsibility for the surveillance -- which reportedly gathered phone records from Verizon, AT&T and Sprint Nextel customers -- lawmakers weren’t eager to accept it. Several quickly denied they had been kept apprised of the NSA’s actions.

“I knew about the program because I specifically sought it out,” Sen. Jeff Merkley (D-Ore.) said on MSNBC. “It’s not something that’s briefed outside the Intelligence Committee. I had to get special permission to find out about the program.” Merkley said he was not briefed on the NSA's email surveillance program, PRISM.

Several Republican lawmakers, likewise, said that they had unaware of the phone surveillance. Sen. Jim Inhofe (R-Okla.) told Politico he learned about the program from news reports.


Considering the criticism of the vast surveillance program, it’s far from surprising that Congress and the White House would differ about the extent to which lawmakers knew about it. But Friday’s back and forth also underscored how fragmented congressional oversight on these matters can be. Lawmakers may have had access to information. But aides to them said there were serious hurdles to getting the information and major restrictions on what could be done with it.

The senior administration official said lawmakers in Congress had many chances to discuss the Patriot Act and its provisions with administration officials from May 2009 to May 2011. Those sessions included six hearings, two briefings (large settings with question-and-answer sessions), and two meetings. They were held for Judiciary and Intelligence committee members in the House and the Senate.

On three occasions, the audience was expanded, according to the administration official. In May 2011, administration officials held a gathering for the House Republican Conference, and a separate one for the House Democratic Caucus. In February 2011, officials invited all senators for a briefing.

All of the sessions dealt predominantly with the reauthorization of the Patriot Act. It's unclear if discussion touched on the NSA data-mining operations. On March 15, 2011, a classified briefing was held to discuss a Patriot Act amendment that had been offered by Sen. Dick Durbin (D-Ill.). The Illinois Democrat was pushing a provision that would have required the government to describe “with particularity” the target of roving wiretaps.

At the meeting for senators in February 2011, held in the vice president's office off the Senate floor, lawmakers were offered the opportunity to discuss Section 215 of the Patriot Act, which provides the legal basis for the NSA data mining. Attendees included Director of National Intelligence James Clapper, FBI Director Robert Mueller, and National Security Agency Director Keith Alexander. Officials who briefed lawmakers at the other sessions included Sean Joyce, deputy FBI director; Todd Hinnen, head of the National Security Division of the Department of Justice; and David Kris, assistant attorney general for national security.

“The Department of Justice has taken multiple actions to inform members of these authorities, including providing in-person briefings and classified white papers,” said the senior administration official. “The classified white papers were provided to the Intelligence Committees, along with a formal request that the white papers be made available for review by all members in the respective committee spaces.”

Those requests resulted in at least two additional oversight opportunities. On Feb. 23, 2010, and Feb. 8, 2011, the chair and ranking member of the Senate Intelligence Committee, Sens. Dianne Feinstein (D-Calif.) and Saxby Chambliss (R-Ga.), sent letters advising their colleagues of a chance to review “an updated classified report” on Patriot Act surveillance programs, including those that touched on data collection.

But it was not without conditions. Reviewing the report had to be done in “a secure setting” and the senators who attended were restricted from taking notes or talking about it later. The biggest restriction, according to several Senate aides, was that staff members working for senators who weren't on the Intelligence Committee were not allowed to attend.

“While these members of Congress are allowed to see these documents, their staff can't see them -- unless they have the appropriate security clearance,” said Jennifer Hoelzer, a former top aide to Sen. Ron Wyden (D-Ore.), one of the top critics of the secrecy surrounding the NSA program. “The administration gets to make their case to these folks that these programs are necessary and then they can't talk to anyone else about it. Even Ron, as a member of the Intelligence Committee, could only talk to his intelligence committee designee about these issues. I'm not exaggerating when I say that I spent over 1,000 hours working on this issue and I wasn't allowed to know what it was.

“Why does this matter? Well, how many members of Congress do you think are experts on metadata? My guess is not very many,” Hoelzer added. “Under normal circumstances, that's not a big deal. I mean, we don't expect every member of Congress to personally be an expert on everything. That's why they have staff who are experts on a wide variety of issues. But again, most members of Congress couldn't consult their staff about these programs.”

Restricted from vetting information by legal experts, telecommunications officials, or even their own top aides, lawmakers are “more likely to take the administration’s side of the story,” Hoelzer argued.

Even if they don’t take the administration's side, there is little they could do to object. Merkley, for one, was reduced to calling for declassification of information about the NSA program because he otherwise couldn’t publicly criticize the program.

In some respects, members of Congress are fortunate to receive the information they do. The laws compelling the executive branch to offer details are slim. Julian Sanchez, a research fellow at the Cato Institute and an expert on congressional procedure, noted that there is mandatory annual reporting of the Patriot Act's Section 215 orders. Other laws require semiannual assessments of compliance with Section 702 of the Foreign Intelligence Surveillance Act, which the NSA has said it has used to acquire foreign intelligence information through its PRISM Internet surveillance program.

Outside of that, however, there is little power for the legislature.

“More generally,” said Sanchez, “briefing on intelligence activities (other than covert ops) is a matter of convention rather than legal requirement.”




Durbin Statement on NSA Phone Tracking and the Patriot Act
Durbin Raised Concerns Over Program in 2009, Offered Amendments to Prevent Abuse

PoliticalNews.me - Jun 10,2013 - Durbin Statement on NSA Phone Tracking and the Patriot Act

Durbin Raised Concerns Over Program in 2009, Offered Amendments to Prevent Abuse

Washington, D.C. - Assistant Majority Leader Dick Durbin (D-IL) released the following statement today after it was reported that the National Security Agency secretly obtained phone records of Verizon calls made by innocent Americans in the United States.

“For over a decade, we’ve debated how best to protect America from terrorism while preserving the most basic constitutional rights,” Durbin said. “Today’s revelation is disturbing, but it should not be surprising. I have tried to reform this provision of the Patriot Act for years, introducing legislation and offering amendments to ensure that secret demands for sensitive personal information on Americans limited only to those with some connection to individuals suspected of being involved in plots against our country. As I said when I offered my amendment in 2009, ‘someday the cloak will be lifted and future generations will ask whether our actions today meet the test of a democratic society – transparency, accountability and fidelity to the rule of law and our Constitution.’ Today that cloak has been lifted and this important debate must begin again.”

In 2003, Senator Durbin introduced the SAFE Act, a bipartisan bill to retain the expanded powers of the Patriot Act but place some reasonable limits on these powers to protect our constitutional rights – including a requirement of individualized suspicion for Section 215 orders.

In 2005, Senator Durbin authored language in the Senate-passed Patriot Act reauthorization to require individualized suspicion for Section 215 orders. This provision would require that the government could only issue a Section 215 order for an American’s records if there is some connection to a suspected terrorist or spy. This provision was removed from the final bill at the insistence of the Bush Administration.

In 2009, Senator Durbin offered the same language as an amendment during the debate over the reauthorization of the Patriot Act.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Thu Jun 13, 2013 8:53 pm

Sens. Wyden & Udall: We Have Seen No Evidence NSA Surveillance Has Prevented ‘Dozens Of Terrorist Events’
by Josh Feldman | 8:40 pm, June 13th, 2013 » more inside

During yesterday’s Congressional hearings on the NSA, agency head General Keith Alexander claimed that the NSA’s massive surveillance program has successfully prevented “dozens of terrorist events,” but did not go into specifics. Today Democratic senators Ron Wyden and Mark Udall called on Alexander to clarify those remarks, saying in a joint statement that neither of them have seen any evidence to support what he said.

Udall and Wyden have been two of the most outspoken Democrats bringing this issue to the public’s attention. Udall was the senator who elicited the “least untruthful” answer from Director of National Intelligence James Clapper a few months ago when he denied the NSA has a program snooping on millions of Americans.

The two senators released a joint statement today calling on Alexander to be more forthcoming with information about which attacks have supposedly been thwarted by the program.

“We have not yet seen any evidence showing that the NSA’s dragnet collection of Americans’ phone records has produced any uniquely valuable intelligence. Gen. Alexander’s testimony yesterday suggested that the NSA’s bulk phone records collection program helped thwart ‘dozens’ of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection methods. The public deserves a clear explanation.”
Wired Magazine has a profile out today on Alexander’s leadership and his outlook on how much power the NSA needs to keep the country safe




The militarized internet

by digby

If twitter is any gauge, a lot of people think this article in Wired about General Keith Alexander is just all kinds of kewl:
General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”

In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.

