The Criminal N.S.A.

Moderators: Elvis, DrVolin, Jeff

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Jul 26, 2013 5:55 pm

Lawmakers Who Upheld NSA Phone Spying Received Double the Defense Industry Cash
BY DAVID KRAVETS07.26.134:14 PM

House Armed Services Committee Chairman Rep. Howard McKeon, (R-California), speaks to reporters following a closed-door briefing on Capitol Hill in Washington, D.C., Tuesday, May 21, 2013.
AP Photo/Manuel Balce Ceneta
The numbers tell the story — in votes and dollars. On Wednesday, the house voted 217 to 205 not to rein in the NSA’s phone-spying dragnet. It turns out that those 217 “no” voters received twice as much campaign financing from the defense and intelligence industry as the 205 “yes” voters.

That’s the upshot of a new analysis by MapLight, a Berkeley-based non-profit that performed the inquiry at WIRED’s request. The investigation shows that defense cash was a better predictor of a member’s vote on the Amash amendment than party affiliation. House members who voted to continue the massive phone-call-metadata spy program, on average, raked in 122 percent more money from defense contractors than those who voted Wednesday to dismantle it.

Overall, political action committees and employees from defense and intelligence firms such as Lockheed Martin, Boeing, United Technologies, Honeywell International, and others ponied up $12.97 million in donations for a two-year period ending December 31, 2012, according to the analysis, which MapLight performed with financing data from OpenSecrets. Lawmakers who voted to continue the NSA dragnet-surveillance program averaged $41,635 from the pot, whereas House members who voted to repeal authority averaged $18,765.

Of the top 10 money getters, only one House member — Rep. Jim Moran (D-Virginia) — voted to end the program.

Courtesy MapLight
“How can we trust legislators to vote in the public interest when they are dependent on industry campaign funding to get elected? Our broken money and politics system forces lawmakers into a conflict of interest between lawmakers’ voters and their donors,” said Daniel G. Newman, MapLight’s president and co-founder.

The Guardian newspaper disclosed the phone-metadata spying last month with documents leaked by former NSA contractor Edward Snowden.

The House voted 205-217 Wednesday and defeated an amendment to the roughly $600 billion Department of Defense Appropriations Act of 2014 that would have ended authority for the once-secret spy program the White House insisted was necessary to protect national security.

The amendment (.pdf) was proposed by Rep. Justin Amash (R-Michigan), who received a fraction of the money from the defense industry compared to top earners. For example, Amash got $1,400 — ranking him in the bottom 50 for the two-year period. On the flip side, Rep. Howard McKeon (R-California) scored $526,600 to lead the House in defense contributions. He voted against Amash.

Of the 26 House members who voted and did not receive any defense financing, 16 voted for the Amash amendment.

House Speaker John Boehner (R-Ohio) voted against the measure. He ranked 15th in defense earnings with a $131,000 take. House Minority Leader Nancy Pelosi (D-California) also voted against Amash. Pelosi took in $47,000 from defense firms over the two-year period.

Ninety-four Republicans voted for the amendment as did 111 Democrats.

The Amash amendment was in response to the disclosure of a leaked copy of a top-secret Foreign Intelligence Surveillance Court opinion requiring Verizon Business to provide the National Security Agency the phone numbers of both parties involved in all calls, the international mobile subscriber identity (IMSI) number for mobile callers, calling card numbers used in the call, and the time and duration of the calls.

The government confirmed the authenticity of the leak and last week suggested many more, or “certain telecommunication service providers” are required to fork over the same type of metadata. The government says it needs all the data to sift out terrorist needles in a haystack. The program began shortly after the 2001 terror attacks.

The vote list follows. (A “no” vote is a vote to continue the NSA’s phone spying.)
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Jul 27, 2013 9:31 am

They Know Much More Than You Think

In mid-May, Edward Snowden, an American in his late twenties, walked through the onyx entrance of the Mira Hotel on Nathan Road in Hong Kong and checked in. He was pulling a small black travel bag and had a number of laptop cases draped over his shoulders. Inside those cases were four computers packed with some of his country’s most closely held secrets.

Within days of Snowden’s documents appearing in The Guardian and The Washington Post, revealing several of the National Security Agency’s extensive domestic surveillance programs, bookstores reported a sudden spike in the sales of George Orwell’s classic dystopian novel 1984. On Amazon.com, the book made the “Movers & Shakers” list and skyrocketed 6,021 percent in a single day. Written sixty-five years ago, it described a fictitious totalitarian society where a shadowy leader known as “Big Brother” controls his population through invasive surveillance. “The telescreens,” Orwell wrote, “have hidden microphones and cameras. These devices, alongside informers, permit the Thought Police to spy upon everyone….”

Today, as the Snowden documents make clear, it is the NSA that keeps track of phone calls, monitors communications, and analyzes people’s thoughts through data mining of Google searches and other online activity. “Any sound that Winston made, above the level of a very low whisper, would be picked up by it,” Orwell wrote about his protagonist, Winston Smith.

There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.


Of course the US is not a totalitarian society, and no equivalent of Big Brother runs it, as the widespread reporting of Snowden’s information shows. We know little about what uses the NSA makes of most information available to it—it claims to have exposed a number of terrorist plots—and it has yet to be shown what effects its activities may have on the lives of most American citizens. Congressional committees and a special federal court are charged with overseeing its work, although they are committed to secrecy, and the court can hear appeals only from the government.

Still, the US intelligence agencies also seem to have adopted Orwell’s idea of doublethink—“to be conscious of complete truthfulness,” he wrote, “while telling carefully constructed lies.” For example, James Clapper, the director of national intelligence, was asked at a Senate hearing in March whether “the NSA collect[s] any type of data at all on millions or hundreds of millions of Americans.” Clapper’s answer: “No, sir…. Not wittingly.”

Three months later, following the revelations of the phone-log program in which the NSA collects telephone data—the numbers of both callers and the length of the calls—on hundreds of millions of Americans, Clapper switched to doublethink. He said that his previous answer was not a lie; he just chose to respond in the “least untruthful manner.” With such an Orwellian concept of the truth now being used, it is useful to take a look at what the government has been telling the public about its surveillance activities over the years, and compare it with what we know now as a result of the top secret documents and other information released by, among others, the former NSA contract employee Edward Snowden.

Looking back, the NSA and its predecessors have been gaining secret, illegal access to the communications of Americans for nearly a century. On July 1, 1920, a slim balding man in his early thirties moved into a four-story townhouse at 141 East 37th Street in Manhattan. This was the birth of the Black Chamber, the NSA’s earliest predecessor, and it would be hidden in the nondescript brownstone. But its chief, Herbert O. Yardley, had a problem. To gather intelligence for Woodrow Wilson’s government, he needed access to the telegrams entering, leaving, and passing through the country, but because of an early version of the Radio Communications Act, such access was illegal. With the shake of a hand, however, Yardley convinced Newcomb Carlton, the president of Western Union, to grant the Black Chamber secret access on a daily basis to the private messages passing over his wires—the Internet of the day.

For much of the next century, the solution would be the same: the NSA and its predecessors would enter into secret illegal agreements with the telecom companies to gain access to communications. Eventually codenamed Project Shamrock, the program finally came to a crashing halt in 1975 when a Senate committee that was investigating intelligence agency abuses discovered it. Senator Frank Church, the committee chairman, labeled the NSA program “probably the largest governmental interception program affecting Americans ever undertaken.”

As a result of the decades of illegal surveillance by the NSA, in 1978 the Foreign Intelligence Surveillance Act (FISA) was signed into law and the Foreign Intelligence Surveillance Court (FISC) came into existence. Its purpose was, for the first time, to require the NSA to get judicial approval for eavesdropping on Americans. Although the court seldom turned down a request for a warrant, or an order as it’s called, it nevertheless served as a reasonable safeguard, protecting the American public from an agency with a troubling past and a tendency to push the bounds of spying unless checked.

For a quarter of a century, the rules were followed and the NSA stayed out of trouble, but following the September 11 attacks, the Bush administration decided to illegally bypass the court and began its program of warrantless wiretapping. “Basically all rules were thrown out the window and they would use any excuse to justify a waiver to spy on Americans,” I was told by Adrienne J. Kinne, who in 2001 was a twenty-four-year-old voice intercept operator who conducted some of the eavesdropping. She or her superiors did not have to get a warrant for each interception. “It was incredibly uncomfortable to be listening to private personal conversations of Americans,” she said. “And it’s almost like going through and stumbling and finding somebody’s diary and reading it.”

All during this time, however, the Bush administration was telling the American public the opposite: that a warrant was obtained whenever an American was targeted. “Anytime you hear the United States government talking about a wiretap, it requires—a wiretap requires a court order,” President George W. Bush told a crowd in 2004. “Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so.” After exposure of the operation by The New York Times in 2005, however, rather than strengthen the controls governing the NSA’s spying, Congress instead voted to weaken them, largely by codifying into the amendment to FISA what had previously been illegal.

At the same time, rather than calling for prosecution of the telecom officials for their role in illegally cooperating in the eavesdropping program, or at least a clear public accounting, Congress simply granted them immunity not only from prosecution but also from civil suits. Thus, for nearly a century, telecom companies have been allowed to violate the privacy of millions of Americans with impunity.

With the arrival of the Obama administration, the NSA’s powers continued to expand at the same time that administration officials and the NSA continued to deceive the American public on the extent of the spying. In addition to the denial I have mentioned by James Clapper, General Keith Alexander, the NSA director, also blatantly denied that his agency was keeping records on millions of Americans. In March 2012, Wired magazine published a cover story I wrote on the new one-million-square-foot NSA data center being built in Bluffdale, Utah. In the article, I interviewed William Binney, a former high-ranking NSA official who was largely responsible for automating the agency’s worldwide eavesdropping network. He quit the agency in 2001 in protest after he saw the system designed mainly for intelligence about foreign threats turned inward on the American public. In the interview, he told how the agency was tapping into the country’s communications and Internet networks. He revealed that it also was secretly obtaining warrantless access to billions of phone records of Americans, including those of both AT&T and Verizon. “They’re storing everything they gather,” he said.

In the months afterward, General Alexander repeatedly denied Binney’s charges. “No…we don’t hold data on US citizens,” he told Fox News, and at an Aspen Institute conference he said, “To think we’re collecting on every US person…that would be against the law.” He added, “The fact is we’re a foreign intelligence agency.”

But the documents released by Edward Snowden show that the NSA does have a large-scale program to gather the telephone records of every Verizon customer, including local calls, and presumably a similar agreement with AT&T and other companies. These are records of who called whom and when, not of the content of the conversations, although the NSA has, by other methods, access to the content of conversations as well. But the NSA has, on a daily basis, access to virtually everyone’s phone records, whether cell or landline, and can store, data-mine, and keep them indefinitely. Snowden’s documents describing the PRISM program show that the agency is also accessing the Internet data of the nine major Internet companies in the US, including Google and Yahoo.

Snowden’s documents and statements add greatly to an understanding of just how the NSA goes about conducting its eavesdropping and data-mining programs, and just how deceptive the NSA and the Obama administration have been in describing the agency’s activities to the American public. In a video interview conducted in his room in the Mira Hotel, Snowden elaborated on the extent of the NSA’s capabilities. “Any analyst at any time can target anyone, any selector, anywhere,” he said.

Where those communications will be picked up depends on the range of the sensor networks and the authorities that that analyst is empowered with. Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authorities to wiretap anyone, from you or your accountant to a federal judge to even the president, if I had a personal e-mail [address].
What Snowden was discussing was the way in which analysts at the NSA can place such things as names, phone numbers, and e-mail addresses on target lists, thus causing communications containing those “selectors” to be intercepted. He seemed to be indicating—although this remains to be officially confirmed—that while under FISA, a court order would be required to enter an American on a target list, analysts have the capability to unilaterally bypass the procedure by simply listing a name or e-mail address on the target list. To understand what Snowden is saying, it is necessary to elaborate a bit on the way the NSA conducts its eavesdropping.

DDuring the past decade, the NSA has secretly worked to gain access to virtually all communications entering, leaving, or going through the country. A key reason, according to the draft of a top secret NSA inspector general’s report leaked by Snowden, is that approximately one third of all international telephone calls in the world enter, leave, or transit the United States. “Most international telephone calls are routed through a small number of switches or ‘chokepoints’ in the international telephone switching system en route to their final destination,” says the report. “The United States is a major crossroads for international switched telephone traffic.” At the same time, according to the 2009 report, virtually all Internet communications in the world pass through the US. For example, the report notes that during 2002, less than one percent of worldwide Internet bandwidth—i.e., the international link between the Internet and computers—“was between two regions that did not include the United States.”

Accessing this data is possible through a combination of techniques. Through the most effective of them, the NSA can gain direct access to the fiber-optic cables that now carry most kinds of communications data. According to a slide released by Snowden, the cable-tapping operation is codenamed “UPSTREAM” and it is described as the “collection of communications on fiber cables and infrastructure as data flows past.” It also appears to be both far more secret and far more invasive than the PRISM program revealed by Snowden. Although PRISM gives the NSA access to data from the individual Internet companies, such as Yahoo, Google, and Microsoft, the companies claim that they don’t give the agency direct access to their servers. Through UPSTREAM, however, the agency does get direct access to fiber-optic cables and the supporting infrastructure that carries nearly all the Internet and telephone traffic in the country.