But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.

And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.
I don't suppose the American public have any business knowing if their government is launching such attacks. Why would we? What could possibly go wrong?
Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”

Now 61, Alexander has said he plans to retire in 2014; when he does step down he will leave behind an enduring legacy—a position of far-reaching authority and potentially Strangelovian powers at a time when the distinction between cyberwarfare and conventional warfare is beginning to blur. A recent Pentagon report made that point in dramatic terms. It recommended possible deterrents to a cyberattack on the US. Among the options: launching nuclear weapons.
Like I said, what could possibly go wrong?

When the Guardian revealed this program the other day there was a spirited debate about whether this, unlike the other programs, was something we should welcome and expect. My problem with it wasn't that the government was creating plans to defend against attacks on US cyber-infrastructure or even war plans in case such a thing happened. What I found questionable was the idea that this was conceived as 21st Century offensive war planning, and and in ways that do not necessarily fall within the traditional "national security" boundaries.

When it comes to cyber issues, I'm afraid we are seeing a confluence of commerce and security that everyone should stop and think about for a minute. How are these people defining the "national interest" and on whose behalf are they planning to launch cyberwar? What are the consequences of doing such a thing and who decides that it must be done?

And what do we think about paying huge amounts of taxpayer dollars to contractors like this?
Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”

One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
[...]
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.

The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyber­warfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”
There are some serious implications to all of this that need to be hashed out by the American people. Of course we need to have defenses against cyber attacks. I don't think anyone in the country thinks otherwise. But this looks like it could be a monumental financial boondoggle that is in great danger of running amok and causing some very serious problems. Frankly, this scares me much more than the threat that some would-be is going to get a hold of some beauty supplies and blow himself up.

Islamic terrorism is not and never has been an existential threat. This, I'm not so sure about. We should at least have a little chat about it before we let Cyber Buck Turgidson and his friends run wild.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Fri Jun 14, 2013 10:58 am

U.S. Agencies Said to Swap Data With Thousands of Firms
By Michael Riley - Jun 13, 2013 9:44 PM CT

U.S. Intel Swapping Info to Thousands of Companies
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military. Photographer: Jacob Kepler/Bloomberg

Larry Page, chief executive officer of Google Inc., said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Edward Snowden’s disclosures and that the company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. Photographer: Robert Galbraith/Pool via Bloomberg
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.
Many of these same Internet and telecommunications companies voluntarily provide U.S. intelligence organizations with additional data, such as equipment specifications, that don’t involve private communications of their customers, the four people said.
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency (0112917D), the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.
Microsoft Bugs
Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.
Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.
Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.
Willing Cooperation
Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.
In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.
The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.
Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.’s major spy agencies, the people familiar with those programs said.
‘Thank Them’
Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”
“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.
Cooperation between nine U.S. Internet companies and the NSA’s Special Source Operations unit came to light along with a secret program called Prism. According to a slide deck provided by Snowden, the program gathers e-mails, videos, and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges.
U.S. intelligence agencies have grown far more dependent on such arrangements as the flow of much of the world’s information has grown exponentially through switches, cables and other network equipment maintained by U.S. companies.
Equipment Specs
In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.
Typically, a key executive at a company and a small number of technical people cooperate with different agencies and sometimes multiple units within an agency, according to the four people who described the arrangements.
Committing Officer
If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.
Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.
Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.
McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.
McAfee’s Data
McAfee (MFE)’s data and analysis doesn’t include information on individuals, said Michael Fey, the company’s world wide chief technology officer.
“We do not share any type of personal information with our government agency partners,” Fey said in an e-mailed statement. “McAfee’s function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity.”
In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.
In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.
China’s Military
Following an attack on his company by Chinese hackers in 2010, Sergey Brin, Google’s co-founder, was provided with highly sensitive government intelligence linking the attack to a specific unit of the People’s Liberation Army, China’s military, according to one of the people, who is familiar with the government’s investigation. Brin was given a temporary classified clearance to sit in on the briefing, the person said.
According to information provided by Snowden, Google, owner of the world’s most popular search engine, had at that point been a Prism participant for more than a year.
Google CEO Larry Page said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Snowden’s disclosures and that the Mountain View, California-based company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. He said Google provides user data to governments “only in accordance with the law.”
Leslie Miller, a spokeswoman for Google, didn’t provide an immediate response yesterday.
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
Metadata
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.
According to Snowden’s information, Blarney’s purpose is “to gain access and exploit foreign intelligence,” the Post said.
It’s unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge’s order.
Less Scrutiny
Stewart Baker, former general counsel for the NSA, said if metadata involved communications between two foreign computers that just happened to be crossing a U.S. fiber optic cable “then the likelihood is it would demand less legal scrutiny than when communications are being extracted one by one.”
Lawmakers who oversee U.S. intelligence agencies may not understand the significance of some of the metadata being collected, said Jacob Olcott, a former cybersecurity assistant for Senator John D. Rockefeller IV of West Virginia, the Democratic chairman of the Senate Commerce Committee.
“That’s what makes this issue of oversight so challenging,” said Olcott, now a principal at Good Harbor Security Risk Management in Washington. “You have a situation where the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs.”
While companies are offered powerful inducements to cooperate with U.S. intelligence, many executives are motivated by patriotism or a sense they are defending national security, the people familiar with the trusted partner programs said.
Einstein 3
U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems’ architecture or equipment schematics so the agencies can analyze potential vulnerabilities.
“It’s natural behavior for governments to want to know about the country’s critical infrastructure,” said Chisholm, chief security officer at Irvine, California-based Cylance Inc.
Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.
Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn’t authorized to discuss the matter.
AT&T, Verizon
Before they agreed to install the system on their networks, some of the five major Internet companies -- AT&T Inc. (T), Verizon Communications Inc (VZ)., Sprint Nextel Corp. (S), Level 3 Communications Inc (LVLT). and CenturyLink Inc (CTL). -- asked for guarantees that they wouldn’t be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn’t meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.
Mark Siegel, a spokesman for Dallas-based AT&T, the nation’s biggest phone carrier, declined to comment. Edward McFadden, a spokesman for New York-based Verizon, the second-largest phone company, declined to comment.
Scott Sloat, a spokesman for Overland Park, Kansas-based Sprint, and Monica Martinez, a spokeswoman for Broomfield, Colorado-based Level 3, didn’t immediately respond to requests for comment.
Linda Johnson, a spokeswoman for Centurylink, formerly Qwest Corp., said her Monroe, Louisiana-based company participates in the Enhanced Cybersecurity Services program and the Intrusion Prevention Security Services program, which includes Einstein 3. Both programs are managed by the U.S. Department of Homeland Security.
Beyond that, she said, “CenturyLink does not comment on matters pertaining to national security.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Fri Jun 14, 2013 1:49 pm

Secret Court Ruling Put Tech Companies in Data Bind
By CLAIRE CAIN MILLER
Published: June 13, 2013

SAN FRANCISCO — In a secret court in Washington, Yahoo’s top lawyers made their case. The government had sought help in spying on certain foreign users, without a warrant, and Yahoo had refused, saying the broad requests were unconstitutional.

The judges disagreed. That left Yahoo two choices: Hand over the data or break the law.

So Yahoo became part of the National Security Agency’s secret Internet surveillance program, Prism, according to leaked N.S.A. documents, as did seven other Internet companies.

Like almost all the actions of the secret court, which operates under the Foreign Intelligence Surveillance Act, the details of its disagreement with Yahoo were never made public beyond a heavily redacted court order, one of the few public documents ever to emerge from the court. The name of the company had not been revealed until now. Yahoo’s involvement was confirmed by two people with knowledge of the proceedings. Yahoo declined to comment.

But the decision has had lasting repercussions for the dozens of companies that store troves of their users’ personal information and receive these national security requests — it puts them on notice that they need not even try to test their legality. And despite the murky details, the case offers a glimpse of the push and pull among tech companies and the intelligence and law enforcement agencies that try to tap into the reams of personal data stored on their servers.

It also highlights a paradox of Silicon Valley: while tech companies eagerly vacuum up user data to track their users and sell ever more targeted ads, many also have a libertarian streak ingrained in their corporate cultures that resists sharing that data with the government.

“Even though they have an awful reputation on consumer privacy issues, when it comes to government privacy, they generally tend to put their users first,” said Christopher Soghoian, a senior policy analyst studying technological surveillance at the American Civil Liberties Union. “There’s this libertarian, pro-civil liberties vein that runs through the tech companies.”

Lawyers who handle national security requests for tech companies say they rarely fight in court, but frequently push back privately by negotiating with the government, even if they ultimately have to comply. In addition to Yahoo, which fought disclosures under FISA, other companies, including Google, Twitter, smaller communications providers and a group of librarians, have fought in court elements of National Security Letters, which the F.B.I. uses to secretly collect information about Americans. Last year, the government issued more than 1,850 FISA requests and 15,000 National Security Letters.

“The tech companies try to pick their battles,” said Stephen I. Vladeck, a law professor at American University who has challenged government counterterrorism surveillance. “Behind the scenes, different tech companies show different degrees of cooperativeness or pugnaciousness.”

But Mr. Vladeck added that even if a company resisted, “that may not be enough, because any pushback is secret and at the end of the day, even the most well-intentioned companies are not going to be standing in the shoes of their customers.”

FISA requests can be as broad as seeking court approval to ask a company to turn over information about the online activities of people in a certain country. Between 2008 and 2012, only two of 8,591 applications were rejected, according to data gathered by the Electronic Privacy Information Center, a nonprofit research center in Washington. Without obtaining court approval, intelligence agents can then add more specific requests — like names of individuals and additional Internet services to track — every day for a year.

National Security Letters are limited to the name, address, length of service and toll billing records of a service’s subscribers.

Because national security requests ban recipients from even acknowledging their existence, it is difficult to know exactly how, and how often, the companies cooperate or resist. Small companies are more likely to take the government to court, lawyers said, because they have fewer government relationships and customers, and fewer disincentives to rock the boat. One of the few known challenges to a National Security Letter, for instance, came from a small Internet provider in New York, the Calyx Internet Access Corporation.

The Yahoo ruling, from 2008, shows the company argued that the order violated its users’ Fourth Amendment rights against unreasonable searches and seizures. The court called that worry “overblown.”

“Notwithstanding the parade of horribles trotted out by the petitioner, it has presented no evidence of any actual harm, any egregious risk of error, or any broad potential for abuse,” the court said, adding that the government’s “efforts to protect national security should not be frustrated by the courts.”

One of the most notable challenges to a National Security Letter came from an unidentified electronic communications service provider in San Francisco. In 2011, the company was presented with a letter from the F.B.I., asking for account information of a subscriber for an investigation into “international terrorism or clandestine intelligence activities.”

The company went to court. In March, a Federal District Court judge, Susan Illston, ruled the information request unconstitutional, along with the gag order. The case is under appeal, which is why the company cannot be named.

Google filed a challenge this year against 19 National Security Letters in the same federal court, and in May, Judge Illston ruled against the company. Google was not identified in the case, but its involvement was confirmed by a person briefed on the case.

In 2011, Twitter successfully challenged a silence order on a National Security Letter related to WikiLeaks members.

Other companies are asking for permission to talk about national security requests. Google negotiated with Justice officials to publish the number of letters they received, and were allowed to say they each received between zero and 999 last year, as did Microsoft. The companies, along with Facebook and Twitter, said Tuesday that the government should give them more freedom to disclose national security requests.

The companies comply with a vast majority of nonsecret requests, including subpoenas and search warrants, by providing at least some of the data.

For many of the requests to tech companies, the government relies on a 2008 amendment to FISA. Even though the FISA court requires so-called minimization procedures to limit incidental eavesdropping on people not in the original order, including Americans, the scale of electronic communication is so vast that such information — say, on an e-mail string — is often picked up, lawyers say.

Last year, the FISA court said the minimization rules were unconstitutional, and on Wednesday, ruled that it had no objection to sharing that opinion publicly. It is now up to a federal court.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Fri Jun 14, 2013 11:07 pm

Inside the NSA's Ultra-Secret China Hacking Group
Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America's enemies abroad.

BY MATTHEW M. AID | JUNE 10, 2013

This weekend, U.S. President Barack Obama sat down for a series of meetings with China's newly appointed leader, Xi Jinping. We know that the two leaders spoke at length about the topic du jour -- cyber-espionage -- a subject that has long frustrated officials in Washington and is now front and center with the revelations of sweeping U.S. data mining. The media has focused at length on China's aggressive attempts to electronically steal U.S. military and commercial secrets, but Xi pushed back at the "shirt-sleeves" summit, noting that China, too, was the recipient of cyber-espionage. But what Obama probably neglected to mention is that he has his own hacker army, and it has burrowed its way deep, deep into China's networks.

When the agenda for the meeting at the Sunnylands estate outside Palm Springs, California, was agreed to several months ago, both parties agreed that it would be a nice opportunity for President Xi, who assumed his post in March, to discuss a wide range of security and economic issues of concern to both countries. According to diplomatic sources, the issue of cybersecurity was not one of the key topics to be discussed at the summit. Sino-American economic relations, climate change, and the growing threat posed by North Korea were supposed to dominate the discussions.

Then, two weeks ago, White House officials leaked to the press that Obama intended to raise privately with Xi the highly contentious issue of China's widespread use of computer hacking to steal U.S. government, military, and commercial secrets. According to a Chinese diplomat in Washington who spoke in confidence, Beijing was furious about the sudden elevation of cybersecurity and Chinese espionage on the meeting's agenda. According to a diplomatic source in Washington, the Chinese government was even angrier that the White House leaked the new agenda item to the press before Washington bothered to tell Beijing about it.

So the Chinese began to hit back. Senior Chinese officials have publicly accused the U.S. government of hypocrisy and have alleged that Washington is also actively engaged in cyber-espionage. When the latest allegation of Chinese cyber-espionage was leveled in late May in a front-page Washington Post article, which alleged that hackers employed by the Chinese military had stolen the blueprints of over three dozen American weapons systems, the Chinese government's top Internet official, Huang Chengqing, shot back that Beijing possessed "mountains of data" showing that the United States has engaged in widespread hacking designed to steal Chinese government secrets. This weekend's revelations about the National Security Agency's PRISM and Verizon metadata collection from a 29-year-old former CIA undercover operative named Edward J. Snowden, who is now living in Hong Kong, only add fuel to Beijing's position.

But Washington never publicly responded to Huang's allegation, and nobody in the U.S. media seems to have bothered to ask the White House if there is a modicum of truth to the Chinese charges.

It turns out that the Chinese government's allegations are essentially correct. According to a number of confidential sources, a highly secretive unit of the National Security Agency (NSA), the U.S. government's huge electronic eavesdropping organization, called the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China.

Hidden away inside the massive NSA headquarters complex at Fort Meade, Maryland, in a large suite of offices segregated from the rest of the agency, TAO is a mystery to many NSA employees. Relatively few NSA officials have complete access to information about TAO because of the extraordinary sensitivity of its operations, and it requires a special security clearance to gain access to the unit's work spaces inside the NSA operations complex. The door leading to its ultramodern operations center is protected by armed guards, an imposing steel door that can only be entered by entering the correct six-digit code into a keypad, and a retinal scanner to ensure that only those individuals specially cleared for access get through the door.

According to former NSA officials interviewed for this article, TAO's mission is simple. It collects intelligence information on foreign targets by surreptitiously hacking into their computers and telecommunications systems, cracking passwords, compromising the computer security systems protecting the targeted computer, stealing the data stored on computer hard drives, and then copying all the messages and data traffic passing within the targeted email and text-messaging systems. The technical term of art used by NSA to describe these operations is computer network exploitation (CNE).

TAO is also responsible for developing the information that would allow the United States to destroy or damage foreign computer and telecommunications systems with a cyberattack if so directed by the president. The organization responsible for conducting such a cyberattack is U.S. Cyber Command (Cybercom), whose headquarters is located at Fort Meade and whose chief is the director of the NSA, Gen. Keith Alexander.

Commanded since April of this year by Robert Joyce, who formerly was the deputy director of the NSA's Information Assurance Directorate (responsible for protecting the U.S. government's communications and computer systems), TAO, sources say, is now the largest and arguably the most important component of the NSA's huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.