As part of its cable-tapping program, the NSA has secretly installed what amount to computerized filters on the telecommunications infrastructure throughout the country. According to the leaked inspector general’s report, the agency has secret cooperative agreements with the top three telephone companies in the country. Although the report disguises their names, they are likely AT&T, Verizon, and Sprint:

NSA determined that under the Authorization it could gain access to approximately 81% of the international calls into and out of the United States through three corporate partners: Company A had access to 39%, Company B 28%, and Company C 14%.
The filters are placed at key junction points known as switches. For example, much of the communications—telephone and Internet—to and from the northwestern United States pass through a nearly windowless nine-story building at 611 Folsom Street in San Francisco. This is AT&T’s regional switching center. In 2003, the NSA built a secret room in the facility and filled it with computers and software from a company called Narus. Established in Israel by Israelis, and now owned by Boeing, Narus specializes in spyware, equipment that examines both the metadata—the names and addresses of people communicating on the Internet—and the content of digital traffic such as e-mail as it zooms past at the speed of light.

The agency also has access to the telephone metadata—the numbers called and calling and other details—of all Americans. Phone calls from telephone numbers that have been selected as targets can be routed directly to the agency and recorded. According to William Binney, the former NSA senior official, the NSA has established between ten and twenty of these secret rooms at telecom company switches around the country.

It is this daily access to the telephone metadata of all Americans without FISA warrants that the NSA and the Office of National Intelligence tried to hide when they falsely denied that the agency had surveillance records on millions of Americans. For years, the agency also had a nationwide bulk e-mail and Internet metadata collection and storage program, although that was ended in 2011 for “operational and resource reasons,” according to the director of national intelligence.

But according to a joint statement issued on July 2 by senators Ron Wyden and Mark Udall, the real reason the program was shut down was that the NSA was “unable” to prove the usefulness of the operation. “We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights,” they said, “and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so, and the program was shut down that year.” The senators added, “It is also important to note that intelligence agencies made statements to both Congress and the [FISA court] that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessment of the usefulness of particular collection program—even significant ones—are not always accurate.”

Speaking on Meet the Press, Glenn Greenwald, a lawyer and journalist who wrote the story about the NSA’s collection of phone data for The Guardian, also mentioned a still-secret eighty-page FISA court opinion that, he said, criticized the NSA for violation of both the Fourth Amendment and the FISA statute. According to Greenwald, “it specifically said that they are collecting bulk transmissions, multiple conversations from millions of Americans…and that this is illegal.” The NSA, he said, “planned to try to accommodate that ruling.” On the same program, Representative Mike Rogers, Republican chairman of the House Intelligence Committee, confirmed that the FISA court had issued a critical opinion and said that the NSA had “figured out how to correct that.”

According to The Economist of June 29, “the NSA provided congressional intelligence committees with what it said were over 50 cases in which the programmes disclosed by Mr. Snowden had contributed to the ‘understanding and, in many cases, disruption’ of terrorist plots in America, and over 20 other countries.” In a recent New York Review blog post, Kenneth Roth, director of Human Rights Watch and a former federal prosecutor, commented that “upon scrutiny” many of the plots referred to by the NSA

appear in fact to have been uncovered not because of the mass collection of our metadata but through more traditional surveillance of particular phone numbers or e-mail addresses—the kinds of targeted inquiries that easily would have justified a judicial order allowing review of records kept by communications companies or even monitoring the content of those communications.
At the AT&T facility on Folsom Street and the other locations, fiber-optic cables containing millions of communications enter the building and go into what’s known as a beam-splitter. This is a prism-type device that produces a duplicate, mirror image of the original communications. The original beams, containing Internet data, continue on to wherever they were originally destined. The duplicate beam goes into Room 641A, the NSA’s secret room one floor below, a discovery made by another whistleblower, AT&T technician Mark Klein. There the Narus equipment scans all the Internet traffic for “selectors”—names, e-mail address, words, phrases, or other indicators that the NSA wants to know about. Any message containing a selector is then retransmitted in full to the NSA for further analysis, as are the contents of phone calls selected. With regard to targeted phone numbers, the agency supplies them to the company, which then gives the NSA access to monitor them.

The selectors are inserted by remote control into the Narus equipment by NSA analysts sitting at their desks at the agency’s headquarters at Fort Meade in Maryland or at dozens of locations around the world. What Snowden seemed to be saying in his interview is that as long as certain analysts have an e-mail address, for example, they can simply enter that information into the system and retrieve the content of the e-mails sent from and to that address. There are, by his account, no judicial checks and balances to assure that the targeting of an American has been approved by a FISA court order and not just by NSA employees. These claims by Snowden, and other revelations from the documents he released, should be investigated by either a select committee of Congress, such as the Church Committee, or an independent body, like the 9/11 Commission.

While UPSTREAM captures most of the telecommunications—about 80 percent according to Binney—there are still gaps in the coverage. That is where the PRISM program comes in. With PRISM, the NSA is able to go directly to the communications industry, including the major Internet companies, to get whatever they miss from UPSTREAM. According to the top secret inspector general’s report, the “NSA maintains relationships with over 100 US companies,” adding that the US has the “home field advantage as the primary hub for worldwide telecommunications.”

According to a recent slide released by Snowden, the NSA on April 5, 2013, had 117,675 active surveillance targets in the program and was able to access real-time data on live voice, text, e-mail, or Internet chat services, in addition to analyzing stored data.

In the end, both UPSTREAM and PRISM may be only the tips of a much larger system. Another new document released by Snowden says that on New Year’s Eve, 2012, SHELLTRUMPET, a metadata program targeting international communications, had just “processed its One Trillionth metadata record.” Started five years ago, it noted that half of that trillion was added in 2012. It also noted that two more new programs, MOONLIGHTPATH and SPINNERET, “are planned to be added by September 2013.”

One man who was prescient enough to see what was coming was Senator Frank Church, the first outsider to peer into the dark recesses of the NSA. In 1975, when the NSA posed merely a fraction of the threat to privacy it poses today with UPSTREAM, PRISM, and thousands of other collection and data-mining programs, Church issued a stark warning:

That capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology…. I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.
Church sounds as if he had absorbed the lessons of 1984. From the recent evidence, they are still to be learned.

—July 12, 2013
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Jul 27, 2013 1:13 pm

Image



Thousands in Germany protest NSA surveillance


BERLIN -- Thousands of people are taking to the streets in Germany to protest against the alleged widespread surveillance of Internet users by U.S. intelligence services.

Protesters, responding to calls by a loose network calling itself #stopwatchingus, braved searing summer temperatures Saturday to demonstrate in Hamburg, Munich, Berlin and up to 35 other German cities and towns.

Some wore tinfoil hats to shield themselves from the sun -- and make a political statement about warding off unwanted eavesdroppers.

Others held placards showing support for National Security Agency leaker Edward Snowden.