The sanctum sanctorum of TAO is its ultramodern operations center at Fort Meade called the Remote Operations Center (ROC), which is where the unit's 600 or so military and civilian computer hackers (they themselves CNE operators) work in rotating shifts 24 hours a day, seven days a week.

These operators spend their days (or nights) searching the ether for computers systems and supporting telecommunications networks being utilized by, for example, foreign terrorists to pass messages to their members or sympathizers. Once these computers have been identified and located, the computer hackers working in the ROC break into the targeted computer systems electronically using special software designed by TAO's own corps of software designers and engineers specifically for this purpose, download the contents of the computers' hard drives, and place software implants or other devices called "buggies" inside the computers' operating systems, which allows TAO intercept operators at Fort Meade to continuously monitor the email and/or text-messaging traffic coming in and out of the computers or hand-held devices.

TAO's work would not be possible without the team of gifted computer scientists and software engineers belonging to the Data Network Technologies Branch, who develop the sophisticated computer software that allows the unit's operators to perform their intelligence collection mission. A separate unit within TAO called the Telecommunications Network Technologies Branch (TNT) develops the techniques that allow TAO's hackers to covertly gain access to targeted computer systems and telecommunications networks without being detected. Meanwhile, TAO's Mission Infrastructure Technologies Branch develops and builds the sensitive computer and telecommunications monitoring hardware and support infrastructure that keeps the effort up and running.

TAO even has its own small clandestine intelligence-gathering unit called the Access Technologies Operations Branch, which includes personnel seconded by the CIA and the FBI, who perform what are described as "off-net operations," which is a polite way of saying that they arrange for CIA agents to surreptitiously plant eavesdropping devices on computers and/or telecommunications systems overseas so that TAO's hackers can remotely access them from Fort Meade.

It is important to note that TAO is not supposed to work against domestic targets in the United States or its possessions. This is the responsibility of the FBI, which is the sole U.S. intelligence agency chartered for domestic telecommunications surveillance. But in light of information about wider NSA snooping, one has to prudently be concerned about whether TAO is able to perform its mission of collecting foreign intelligence without accessing communications originating in or transiting through the United States.

Since its creation in 1997, TAO has garnered a reputation for producing some of the best intelligence available to the U.S. intelligence community not only about China, but also on foreign terrorist groups, espionage activities being conducted against the United States by foreign governments, ballistic missile and weapons of mass destruction developments around the globe, and the latest political, military, and economic developments around the globe.

According to a former NSA official, by 2007 TAO's 600 intercept operators were secretly tapping into thousands of foreign computer systems and accessing password-protected computer hard drives and emails of targets around the world. As detailed in my 2009 history of NSA, The Secret Sentry, this highly classified intercept program, known at the time as Stumpcursor, proved to be critically important during the U.S. Army's 2007 "surge" in Iraq, where it was credited with single-handedly identifying and locating over 100 Iraqi and al Qaeda insurgent cells in and around Baghdad. That same year, sources report that TAO was given an award for producing particularly important intelligence information about whether Iran was trying to build an atomic bomb.

By the time Obama became president of the United States in January 2009, TAO had become something akin to the wunderkind of the U.S. intelligence community. "It's become an industry unto itself," a former NSA official said of TAO at the time. "They go places and get things that nobody else in the IC [intelligence community] can."

Given the nature and extraordinary political sensitivity of its work, it will come as no surprise that TAO has always been, and remains, extraordinarily publicity shy. Everything about TAO is classified top secret codeword, even within the hypersecretive NSA. Its name has appeared in print only a few times over the past decade, and the handful of reporters who have dared inquire about it have been politely but very firmly warned by senior U.S. intelligence officials not to describe its work for fear that it might compromise its ongoing efforts. According to a senior U.S. defense official who is familiar with TAO's work, "The agency believes that the less people know about them [TAO] the better."

The word among NSA officials is that if you want to get promoted or recognized, get a transfer to TAO as soon as you can. The current head of the NSA's SIGINT Directorate, Teresa Shea, 54, got her current job in large part because of the work she did as chief of TAO in the years after the 9/11 terrorist attacks, when the unit earned plaudits for its ability to collect extremely hard-to-come-by information during the latter part of George W. Bush's administration. We do not know what the information was, but sources suggest that it must have been pretty important to propel Shea to her position today. But according to a recently retired NSA official, TAO "is the place to be right now."

There's no question that TAO has continued to grow in size and importance since Obama took office in 2009, which is indicative of its outsized role. In recent years, TAO's collection operations have expanded from Fort Meade to some of the agency's most important listening posts in the United States. There are now mini-TAO units operating at the huge NSA SIGINT intercept and processing centers at NSA Hawaii at Wahiawa on the island of Oahu; NSA Georgia at Fort Gordon, Georgia; and NSA Texas at the Medina Annex outside San Antonio, Texas; and within the huge NSA listening post at Buckley Air Force Base outside Denver.

The problem is that TAO has become so large and produces so much valuable intelligence information that it has become virtually impossible to hide it anymore. The Chinese government is certainly aware of TAO's activities. The "mountains of data" statement by China's top Internet official, Huang Chengqing, is clearly an implied threat by Beijing to release this data. Thus it is unlikely that President Obama pressed President Xi too hard at the Sunnydale summit on the question of China's cyber-espionage activities. As any high-stakes poker player knows, you can only press your luck so far when the guy on the other side of the table knows what cards you have in your hand.

Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Sun Jun 16, 2013 10:05 am

Domestic Spying, Inc.

by Tim Shorrock , Special to CorpWatch
November 27th, 2007

A new intelligence institution to be inaugurated soon by the Bush administration will allow government spying agencies to conduct broad surveillance and reconnaissance inside the United States for the first time. Under a proposal being reviewed by Congress, a National Applications Office (NAO) will be established to coordinate how the Department of Homeland Security (DHS) and domestic law enforcement and rescue agencies use imagery and communications intelligence picked up by U.S. spy satellites. If the plan goes forward, the NAO will create the legal mechanism for an unprecedented degree of domestic intelligence gathering that would make the U.S. one of the world's most closely monitored nations. Until now, domestic use of electronic intelligence from spy satellites was limited to scientific agencies with no responsibility for national security or law enforcement.

The intelligence-sharing system to be managed by the NAO will rely heavily on private contractors including Boeing, BAE Systems, L-3 Communications and Science Applications International Corporation (SAIC). These companies already provide technology and personnel to U.S. agencies involved in foreign intelligence, and the NAO greatly expands their markets. Indeed, at an intelligence conference in San Antonio, Texas, last month, the titans of the industry were actively lobbying intelligence officials to buy products specifically designed for domestic surveillance.

The NAO was created under a plan tentatively approved in May 2007 by Director of National Intelligence Michael McConnell. Specifically, the NAO will oversee how classified information collected by the National Security Agency (NSA), the National Geospatial-Intelligence Agency (NGA) and other key agencies is used within the U.S. during natural disasters, terrorist attacks and other events affecting national security. The most critical intelligence will be supplied by the NSA and the NGA, which are often referred to by U.S. officials as the “eyes” and “ears” of the intelligence community.

The NSA, through a global network of listening posts, surveillance planes, and satellites, captures signals from phone calls, e-mail and Internet traffic, and translates and analyzes them for U.S. military and national intelligence officials.

The National Geospatial-Intelligence Agency (NGA), which was formally inaugurated in 2003, provides overhead imagery and mapping tools that allow intelligence and military analysts to monitor events from the skies and space. The NSA and the NGA have a close relationship with the super-secret National Reconnaissance Office (NRO), which builds and maintains the U.S. fleet of spy satellites and operates the ground stations where the NSA’s signals and the NGA’s imagery are processed and analyzed. By law, their collection efforts are supposed to be confined to foreign countries and battlefields.

The National Applications Office was conceived in 2005 by the Office of the Director of National Intelligence (ODNI), which Congress created in 2004 to oversee the 16 agencies that make up the U.S. intelligence community. The ODNI, concerned that the legal framework for U.S. intelligence operations had not been updated for the global “war on terror,” turned to Booz Allen Hamilton of McLean, Virginia -- one of the largest contractors in the spy business. The company was tasked with studying how intelligence from spy satellites and photoreconnaissance planes could be better used domestically to track potential threats to security within the U.S.. The Booz Allen study was completed in May of that year, and has since become the basis for the NAO oversight plan. In May 2007, McConnell, the former executive vice president of Booz Allen, signed off on the creation of the NAO as the principal body to oversee the merging of foreign and domestic intelligence collection operations.

The NAO is "an idea whose time has arrived," Charles Allen, a top U.S. intelligence official, told the Wall Street Journal in August 2007 after it broke the news of the creation of the NAO. Allen, the DHS's chief intelligence officer, will head the new program. The announcement came just days after President George W. Bush signed a new law approved by Congress to expand the ability of the NSA to eavesdrop, without warrants, on telephone calls, e-mail and faxes passing through telecommunications hubs in the U.S. when the government suspects agents of a foreign power may be involved. "These [intelligence] systems are already used to help us respond to crises," Allen later told the Washington Post. "We anticipate that we can also use them to protect Americans by preventing the entry of dangerous people and goods into the country, and by helping us examine critical infrastructure for vulnerabilities."

Donald Kerr, a former NRO director who is now the number two at ODNI, recently explained to reporters that the intelligence community was no longer discussing whether or not to spy on U.S. citizens: “Our job now is to engage in a productive debate, which focuses on privacy as a component of appropriate levels of security and public safety,'' Kerr said. ''I think all of us have to really take stock of what we already are willing to give up, in terms of anonymity, but [also] what safeguards we want in place to be sure that giving that doesn't empty our bank account or do something equally bad elsewhere.''

What Will The NAO Do?

The plan for the NAO builds on a domestic security infrastructure that has been in place for at least seven years. After the terrorist attacks of September 11, 2001, the NSA was granted new powers to monitor domestic communications without obtaining warrants from a secret foreign intelligence court established by Congress in 1978 (that warrant-less program ended in January 2007 but was allowed to continue, with some changes, under legislation passed by Congress in August 2007).

Moreover, intelligence and reconnaissance agencies that were historically confined to spying on foreign countries have been used extensively on the home front since 2001. In the hours after the September 11th, 2001 attacks in New York, for example, the Bush administration called on the NGA to capture imagery from lower Manhattan and the Pentagon to help in the rescue and recovery efforts. In 2002, when two deranged snipers terrified the citizens of Washington and its Maryland and Virginia suburbs with a string of fatal shootings, the Federal Bureau of Investigation (FBI) asked the NGA to provide detailed images of freeway interchanges and other locations to help spot the pair.

The NGA was also used extensively during Hurricane Katrina, when the agency provided overhead imagery -- some of it supplied by U-2 photoreconnaissance aircraft -- to federal and state rescue operations. The data, which included mapping of flooded areas in Louisiana and Mississippi, allowed residents of the stricken areas to see the extent of damage to their homes and helped first-responders locate contaminated areas as well as schools, churches and hospitals that might be used in the rescue. More recently, during the October 2007 California wildfires, the Federal Emergency Management Agency (FEMA) asked the NGA to analyze overhead imagery of the fire zones and determine the areas of maximum intensity and damage. In every situation that the NGA is used domestically, it must receive a formal request from a lead domestic agency, according to agency spokesperson David Burpee. That agency is usually FEMA, which is a unit of DHS.

At first blush, the idea of a U.S. intelligence agency serving the public by providing imagery to aid in disaster recovery sounds like a positive development, especially when compared to the Bush administration’s misuse of the NSA and the Pentagon’s Counter-Intelligence Field Activity (CIFA) to spy on American citizens. But the notion of using spy satellites and aircraft for domestic purposes becomes problematic from a civil liberties standpoint when the full capabilities of agencies like the NGA and the NSA are considered.

Imagine, for example, that U.S. intelligence officials have determined, through NSA telephone intercepts, that a group of worshippers at a mosque in Oakland, California, has communicated with an Islamic charity in Saudi Arabia. This is the same group that the FBI and the U.S. Department of the Treasury believe is linked to an organization unfriendly to the United States.

Imagine further that the FBI, as a lead agency, asks and receives permission to monitor that mosque and the people inside using high-resolution imagery obtained from the NGA. Using other technologies, such as overhead traffic cameras in place in many cities, that mosque could be placed under surveillance for months, and -- through cell phone intercepts and overhead imagery -- its suspected worshipers carefully tracked in real-time as they moved almost anywhere in the country.

The NAO, under the plan approved by ODNI’s McConnell, would determine the rules that will guide the DHS and other lead federal agencies when they want to use imagery and signals intelligence in situations like this, as well as during natural disasters. If the organization is established as planned, U.S. domestic agencies will have a vast array of technology at their disposal. In addition to the powerful mapping and signals tools provided by the NGA and the NSA, domestic agencies will also have access to measures and signatures intelligence (MASINT) managed by the Defense Intelligence Agency (DIA), the principal spying agency used by the secretary of defense and the Joint Chiefs of Staff.

(MASINT is a highly classified form of intelligence that uses infrared sensors and other technologies to “sniff” the atmosphere for certain chemicals and electro-magnetic activity and “see” beneath bridges and forest canopies. Using its tools, analysts can detect signs that a nuclear power plant is producing plutonium, determine from truck exhaust what types of vehicles are in a convoy, and detect people and weapons hidden from the view of satellites or photoreconnaissance aircraft.)

Created By Contractors

The study group that established policies for the NAO was jointly funded by the ODNI and the U.S. Geological Survey (USGS), one of only two domestic U.S. agencies that is currently allowed, under rules set in the 1970s, to use classified intelligence from spy satellites. (The other is NASA, the National Aeronautics and Space Administration.) The group was chaired by Keith Hall, a Booz Allen vice president who manages his firm’s extensive contracts with the NGA and previously served as the director of the NRO.

Other members of the group included seven other former intelligence officers working for Booz Allen, as well as retired Army Lieutenant General Patrick M. Hughes, the former director of the DIA and vice president of homeland security for L-3 Communications, a key NSA contractor; and Thomas W. Conroy, the vice president of national security programs for Northrop Grumman, which has extensive contracts with the NSA and the NGA and throughout the intelligence community.

From the start, the study group was heavily weighted toward companies with a stake in both foreign and domestic intelligence. Not surprisingly, its contractor-advisers called for a major expansion in the domestic use of the spy satellites that they sell to the government. Since the end of the Cold War and particularly since the September 11, 2001 attacks, they said, the “threats to the nation have changed and there is a growing interest in making available the special capabilities of the intelligence community to all parts of the government, to include homeland security and law enforcement entities and on a higher priority basis.”

Contractors are not new to the U.S. spy world. Since the creation of the Central Intelligence Agency (CIA) and the modern intelligence system in 1947, the private sector has been tapped to design and build the technology that facilitates electronic surveillance. Lockheed, for example, built the U-2, the famous surveillance plane that flew scores of spy missions over the Soviet Union and Cuba. During the 1960s, Lockheed was a prime contractor for the Corona system of spy satellites that greatly expanded the CIA’s abilities to photograph secret military installations from space. IBM, Cray Computers and other companies built the super-computers that allowed the NSA to sift through data from millions of telephone calls, and analyze them for intelligence that was passed on to national leaders.

Spending on contracts has increased exponentially in recent years along with intelligence budgets, and the NSA, the NGA and other agencies have turned to the private sector for the latest computer and communications technologies and for intelligence analysts. For example, today about half of staff at the NSA and NGA are private contractors. At the DIA, 35 percent of the workers are contractors. But the most privatized agency of all is the NRO, where a whopping 90 percent of the workforce receive paychecks from corporations. All told the U.S. intelligence agencies spend some 70 percent of their estimated $60 billion annual budget on contracts with private companies, according to documents this reporter obtained in June 2007 from the ODNI.

The plans to increase domestic spying are estimated to be worth billions of dollars in new business for the intelligence contractors. The market potential was on display in October at GEOINT 2007, the annual conference sponsored by the U.S. Geospatial Intelligence Foundation (USGIF), a non-profit organization funded by the largest contractors for the NGA. During the conference, which took place in October at the spacious Henry B. Gonzalez Convention Center in downtown San Antonio, many companies were displaying spying and surveillance tools that had been used in Afghanistan and Iraq and were now being re-branded for potential domestic use.

BAE Systems Inc.

On the first day of the conference, three employees of BAE Systems Inc. who had just returned from a three-week tour of Iraq and Afghanistan with the NGA demonstrated a new software package called SOCET GXP. (BAE Systems Inc. is the U.S. subsidiary of the UK-based BAE, the third-largest military contractor in the world.)