Chancellor Angela Merkel raised the issue of the NSA's alleged interception of Web traffic when U.S. President Barack Obama visited Berlin last month. But German opposition parties remain skeptical of the government's claim that it had known nothing about the surveillance.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Jul 27, 2013 4:43 pm

Google Engineer Wins NSA Award, Then Says NSA Should Be Abolished
He would know.


Photo Credit: Africa Rising/Shutterstock.com

July 26, 2013

Last week, Dr. Joseph Bonneau learned that he had won the NSA’s first annual Science of Security (SoS) Competition. The competition, which aims to honor the best “scientific papers about national security” as a way to strengthen NSA collaboration with researchers in academia, honored Bonneau for his paper on the nature of passwords.

And how did Bonneau respond to being honored by the NSA? By expressing, in an honest and bittersweet blog post, his revulsion at what the NSA has become:

On a personal note, I’d be remiss not to mention my conflicted feelings about winning the award given what we know about the NSA’s widespread collection of private communications and what remains unknown about oversight over the agency’s operations. Like many in the community of cryptographers and security engineers, I’m sad that we haven’t better informed the public about the inherent dangers and questionable utility of mass surveillance. And like many American citizens I’m ashamed we’ve let our politicians sneak the country down this path.

In accepting the award I don’t condone the NSA’s surveillance.Simply put, I don’t think a free society is compatible with an organisation like the NSA in its current form.

In an interview with Andy Cush at Animal, Bonneau went even farther in his critiques of the NSA:

I’d rather have it abolished than persist in its current form. I think there’s a question about whether it’s possible to reform the NSA into something that’s more reasonable…But my feeling based on what I’ve read is that I don’t want to live in a country with an organization like the NSA is right now.

When Bonneau learned that he has won the award from the NSA, he considered turning it down. However, he ultimately decided upon accepting as a way to potentially bridge academic gaps with the NSA, as a means of opening up at least one avenue into the organization that has been mostly closed.

That said, the winner of the NSA award wants, like many privacy rights activists and citizens concerned with the government’s Fourth Amendment violations, for the NSA to be reformed by a political process (like the one which narrowly failed in the House yesterday).

Either that, or have it abolished altogether.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sun Jul 28, 2013 9:59 pm

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most of Your Emails


More Secrets on Growing State Surveillance: Exclusive with NSA Whistleblower, Targeted Hacker

"We Don’t Live in a Free Country": Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance
TOPICS
Domestic Spying, Domestic Surveillance, Wiretapping, Wikileaks, Hacking, National Security Agency
GUESTS
William Binney, served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state."

Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet.

Laura Poitras, an award-winning documentary filmmaker and producer. She is working on the third part of a trilogy of films about America post-9/11. The first film was My Country, My Country," and the second was The Oath.

RELATED
The NSA Is Watching You
Apr 26, 2012 | COLUMNS & ARTICLES
Targeted Hacker Jacob Appelbaum on CISPA, Surveillance and the "Militarization of Cyberspace"
Apr 26, 2012 | STORY
Exposed: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah
Mar 21, 2012 | STORY
LINKS
Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20
NSA website
“The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” by James Bamford. (Wired Magazine, March 15, 2012)
Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20
NSA website
“The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” by James Bamford. (Wired Magazine, March 15, 2012)
DONATE →This is viewer supported news
PRINTER-FRIENDLY
National Security Agency whistleblower William Binney reveals he believes domestic surveillance has become more expansive under President Obama than President George W. Bush. He estimates the NSA has assembled 20 trillion "transactions" — phone calls, emails and other forms of data — from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States. Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander’s assertion that the NSA is not intercepting information about U.S. citizens. This interview is part of a 5-part special on growing state surveillance." Click here to see segment 1, 2, 3, and 5. [Includes rush transcript]

TRANSCRIPT

This is a rush transcript. Copy may not be in its final form.

JUAN GONZALEZ: Well, I wanted to ask William Binney about this issue. When it comes to snail mail, the old postal system, it’s very tough for the government to intercept mail, except in times of war, particular situations. When it comes to phone conversations, land phone conversations, you need a warrant to be able to intercept phone conversations. But what about email, and what about the communication now that is really the dominant form that not only Americans, but many people around the world communicate? What are the restrictions on the government in terms of email?

WILLIAM BINNEY: Well, after some of the laws they passed, like the PATRIOT Act and their secret interpretation of Section 215, which is—my view, of course, is same as Tom Drake’s, is that that gives them license to take all the commercially held data about us, which is exceedingly dangerous, because if you take that and put it into forms of graphing, which is building relationships or social networks for everybody, and then you watch it over time, you can build up knowledge about everyone in the country. And having that knowledge then allows them the ability to concoct all kinds of charges, if they want to target you. Like in my case, they fabricated several charges and attempted to indict us on them. Fortunately, we were able to produce evidence that would make them look very silly in court, so they didn’t do it. In fact, it was—I was basically assembling evidence of malicious prosecution, which was a countercharge to them. So...

AMY GOODMAN: Do you believe all emails, the government has copies of, in the United States?

WILLIAM BINNEY: I would think—I believe they have most of them, yes.

AMY GOODMAN: And you’re speaking from a position where you would know, considering your position in the National Security Agency.

WILLIAM BINNEY: Right. All they would have to do is put various Narus devices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.

AMY GOODMAN: Jacob, your email?

JACOB APPELBAUM: Well, I selectively chose to use certain public services, like Sonic.net and Gmail, and I specifically did that so as to serve as a warning to other people. I didn’t use it for anything interesting, never once emailed Julian, for example, from those accounts. But the U.S. government again asserted in those cases, according to the Wall Street Journal, which is one way to find out about what’s going on with you—they asserted that they have the right to all that metadata. And it is possible—on Monday, I had a little interaction with the FBI, where they sort of hinted that maybe there might be a national security letter for one of my email accounts, which is also hosted by Google, specifically because I want to serve as a canary in a coal mine for other people.

AMY GOODMAN: A national security letter—it’s believed the government has given out hundreds of thousands of those.

JACOB APPELBAUM: Yeah.