GXP uses Google Earth software as a basis for creating three-dimensional maps that U.S. commanders and soldiers use to conduct intelligence and reconnaissance missions. Eric Bruce, one of the BAE employees back from the Middle East, said his team trained U.S. forces to use the GXP software “to study routes for known terrorist sites” as well as to locate opium fields. “Terrorists use opium to fund their war,” he said. Bruce also said his team received help from Iraqi citizens in locating targets. “Many of the locals can’t read maps, so they tell the analysts, ‘there is a mosque next to a hill,’” he explained.

Bruce said BAE’s new package is designed for defense forces and intelligence agencies, but can also be used for homeland security and by highway departments and airports. Earlier versions of the software were sold to the U.S. Army’s Topographic Engineering Center, where it has been used to collect data on more than 12,000 square kilometers of Iraq, primarily in urban centers and over supply routes.

Another new BAE tool displayed in San Antonio was a program called GOSHAWK, which stands for “Geospatial Operations for a Secure Homeland – Awareness, Workflow, Knowledge.” It was pitched by BAE as a tool to help law enforcement and state and local emergency agencies prepare for, and respond to, “natural disasters and terrorist and criminal incidents.” Under the GOSHAWK program, BAE supplies “agencies and corporations” with data providers and information technology specialists “capable of turning geospatial information into the knowledge needed for quick decisions.” A typical operation might involve acquiring data from satellites, aircraft and sensors in ground vehicles, and integrating those data to support an emergency or security operations center. One of the program’s special attributes, the company says, is its ability to “differentiate levels of classification,” meaning that it can deduce when data are classified and meant only for use by analysts with security clearances.

These two products were just a sampling of what BAE, a major player in the U.S. intelligence market, had to offer. BAE’s services to U.S. intelligence -- including the CIA and the National Counter-Terrorism Center -- are provided through a special unit called the Global Analysis Business Unit. It is located in McLean, Virginia, a stone’s throw from the CIA. The unit is headed by John Gannon, a 25-year veteran of the CIA who reached the agency’s highest analytical ranks as deputy director of intelligence and chairman of the National Intelligence Council. Today, as a private sector contractor for the intelligence community, Gannon manages a staff of more than 800 analysts with security clearances.

A brochure for the Global Analysis unit distributed at GEOINT 2007 explains BAE’s role and, in the process, underscores the degree of outsourcing in U.S. intelligence. “The demand for experienced, skilled, and cleared analysts – and for the best systems to manage them – has never been greater across the Intelligence and Defense Communities, in the field and among federal, state, and local agencies responsible for national and homeland security,” BAE says. The mission of the Global Analysis unit, it says, “is to provide policymakers, warfighters, and law enforcement officials with analysts to help them understand the complex intelligence threats they face, and work force management programs to improve the skills and expertise of analysts.”

At the bottom of the brochure is a series of photographs illustrating BAE’s broad reach: a group of analysts monitoring a bank of computers; three employees studying a map of Europe, the Middle East and the Horn of Africa; the outlines of two related social networks that have been mapped out to show how their members are linked; a bearded man, apparently from the Middle East and presumably a terrorist; the fiery image of a car bomb after it exploded in Iraq; and four white radar domes (known as radomes) of the type used by the NSA to monitor global communications from dozens of bases and facilities around the world.

The brochure may look and sound like typical corporate public relations. But amid BAE’s spy talk were two phrases strategically placed by the company to alert intelligence officials that BAE has an active presence inside the U.S.. The tip-off words were “federal, state and local agencies,” “law enforcement officials” and “homeland security.” By including them, BAE was broadcasting that it is not simply a contractor for agencies involved in foreign intelligence, but has an active presence as a supplier to domestic security agencies, a category that includes the Department of Homeland Security (DHS), the FBI as well as local and state police forces stretching from Maine to Hawaii.

ManTech, Boeing, Harris and L-3

ManTech International, an important NSA contractor based in Fairfax, Virginia, has perfected the art of creating multi-agency software programs for both foreign and domestic intelligence. After the September 11th, 2001 attacks, it developed a classified program for the Defense Intelligence Agency called the Joint Regional Information Exchange System. DIA used it to combine classified and unclassified intelligence on terrorist threats on a single desktop. ManTech then tweaked that software for the Department of Homeland Security and sold it to DHS for its Homeland Security Information Network. According to literature ManTech distributed at GEOINT, that software will “significantly strengthen the exchange of real-time threat information used to combat terrorism.” ManTech, the brochure added, “also provides extensive, advanced information technology support to the National Security Agency” and other agencies.

In a nearby booth, Chicago, Illinois-based Boeing, the world’s second largest defense contractor, was displaying its “information sharing environment” software, which is designed to meet the Office of the Director of National Intelligence’s new requirements on agencies to stop buying “stovepiped” systems that can’t talk to each other. The ODNI wants to focus on products that will allow the NGA and other agencies to easily share their classified imagery with the CIA and other sectors of the community. “To ensure freedom in the world, the United States continues to address the challenges introduced by terrorism,” a Boeing handout said. Its new software, the company said, will allow information to be “shared efficiently and uninterrupted across intelligence agencies, first responders, military and world allies.” Boeing has a reason for publishing boastful material like this: In 2005, it lost a major contract with the NRO to build a new generation of imaging satellites after ringing up billions of dollars in cost-overruns. The New York Times recently called the Boeing project “the most spectacular and expensive failure in the 50-year history of American spy satellite projects.”

Boeing’s geospatial intelligence offerings are provided through its Space and Intelligence Systems unit, which also holds contracts with the NSA. It allows agencies and military units to map global shorelines and create detailed maps of cities and battlefields, complete with digital elevation data that allow users to construct three-dimensional maps. (In an intriguing aside, one Boeing intelligence brochure lists among its “specialized organizations” Jeppesen Government and Military Services. According to a 2006 account by New Yorker reporter Jane Mayer, Jeppesen provided logistical and navigational assistance, including flight plans and clearance to fly over other countries, to the CIA for its “extraordinary rendition” program.)

Although less known as an intelligence contractor than BAE and Boeing, the Harris Corporation has become a major force in providing contracted electronic, satellite and information technology services to the intelligence community, including the NSA and the NRO. In 2007, according to its most recent annual report, the $4.2 billion company, based in Melbourne, Florida, won several new classified contracts. NSA awarded one of them for software to be used by NSA analysts in the agency’s “Rapidly Deployable Integrated Command and Control System,” which is used by the NSA to transmit “actionable intelligence” to soldiers and commanders in the field. Harris also supplies geospatial and imagery products to the NGA. At GEOINT, Harris displayed a new product that allows agencies to analyze live video and audio data imported from UAVs. It was developed, said Fred Poole, a Harris market development manager, “with input from intelligence analysts who were looking for a video and audio analysis tool that would allow them to perform ‘intelligence fusion’” -- combining information from several agencies into a single picture of an ongoing operation.

For many of the contractors at GEOINT, the highlight of the symposium was an “interoperability demonstration” that allowed vendors to show how their products would work in a domestic crisis.

One scenario involved Cuba as a rogue nation supplying spent nuclear fuel to terrorists bent on creating havoc in the U.S.. Implausible as it was, the plot, which involved maritime transportation and ports, allowed the companies to display software that was likely already in use by the Department of Homeland Security and Naval Intelligence. The “plot” involved the discovery by U.S. intelligence of a Cuban ship carrying spent nuclear fuel heading for the U.S. Gulf Coast; an analysis of the social networks of Cuban officials involved with the illicit cargo; and the tracking and interception of the cargo as it departed from Cuba and moved across the Caribbean to Corpus Christi, Texas, a major port on the Gulf Coast. The agencies involved included the NGA, the NSA, Naval Intelligence and the Marines, and some of the key contractors working for those agencies. It illustrated how sophisticated the U.S. domestic surveillance system has become in the six years since the 9/11 attacks.

L-3 Communications, which is based in New York city, was a natural for the exercise: As mentioned earlier, retired Army Lt. General Patrick M. Hughes, its vice president of homeland security, was a member of the Booz Allen Hamilton study group that advised the Bush administration to expand the domestic use of military spy satellites. At GEOINT, L-3 displayed a new program called “multi-INT visualization environment” that combines imagery and signals intelligence data that can be laid over photographs and maps. One example shown during the interoperability demonstration showed how such data would be incorporated into a map of Florida and the waters surrounding Cuba. With L-3 a major player at the NSA, this demonstration software is likely seeing much use as the NSA and the NGA expand their information-sharing relationship.

Over the past two years, for example, the NGA has deployed dozens of employees and contractors to Iraq to support the “surge” of U.S. troops. The NGA teams provide imagery and full-motion video -- much of it beamed to the ground from Unmanned Aerial Vehicles (UAV) -- that help U.S. commanders and soldiers track and destroy insurgents fighting the U.S. occupation. And since 2004, under a memorandum of understanding with the NSA, the NGA has begun to incorporate signals intelligence into its imagery products. The blending technique allows U.S. military units to track and find targets by picking up signals from their cell phones, follow the suspects in real-time using overhead video, and direct fighter planes and artillery units to the exact location of the targets -- and blow them to smithereens.

That’s exactly how U.S. Special Forces tracked and killed Abu Musab al-Zarqawi, the alleged leader of Al Qaeda in Iraq, the NGA’s director, Navy Vice Admiral Robert Murrett, said in 2006. Later, Murrett told reporters during GEOINT 2007, the NSA and the NGA have cooperated in similar fashion in several other fronts of the “war on terror,” including in the Horn of Africa, where the U.S. military has attacked Al Qaeda units in Somalia, and in the Philippines, where U.S. forces are helping the government put down the Muslim insurgent group Abu Sayyaf. “When the NGA and the NSA work together, one plus one equals five,” said Murrett.

Civil Liberty Worries

For U.S. citizens, however, the combination of NGA imagery and NSA signals intelligence in a domestic situation could threaten important constitutional safeguards against unwarranted searches and seizures. Kate Martin, the director of the Center for National Security Studies, a nonprofit advocacy organization, has likened the NAO plan to “Big Brother in the Sky.” The Bush administration, she told the Washington Post, is “laying the bricks one at a time for a police state.”

Some Congress members, too, are concerned. “The enormity of the NAO’s capabilities and the intended use of the imagery received through these satellites for domestic homeland security purposes, and the unintended consequences that may arise, have heightened concerns among the general public, including reputable civil rights and civil liberties organizations,” Bennie G. Thompson, a Democratic member of Congress from Mississippi and the chairman of the House Homeland Security Committee, wrote in a September letter to Secretary of Homeland Security Michael Chertoff. Thompson and other lawmakers reacted with anger after reports of the NAO and the domestic spying plan were first revealed by the Wall Street Journal in August. “There was no briefing, no hearing, and no phone call from anyone on your staff to any member of this committee of why, how, or when satellite imagery would be shared with police and sheriffs’ officers nationwide,” Thompson complained to Chertoff.

At a hastily organized hearing in September, Thompson and others demanded that the opening of the NAO be delayed until further studies were conducted on its legal basis and questions about civil liberties were answered. They also demanded biweekly updates from Chertoff on the activities and progress of the new organization. Others pointed out the potential danger of allowing U.S. military satellites to be used domestically. “It will terrify you if you really understand the capabilities of satellites,” warned Jane Harman, a Democratic member of Congress from California, who represents a coastal area of Los Angeles where many of the nation’s satellites are built. As Harman well knows, military spy satellites are far more flexible, offer greater resolution, and have considerably more power to observe human activity than commercial satellites. “Even if this program is well-designed and executed, someone somewhere else could hijack it,” Harman said during the hearing.

The NAO was supposed to open for business on October 1, 2007. But the Congressional complaints have led the ODNI and DHS to delay their plans. The NAO "has no intention to begin operations until we address your questions," Charles Allen of DHS explained in a letter to Thompson. In an address at the GEOINT conference in San Antonio, Allen said that the ODNI is working with DHS and the Departments of Justice and Interior to draft the charter for the new organization, which he said will face “layers of review” once it is established.

Yet, given the Bush administration’s record of using U.S. intelligence agencies to spy on U.S. citizens, it is difficult to take such promises at face value. Moreover, the extensive corporate role in foreign and domestic intelligence means that the private sector has a great deal to gain in the new plan for intelligence-sharing. Because most private contracts with intelligence agencies are classified, however, the public will have little knowledge of this role. Before Congress signs off on the NAO, it should create a better oversight system that would allow the House of Representatives and the Senate to monitor the new organization and to examine how BAE, Boeing, Harris and its fellow corporations stand to profit from this unprecedented expansion of America’s domestic intelligence system.

Tim ­Shorrock has been writing about U.S. foreign policy and national security for nearly 30 years. His book, Spies for Hire: The Secret World of Outsourced Intelligence, will be published in May 2008 by Simon & Schuster. He can be reached at timshorrock@gmail.com.

This article was made possible in part by a generous grant from the Hurd Foundation.


Image
US intel chief wants carte blanche to peep all ‘Net traffic
In a new New Yorker profile, top spy Mike McConnell says he needs broad new …

by Julian Sanchez - Jan 17 2008
In a long profile published by The New Yorker this week (not yet online, but there's an audio interview with the profile's author at The New Yorker's site), Director of National Intelligence Mike McConnell discusses a plan in the works to dramatically expand online surveillance. As The Wall Street Journal sums it up, "in order to accomplish his plan, the government must have the ability to read all the information crossing the Internet in the United States in order to protect it from abuse."

The unfinished CyberSecurity initiative is in large part aimed at blocking attempts to attack the US' information infrastructure. "If the 9/11 perpetrators had focused on a single U.S. bank through cyber-attack and it had been successful," McConnell reportedly told the president and cabinet officers last spring, "it would have an order of magnitude greater impact on the US economy."

While short on specifics, the New Yorker piece recognizes that any plan requiring the kind of authority McConnell envisions is apt to be a hard sell: "Americans will have to trust the government not to abuse the authority it must have in order to protect our networks, and yet, historically the government has not proved worthy of that trust." McConnell acknowledges that his initiative is bound to spark debate that will make recent wrangling over reforms to the Foreign Intelligence Surveillance Act seem like "a walk in the park compared to this."

How broad are the powers needed to keep our servers safe? According to the article, in order for cyberspace to be policed, Internet activity will have to be closely monitored. Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer, or Web search. "Google has records that could help in a cyber-investigation," he said. Giorgio warned me, "We have a saying in this business: 'Privacy and security are a zero-sum game.'"

Sayings like that, says security guru Bruce Schneier, "are why the police aren't in charge; security and privacy are complimentary. Privacy is part of our security against government abuse. If they were really zero-sum, we would have seen mass immigration into East Germany."

It is also worth wondering why such extensive authority is supposed to be necessary. Google may indeed "have records that could help in a cyber-investigation." So might a suspect's employer or school; we typically manage to acquire those records by means of warrants. It is not especially comforting in this context that the article in several pieces—including in the dubious anecdote that opens the piece—repeats without question the notion that a decision by the secretive FISA court last year imposed a requirement that a warrant be obtained before intelligence offers can look at any communications flowing through US switches, including those that both originate and terminate abroad.

That would have constituted a massive change in the longstanding rules governing wiretaps, and it is nearly impossible to imagine how any court could reconcile such a demand with the wording of the FISA statute. But since the court declined to release the ruling in question, which concerned a modified, court-supervised version of the controversial warrantless wiretap program created after the terror attacks of 2001, it is impossible to know precisely what barriers to surveillance it raises. It is clear, however, that the sweeping Protect America Act passed as a response to the ruling went far beyond "fixing" the putative problem, significantly expanding government's capacity to surveil with minimal judicial oversight.

The claim that "cyber-security" demands handing over such expansive authority looks like similar overreach. On the prevention side, it is not clear why the NSA is better equipped to handle attacks than the large financial institutions terrorists would target, which surely have ample incentive and adequate resources to secure their networks. And law enforcement has thus far been managing to conduct investigation into and prosecution of computer crime under existing rules.

Even members of Congress don't appear to be getting a much more adequate explanation of which powers will be necessary for which reasons. The Journal cites Congressional aides reporting that legislators had learned more from media reports than from secret briefings on the initiative. Perhaps the hope is that lawmakers will cede whatever authority is requested, so long as it involves that confusing "series of tubes."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: We Are All Persons of Interest Melancholy of Future Livi

Postby seemslikeadream » Sun Jun 16, 2013 10:33 pm

In the shadows of the NSA scandals: the National Counter Terrorism Center
Submitted by sosadmin on Sun, 06/16/2013 - 09:50


Anybody remember the National Counter Terrorism Center (NCTC)? The one that sucks up vast quantities of private information about every single person in the United States and also helps the president identify possible targets for his ever-expanding ‘kill list’?