AMY GOODMAN: I have also written about NSLs. But if you get one, you are not allowed to talk about it, on pain of something like up to five years in prison, even to mention that you were handed a national security letter that said turn something over.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 29, 2013 8:02 am

Glenn Greenwald: Low-Level NSA Analysts Have ‘Powerful and Invasive’ Search Tool

By Kari Rea
Jul 28, 2013 10:17am
Today on “This Week,” Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans.
“The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “And what these programs are, are very simple screens, like the ones that supermarket clerks or shipping and receiving clerks use, where all an analyst has to do is enter an email address or an IP address, and it does two things. It searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future.”
Greenwald explained that while there are “legal constraints” on surveillance that require approval by the FISA court, these programs still allow analysts to search through data with little court approval or supervision.
“There are legal constraints for how you can spy on Americans,” Greenwald said. “You can’t target them without going to the FISA court. But these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents.”
“And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added.
But the top Republican on the Senate Intelligence Committee told Stephanopoulos he would be shocked if such programs existed.
“It wouldn’t just surprise me, it would shock me,” Sen. Saxby Chambliss, R-Georgia, said on “This Week” Sunday.
Chambliss said he recently spent time with NSA officials and was assured that the programs Greenwald describes have been exaggerated.
“I was back out at NSA just last week, spent a couple hours out there with high and low level NSA officials,” Chambliss said. “And what I have been assured of is that there is no capability at NSA for anyone without a court order to listen to any telephone conversation or to monitor any e-mail.”
Chambliss said that any monitoring of emails is purely “accidental.”
“In fact, we don’t monitor emails. That’s what kind of assures me is that what the reporting is is not correct. Because no emails are monitored now,” Chambliss said. “They used to be, but that stopped two or three years ago. So I feel confident that there may have been some abuse, but if it was it was pure accidental.”
But Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month.

ABC News

“It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said.
NSA Director Gen. Keith Alexander and House Intelligence leaders have previously downplayed Snowden’s access to NSA data. Greenwald said the revelation of this search capability deserves a response from NSA officials when they testify before Congress again this week.
“NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Greenwald, who will join via video-link a separate bipartisan congressional group hearing from critics of the NSA’s surveillance programs on Wednesday, called on lawmakers to push for more information about the NSA’s practices.
“The real issue here is that what the NSA does is done in complete secrecy. Nobody really monitors who they are eavesdropping on,” Greenwald said. “So the question of abuse is one that the Congress ought to be investigating much more aggressively.”
Snowden, the former NSA contractor who leaked information about two sweeping intelligence programs, has previously warned that they are open to abuse by those with access. In a video interview with The Guardian, he said, “Any analyst at any time can target anyone… I, sitting at my desk, had the authority to wiretap anyone, from you or your accountant to a federal judge to even the president if I had a personal email.”
Snowden has been holed up in a Moscow airport for weeks. He is currently attempting to secure temporary asylum in Russia on the grounds that he would be tortured or face the death penalty if he returned to the United States.
Attorney General Eric Holder responded to Snowden’s appeal last week, writing in a letter to the Russian government, “These claims are entirely without merit.”
FULL COVERAGE: Edward Snowden
Today, Greenwald told Stephanopoulos that Snowden’s petition is still pending, but the former NSA contractor prefers that the focus be elsewhere.
“I think he’s content with having nothing happen so the focus isn’t on him, but is on the substance of the revelations that he came forward to shine light on,” Greenwald said.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 29, 2013 10:15 am

Glenn Greenwald: 'I Defy' the NSA to Deny Edward Snowden's Most Radical Claims Under Oath
Some officials say Edward Snowden was lying. The journalist who brought his revelations to light wants them to say it under oath.
CONOR FRIEDERSDORFJUL 29 2013, 5:27 AM ET

On ABC's Sunday-morning news program, This Week, George Stephanopolous led with the Anthony Weiner scandal -- after all, whatever happens to be going on in New York City and sex are always the most vital topics in the United States. A bit later, however, he got to the next most important story: the possibility that low-level NSA analysts can access anyone's calls, emails, and web history.

Critics of NSA leaker Edward Snowden have long insisted that he has "greatly exaggerated the amount of information available to people like him." The most radical claim in Snowden's video was perhaps that "I, sitting at my desk ... had the authorities to wiretap anyone from you or your accountant to a federal judge to even the president if I had a personal email."

Was he exaggerating? Or was he right all along?

Glenn Greenwald of The Guardian says its the latter:

George Stephanopolous: Now that claim was denied by intelligence officials, and the Chair of the House Intelligence Committee, Mike Rogers, said that he was actually lying.

But your new reporting you say bolsters Snowden's claim.

Glenn Greenwald: Right, George. One of the most amazing parts of this entire episode has been that top-level national security officials like James Clapper really did get caught red-handed lying to the American Congress, which everyone now acknowledges, about what the NSA is doing. And it's amazing that he not only hasn't been prosecuted, but still has his job. And what that does is, it lets national-security officials continue to lie to the public, which is what happened in that exchange you just referenced.

The way that I know exactly what analysts have the capability to do when they're spying on Americans is that the story I've been working on for the last month that we're publishing this week very clearly sets forth what these programs are that NSA analysts -- low-level ones, not just ones who work for the NSA, but private contractors like Mr. Snowden -- are able to do. The NSA has trillions of telephone calls and emails in their databases that they've collected over the last several years. And what these programs are, are very simple screens like the ones that supermarket clerks or shipping and receiving clerks use, where all an analyst has to do is enter an email address or an IP address and it does two things: it searches a database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered. And it also alerts them to any further activity that people connected to that email address of that IP address do in the future.

And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst. There are legal constraints for how you can spy on Americans. You can't target them without going through the FISA court. But these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. It's an incredibly powerful and invasive tool exactly of the type that Mr. Snowden described. And NSA officials are going to be testifying before the Senate on Wednesday. And I defy them to deny that these programs work exactly as I just said.

If Senate oversight is worth anything, the NSA officials who testify before it on Wednesday will be asked to respond under oath to Greenwald's remarks (or his story, if it has posted.) Of course, it isn't as if national-security officials haven't lied to Congress before without any consequences.




Momentum Builds Against N.S.A. Surveillance
By JONATHAN WEISMAN
Published: July 28, 2013 38 Comments

WASHINGTON — The movement to crack down on government surveillance started with an odd couple from Michigan, Representatives Justin Amash, a young libertarian Republican known even to his friends as “chief wing nut,” and John Conyers Jr., an elder of the liberal left in his 25th House term.

Christopher Gregory/The New York Times
Representative Justin Amash, a Michigan Republican, is part of the movement to crack down on government surveillance.

But what began on the political fringes only a week ago has built a momentum that even critics say may be unstoppable, drawing support from Republican and Democratic leaders, attracting moderates in both parties and pulling in some of the most respected voices on national security in the House.

The rapidly shifting politics were reflected clearly in the House on Wednesday, when a plan to defund the National Security Agency’s telephone data collection program fell just seven votes short of passage. Now, after initially signaling that they were comfortable with the scope of the N.S.A.’s collection of Americans’ phone and Internet activities, but not their content, revealed last month by Edward J. Snowden, lawmakers are showing an increasing willingness to use legislation to curb those actions.

Representatives Jim Sensenbrenner, Republican of Wisconsin, and Zoe Lofgren, Democrat of California, have begun work on legislation in the House Judiciary Committee to significantly rein in N.S.A. telephone surveillance. Mr. Sensenbrenner said on Friday that he would have a bill ready when Congress returned from its August recess that would restrict phone surveillance to only those named as targets of a federal terrorism investigation, make significant changes to the secret court that oversees such programs and give businesses like Microsoft and Google permission to reveal their dealings before that court.

“There is a growing sense that things have really gone a-kilter here,” Ms. Lofgren said.

The sudden reconsideration of post-Sept. 11 counterterrorism policy has taken much of Washington by surprise. As the revelations by Mr. Snowden, a former N.S.A. contractor, were gaining attention in the news media, the White House and leaders in both parties stood united behind the programs he had unmasked. They were focused mostly on bringing the leaker to justice.

Backers of sweeping surveillance powers now say they recognize that changes are likely, and they are taking steps to make sure they maintain control over the extent of any revisions. Leaders of the Senate Intelligence Committee met on Wednesday as the House deliberated to try to find accommodations to growing public misgivings about the programs, said the committee’s chairwoman, Senator Dianne Feinstein, Democrat of California.

Senator Mark Udall, a Colorado Democrat and longtime critic of the N.S.A. surveillance programs, said he had taken part in serious meetings to discuss changes.

Senator Saxby Chambliss of Georgia, the ranking Republican on the panel, said, “We’re talking through it right now.” He added, “There are a lot of ideas on the table, and it’s pretty obvious that we’ve got some uneasy folks.”

Representative Mike Rogers, a Michigan Republican and the chairman of the House Intelligence Committee, has assured House colleagues that an intelligence policy bill he plans to draft in mid-September will include new privacy safeguards.

Aides familiar with his efforts said the House Intelligence Committee was focusing on more transparency for the secret Foreign Intelligence Surveillance Court, which oversees data gathering, including possibly declassifying that court’s orders, and changes to the way the surveillance data is stored. The legislation may order such data to be held by the telecommunications companies that produce them or by an independent entity, not the government.

Lawmakers say their votes to restrain the N.S.A. reflect a gut-level concern among voters about personal privacy.

“I represent a very reasonable district in suburban Philadelphia, and my constituents are expressing a growing concern on the sweeping amounts of data that the government is compiling,” said Representative Michael G. Fitzpatrick, a moderate Republican who represents one of the few true swing districts left in the House and who voted on Wednesday to limit N.S.A. surveillance.

Votes from the likes of Mr. Fitzpatrick were not initially anticipated when Republican leaders chided reporters for their interest in legislation that they said would go nowhere. As the House slowly worked its way on Wednesday toward an evening vote to curb government surveillance, even proponents of the legislation jokingly predicted that only the “wing nuts” — the libertarians of the right, the most ardent liberals on the left — would support the measure.

Then Mr. Sensenbrenner, a Republican veteran and one of the primary authors of the post-Sept. 11 Patriot Act, stepped to a microphone on the House floor. Never, he said, did he intend to allow the wholesale vacuuming up of domestic phone records, nor did his legislation envision that data dragnets would go beyond specific targets of terrorism investigations.

“The time has come to stop it, and the way we stop it is to approve this amendment,” Mr. Sensenbrenner said.

He had not intended to speak, and when he did, he did not say much, just seven brief sentences.

“I was able to say what needed to be said in a minute,” he said Friday.

Lawmakers from both parties said the brief speech was a pivotal moment. When the tally was final, the effort to end the N.S.A.’s programs had fallen short, 205 to 217. Supporters included Republican leaders like Representative Cathy McMorris Rodgers of Washington and Democratic leaders like Representative James E. Clyburn of South Carolina. Republican moderates like Mr. Fitzpatrick and Blue Dog Democrats like Representative Kurt Schrader of Oregon joined with respected voices on national security matters like Mr. Sensenbrenner and Ms. Lofgren.
Readers’ Comments
Share your thoughts.
Post a Comment »
Read All Comments (38) »
Besides Ms. McMorris Rodgers, Representative Lynn Jenkins of Kansas, another member of the Republican leadership, voted yes. On the Democratic side, the chairman of the House Democratic Caucus, Representative Xavier Becerra of California, and his vice chairman, Representative Joseph Crowley of New York, broke with the top two Democrats, Representatives Nancy Pelosi of California and Steny H. Hoyer of Maryland, who pressed hard for no votes.

On Friday, Ms. Pelosi, the House minority leader and a veteran of the Intelligence Committee, and Mr. Hoyer dashed off a letter to the president warning that even those Democrats who had stayed with him on the issue on Wednesday would be seeking changes.

That letter included the signature of Mr. Conyers, who is rallying an increasingly unified Democratic caucus to his side, as well as 61 House Democrats who voted no on Wednesday but are now publicly signaling their discontent.

“Although some of us voted for and others against the amendment, we all agree that there are lingering questions and concerns about the current” data collection program, the letter stated.

Representative Reid Ribble of Wisconsin, a Republican who voted for the curbs and predicted that changes to the N.S.A. surveillance programs were now unstoppable, said: “This was in many respects a vote intended to send a message. The vote was just too strong.”

Ms. Lofgren said the White House and Democratic and Republican leaders had not come to grips with what she called “a grave sense of betrayal” that greeted Mr. Snowden’s revelations. Since the Bush administration, lawmakers had been repeatedly assured that such indiscriminate collection of data did not exist, and that when targeting was unspecific, it was aimed at people abroad.

The movement against the N.S.A. began with the fringes of each party. Mr. Amash of Michigan began pressing for an amendment on the annual military spending bill aimed at the N.S.A. Leaders of the Intelligence Committee argued strenuously that such an amendment was not relevant to military spending and should be ruled out of order.

But Mr. Amash, an acolyte of Ron Paul, a libertarian former congressman, persisted and rallied support.

Mr. Sensenbrenner and Ms. Lofgren said they were willing to work with the House and Senate intelligence panels to overhaul the surveillance programs, but indicated that they did not believe those panels were ready to go far enough.

“I would just hope the Intelligence Committees will not stick their heads in the sand on this,” Mr. Sensenbrenner said.



With NSA revelations, Sen. Ron Wyden’s vague warnings about privacy finally become clear

Charles Dharapak/AP - “If we don’t take a unique moment in our constitutional history — in our political history — to fix a surveillance system that [is] just off the rails, I think we’ll regret it,” Sen. Ron Wyden (D-Ore.) said.

By David A. Fahrenthold, Published: July 28 E-mail the writer
It was one of the strangest personal crusades on Capitol Hill: For years, Sen. Ron Wyden said he was worried that intelligence agencies were violating Americans’ privacy.

But he couldn’t say how. That was a secret.