Marcy Wheeler over at Emptywheel makes a chilling observation in light of the NSA's admission that it sucks up the content of our communications without warrants: the NCTC likely has access to all of our emails, text messages, phone calls and information about our communications, in addition to any and all records held about us by any federal agency.

We've known for some time that the NCTC holds information about us that could include “law enforcement investigations...employment history, travel and student records,” as well as tax history, federal mortgage information, and possibly even detailed health records through the Medicare or Medicaid programs. That's bad enough, but combined with the data we now know NSA sucks up about us, it is downright dystopian.

Wheeler points out that the NCTC guidelines require the Center to be provided with “access to everything.”

[The National Security Act] provides that “[u]nless otherwise directed by the President, the Director of National Intelligence shall have access to all national intelligence and intelligence related to the national security which is collected by any federal department, agency, or other entity, except as otherwise provided by law, or as appropriate, under guidelines agreed upon by the Attorney General and the Director of National Intelligence.”

Again: all of that information is likely readily accessed or even stored by the National Counter Terrorism Center, the same government office that runs data mining programs via its ‘disposition matrix’ -- an Orwellian term for deciding who will be (often extrajudicially) targeted by the president’s secretive death squads, or by the CIA.

Most of us likely won't be targeted by the CIA or by "industrial-scale...killing machine" JSOC for extrajudicial assassination. But many of us will be arrested this year for drug crimes.

As my colleague Chris Calabrese pointed out in March 2012, the vast troves of information NCTC holds about us -- which we now know may include the content of all of our communications and records of everywhere we have traveled with our cell phones over a period of years -- can be dished out not simply to the FBI for serious criminal investigations, but also to our state and local police departments, even for investigations related to drugs.

Calabrese:

Perhaps most disturbing, once information is gathered (not necessarily connected to terrorism), in many cases it can be shared with “a federal, state, local, tribal, or foreign or international entity, or to an individual or entity not part of a government” – literally anyone. That sharing can happen in relation to national security and safety, drug investigations, if it’s evidence of a crime or to evaluate sources or contacts. This boundless sharing is broad enough to encompass disclosures to an employer or landlord about someone who NCTC may think is potentially a criminal, or at the request of local law enforcement for vetting an informant.

To recap: the NCTC makes suggestions to the president about who to target for death, kidnapping or detention; collects or has access to pretty much every single bit of information about us; and even gives that data to law enforcement to use it to lock us up on drug charges. All of this is done behind an iron wall of secrecy, with hardly any oversight whatsoever.

Tip of the iceberg, indeed.

sosadmin's blog




What Does NCTC Do with NSA and FBI’s Newly Disclosed Databases?
Posted on June 13, 2013 by emptywheel
The discussion about the various “NSA” programs we’ve seen so far have discussed only how NSA works with FBI. FBI requests the dragnet phone information and hands it over to NSA. NSA negotiates direct access to internet companies that allow FBI to make direct queries.

We’ve heard from Keith Alexander about what NSA does — its only use of Section 215, he said, was the phone records.

We heard from Robert Mueller who gave less clear answers about what FBI does and does not do.

But we have yet to have direct testimony from James “least untruthful too cute by half” James Clapper. Mind you, we’ve gotten several fact sheets and Clapper’s hilarious interview with Andrea Mitchell. Just no specific public testimony.

And curiously, in the DNI’s own fact sheets, he doesn’t specify who does what, aside from describing the statutory role his position and the Attorney General play in authorizing FAA 702 orders. He doesn’t say what FBI does, what NSA does … or what his own organization does.

That’s important, because in addition to overseeing all intelligence, Clapper’s office also includes the National Counterterrorism Center. And the NCTC is the entity in charge sharing data. Indeed, it is statutorily required to have access to everything.

[The National Security Act] provides that “[u]nless otherwise directed by the President, the Director of National Intelligence shall have access to all national intelligence and intelligence related to the national security which is collected by any federal department, agency, or other entity, except as otherwise provided by law, or as appropriate, under guidelines agreed upon by the Attorney General and the Director of National Intelligence.

That means, presumably, that NCTC is doing a lot of the work that NSA and FBI are making narrow denials about.

But it also means that NCTC can play with these databases — the dragnet and the access via PRISM to 702 data — as well as any other data in the Federal government, including databases that John Brennan gave it the ability to go get.

So here’s the thing. When Keith Alexander gives you pat reassurances about how limited NSA’s access to Americans’ call data is, that may disclose a whole lot more intrusive data mining over at James Clapper’s shop.

Remember, here is what James Clapper was initially asked.

Wyden: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

Clapper: No, sir.

Wyden: It does not?

Clapper: Not wittingly. There are cases where they could, inadvertently perhaps, collect—but not wittingly.” [my emphasis]

His first attempt to walk back that lie went like this:

What I said was, the NSA does not voyeuristically pore through U.S. citizens’ e-mails. [my emphasis]

His second attempt to walk it back went like this:

ANDREA MITCHELL: Senator Wyden made quite a lot out of your exchange with him last March during the hearings. Can you explain what you meant when you said that there was not data collection on millions of Americans?

JAMES CLAPPER: First– as I said, I have great respect for Senator Wyden. I thought, though in retrospect, I was asked– “When are you going to start– stop beating your wife” kind of question, which is meaning not– answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no.

And again, to go back to my metaphor. What I was thinking of is looking at the Dewey Decimal numbers– of those books in that metaphorical library– to me, collection of U.S. persons’ data would mean taking the book off the shelf and opening it up and reading it.

ANDREA MITCHELL: Taking the contents?

JAMES CLAPPER: Exactly. That’s what I meant. Now–

ANDREA MITCHELL: You did not mean archiving the telephone numbers?

All of those efforts were, by context at least, limited exclusively to NSA. They don’t address, at all, what NCTC might do with this data (or, for that matter, FBI).

So what does the NCTC do with the data that NSA and FBI have issued careful denials about?

Update: I’m going to replicate a big chunk of this post on the oversight over NCTC’s use of other agencies data, complete with the bit about how the guy in charge of it thought Cheney’s illegal program was the shit.

Back when John Negroponte appointed him to be the Director of National Intelligence’s Civil Liberties Protection Officer, Alexander Joel admitted he had no problem with Cheney’s illegal domestic wiretap program.

When the NSA wiretapping program began, Mr. Joel wasn’t working for the intelligence office, but he says he has reviewed it and finds no problems. The classified nature of the agency’s surveillance work makes it difficult to discuss, but he suggests that fears about what the government might be doing are overblown.

“Although you might have concerns about what might potentially be going on, those potentials are not actually being realized and if you could see what was going on, you would be reassured just like everyone else,” he says.

That should trouble you, because he’s the cornerstone of oversight over the National Counterterrorism Center’s expanded ability to obtain and do pattern analysis on US person data.

The Guidelines describe such oversight to include the following:

Periodic spot checks overseen by CLPO to make sure database use complies with Terms and Conditions
Periodic reviews to determine whether ongoing use of US person data “remains appropriate”
Reporting (the Guidelines don’t say by whom) of any “significant failure” to comply with guidelines; such reports go to the Director of NCTC, the ODNI General Counsel, the CLPO, DOJ (it doesn’t say whom at DOJ), and the IC Inspector General; note, the Guidelines don’t require reporting to the Intelligence Oversight Board, which should get notice of significant failures
Annual reports from the Director of NCTC on an (admittedly worthwhile) range of metrics on performance to the Guidelines; this report goes to the CLPO, ODNI General Counsel, the IC IG, and–if she requests it–the Assistant Attorney General for National Security
There are a few reasons to be skeptical of this. First, rather than replicate the audits recently mandated under the PATRIOT Act–in which the DOJ Inspector General develops the metrics, these Guidelines have NCTC develop the metrics themselves. And they’re designed to go to the CLPO, who officially reports to the NCTC head, rather than an IG with some independence.

That is, to a large extent, this oversight consists of NCTC reporting to itself.

Also, note who doesn’t get these reports? Congress. Not even the Intelligence Committees.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 7 guests