Latest on this story
Marc Thiessen: House Republicans’ NSA hypocrisy
Morning Bits
After the whistle: Revealers of government secrets share how their lives have changed
How to reform the NSA’s metadata program
The big story
Attorney General Eric H. Holder Jr. has told a Russian official that the United States will not seek the death penalty for Edward Snowden.
Full coverage
FAQ: NSA surveillance and Snowden



Wyden’s outrage, he said, stemmed from top-secret information he had learned as a member of the Senate Intelligence Committee. But Wyden (D-Ore.) was bound by secrecy rules, unable to reveal what he knew.

Everything but his unhappiness had to be classified. So Wyden stuck to speeches that were dire but vague. And often ignored.

“I want to deliver a warning this afternoon: When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry,” Wyden said on the Senate floor in May 2011.

Two years later, they found out.

The revelations from former National Security Agency contractor Edward Snowden — detailing vast domestic surveillance programs that vacuumed up data on phone calls, e-mails and other electronic communications — have filled in the details of Wyden’s concerns.

So he was right. But that is not the same as winning.

To change the law and restrict domestic spying, the low-key Wyden still must overcome opposition from the White House and the leaders of both parties in Congress.

“If we don’t take a unique moment in our constitutional history — in our political history — to fix a surveillance system that [is] just off the rails, I think we’ll regret it,” he said in a telephone interview Friday.

Now, in the aftermath of Snowden’s disclosures, Wyden is pressing his case on two fronts.

One uses Congress’s power to ask questions. Wyden has sought to force spy agency leaders to clarify — in public — the nature of their intelligence-gathering on Americans.

On Friday, Director of National Intelligence James R. Clapper Jr. responded to a letter co-authored by Wyden with new details.

Clapper said the government was not using its authority under the Patriot Act to collect bulk data on Americans, beyond two programs already disclosed. One gathers data on phone calls. The other, now shut down, gathered data on electronic messages. Clapper also conceded that there had been “compliance problems,” in which the NSA had not met the terms of secret-court orders that allowed the data-gathering.

In addition, Wyden is seeking legislative change, including an overhaul of the Foreign Intelligence Surveillance Court.

“It’s the most one-sided legal process in the United States,” Wyden said in an interview on C-SPAN’s “Newsmakers” that aired Sunday. “I don’t know of any other legal system or court that really doesn’t highlight anything except one point of view.”

He said later that lawmakers should seek to “diversify some of the thinking on the court.”

‘The right questions’

Wyden, 64, is not possessed of a troublemaker’s personality. He has been an earnest, cordial presence in Congress since 1981. Before that, he got his political education as an activist with the Oregon chapter of a group known as the Panthers — not Black, but Gray. As a 20-something, Wyden was a leader of the Gray Panthers, an activist organization for seniors.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 29, 2013 10:49 am

National Security Brief: The Battle Over NSA Surveillance Just Beginning
BY THINKPROGRESS ON JULY 29, 2013 AT 9:26 AM
The House last week narrowly defeated an amendment to a defense spending bill that sought to limit the scope of the NSA’s counterterror surveillance, but as the New York Times reports on Monday, “what began on the political fringes only a week ago has built a momentum that even critics say may be unstoppable, drawing support from Republican and Democratic leaders, attracting moderates in both parties and pulling in some of the most respected voices on national security in the House.”
Indeed, the Senate Intelligence Committee’s top Republican said on Sunday that the NSA should be reined in. “I do think that we’re going to have to make some changes to make things more transparent,” Sen. Saxby Chambliss (R-GA) said on ABC’s This Week.
The Times adds that House members will soon be introducing legislation “that would restrict phone surveillance to only those named as targets of a federal terrorism investigation, make significant changes to the secret court that oversees such programs and give businesses like Microsoft and Google permission to reveal their dealings before that court.”
Even Rep. Mike Rogers (R-MI), the chairman of the House Intelligence Committee and a supporter of the NSA programs, has said that he plans to include privacy safeguards in a new intelligence policy bill he plans to introduce in the coming months.
Others have said they plan to try to change the way the secret court authorizing NSA surveillance operates. Currently, the court hears only one side of an argument on whether to authorize spying on a specific target. “There should be another step here,” Sen. Dick Durbin (D-IL) said on Sunday. “These FISA courts, there should be a real court proceeding. In this case it’s fixed in a way, it’s loaded. There’s only one case coming before the FISA court, the government’s case. Let’s have an advocate for someone standing up for civil liberties.”
The New York Times editorialized on Monday that FISA court reform should go one step further, “the method by which the court’s judges are chosen.” The Times notes that “[a]ll 11 of the current members were assigned to the court by Chief Justice John Roberts Jr. In the nearly eight years he has been making his selections, Chief Justice Roberts has leaned about as far right as it is possible to go. Ten of those 11 members were appointed to the bench by Republican presidents; the two previous chief justices put Republican-appointed judges on the court 66 percent of the time, as reported by Charlie Savage in The Times.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 29, 2013 2:19 pm

Senate Majority Whip: FISA Court Is 'Fixed' and 'Loaded'
Dick Durbin wants to add a civil-liberties advocate to the court's proceedings and to limit the NSA's data collection.
CONOR FRIEDERSDORFJUL 29 2013, 8:35 AM ET

The Obama Administration says the FISA court adequately safeguards Americans' civil liberties. Senate Majority Whip Dick Durbin, who holds the second-highest Democratic leadership position in the Senate, disagrees.

"These FISA courts -- there should be a real court proceeding," he said on Sunday. "In this case, it's fixed in a way. It's loaded. There's only one case coming before the FISA court: the government's case. Let's have an advocate, or someone, standing up for civil liberties, to speak up for the privacy of Americans when they make each of these decisions, and let's release some of the transcripts, redacted, carefully redacted, so that people understand the debate that's going on in these FISA courts." When you've got a senior lawmaker calling a secret court "fixed in a way," implying that it doesn't conduct "real" proceedings, and affirming that its judges aren't hearing information that would be relevant to their decisions, that's alarming.

Unless, of course, what you want is a rubber stamp for the surveillance state.

Durbin said in the same interview that Congress should rein in the NSA's data hoovering. "I really believe that we should limit this metadata collection," he said. "The notion that we're going to collect all the phone records of everyone living in an area code on the off chance that someone in that area code may be a suspect at a later time goes way too far." Senate Majority Leader Harry Reid has been much more deferential to the executive branch on this issue.

Perhaps Senate Democrats should replace him.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 29, 2013 4:19 pm

NZ DISPUTES REPORT THAT IT SPIED ON JOURNALIST
By NICK PERRY
— Jul. 29 9:18 AM EDT


In this Tuesday, July 9 2013 photo, War correspondent Jon Stephenson gives evidence in his defamation case against Defense Force chief Lieutenant General Rhys Jones in the High Court in Wellington, New Zealand. New Zealand's acting defense force chief said Monday, July 29, 2013, that there is no evidence the military unlawfully spied on Stephenson in Afghanistan who was freelancing for U.S. news organisation McClatchy. (AP photo/Mark Mitchell, New Zealand Herald) AUSTRALIA OUT, NEW ZEALAND OUT


In this Monday, July 8 2013 photo taken in Wellington New Zealand, Investigative journalist Jon Stephenson arrives for his case, against Defense Force chief Lieutenant General Rhys Jones, at the High Court in Wellington, New Zealand. New Zealand's acting defense force chief said Monday, July 29, 2013, that there is no evidence the military unlawfully spied on Stephenson in Afghanistan who was freelancing for U.S. news organization McClatchy. (AP photo/Mark Mitchell, New Zealand Herald) AUSTRALIA OUT, NEW ZEALAND OUT


In this Monday, July 8, 2013 photo, acting defense force chief Lieutenant General Rhys Jones listening to evidence from war correspondent Jon Stephenson in the High Court in Wellington, New Zealand,. Jones said Monday July 29, 2013, that there is no evidence the military unlawfully spied on Stephenson in Afghanistan who was freelancing for U.S. news organization McClatchy. (AP photo/Mark Mitchell/New Zealand Herald) AUSTRALIA OUT, NEW ZEALAND OUT
Prev 1 of 3 Next

WELLINGTON, New Zealand (AP) — New Zealand on Monday disputed a newspaper report saying its military conspired with U.S. spy agencies to monitor a freelance journalist in Afghanistan, a report that has provoked concerns over how surveillance programs revealed by National Security Agency leaker Edward Snowden might be used to spy on reporters.

The New Zealand government said Monday there is no evidence to support a report in the Sunday Star-Times newspaper that the military was assisted by the United States in monitoring the phone data of journalist Jon Stephenson, a New Zealander working for the U.S.-based McClatchy news organization.

The report is the first indication that the NSA's techniques may have been used to spy on a journalist. It challenges U.S. claims that the NSA programs were not used to target specific individuals, but rather to compile large pools of usage data.

Prime Minister John Key fanned the debate Monday by saying it is possible that reporters could get caught in surveillance nets when the U.S. spies on enemy combatants. New Zealand and the United States are party to a five-country agreement on sharing intelligence information.

U.S. surveillance programs have become the focus of a global debate since Snowden, a former defense contract worker, leaked classified information about the NSA in June. The U.S. says the NSA programs are necessary to avert terror attacks, while critics have called it unregulated spying.

Military officials in Wellington were quick to reject the claims in the article by freelance investigative reporter and liberal activist Nicky Hager. He wrote that the military became unhappy at Stephenson's reporting on how it treated Afghan prisoners.

"We have identified no information at this time that supports Mr. Hager's claims," Maj. Gen. Tim Keating, the acting defense force chief, said in a statement.

He said the military officers responsible for operations in Afghanistan had assured him there had been no unlawful monitoring of Stephenson by New Zealand. "This includes asking foreign organizations to do this on our behalf," he said.

Also Monday, New Zealand Defense Minister Jonathan Coleman acknowledged the existence of an embarrassing confidential order that lists investigative journalists alongside spies and terrorists as potential threats to New Zealand's military. That document was leaked to Hager, who provided a copy to The Associated Press. Coleman said the order will be modified to remove references to journalists.

He also said the New Zealand Defense Force had conducted an extensive search of its records over the weekend and had found no evidence that either it or any other agency had spied on Stephenson.

"The collection of metadata on behalf of the NZDF by the U.S. would not be a legitimate practice, when practiced on a New Zealand citizen," Coleman said. "It wouldn't be something I would support as the minister, and I'd be very concerned if that had actually been the case."

Metadata is the information associated with a phone call or an email, such as the location of the caller or sender, or the length of the call. It is analogous to the information available on the envelope of a letter sent by regular mail.

Prime Minister Key, who is traveling in South Korea, told a reporter from The New Zealand Herald newspaper that "if you rang a member of the Taliban that the Americans were monitoring because they believed them to be a threat, then in theory that's how you could show up."

"I'm not saying that's happened. I'm just saying that we don't go and monitor journalists," he added.

On Monday, Hager said he stood by the story.

"Direct denials are always unsettling, but I would not have published unless I had a really good source," he said.

Hager, who has written several books on New Zealand military intelligence, declined to elaborate on his sourcing. He said he's faced unwarranted denials before.

The confidential order he obtained states under the heading "The Threat" that "Organizations with extreme ideologies may try to acquire classified information, not necessarily to give to a potential enemy, but because its use may bring the government into disrepute. There is also a threat from certain investigative journalists who may seek to acquire and exploit official information for similar reasons."

The revelation has angered journalism advocates in New Zealand.

Coleman said the order, first issued a decade ago and reissued in 2005, was heavy-handed and inappropriate, and that he'd asked the defense force to rewrite it to remove the references to journalists.

The story on Stephenson came after he sued the defense force for defamation. Stephenson had sought 500,000 New Zealand dollars ($405,000) in reparation after claiming the defense force had damaged his reputation by implying he fabricated an interview with a unit commander. During the trial this month, the defense force acknowledged the interview may have taken place. The trial ended with the jury unable to reach a verdict.

Stephenson, who is on vacation in Europe, could not be reached Monday.

The White House did not respond Sunday to requests for comment on the Sunday Star-Times story.

McClatchy said it had not yet spoken with its former freelancer, or with the U.S. or New Zealand governments.

"We don't have much information on this. We really have learned about it this morning from the Star-Times report," said Anders Gyllenhaal, McClatchy's vice president for news and Washington editor.

The company based in Sacramento, California, hasn't lodged a complaint with U.S. officials because it is still trying to figure out what exactly happened and when, Gyllenhaal added.

The NSA sometimes shares intelligence information with New Zealand agencies under a long-standing arrangement known as "Five Eyes." In addition to New Zealand and the U.S., the alliance includes Britain, Australia and Canada.

Snowden's leaked information exposed the reach of the U.S. programs that monitor millions of telephone and Internet records inside and outside the U.S. Officials have said the surveillance tracks only metadata and not specific details like the contents of telephone calls. They say the surveillance programs have averted multiple terror attacks
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Jul 30, 2013 10:43 am

Why NSA Surveillance Will Be More Damaging Than You Think
The real threat from terrorism is not the harm it inflicts directly but the over-reaction it provokes. We saw that with the invasion of Iraq. We're seeing it with security-state overreach.
JAMES FALLOWSJUL 30 2013, 4:39 AM ET

This column over the weekend, by the British academic John Naughton in the Guardian, takes us one more step in assessing the damage to American interests in the broadest sense-- commercial, strategic, ideological – from the panopticon approach to "security" brought to us by NSA-style monitoring programs.

Naughton's essay doesn't technically tell us anything new. For instance, see earlier reports like this, this, and this. But it does sharpen the focus in a useful way. Whoever wrote the headline and especially the subhead did a great job of capturing the gist:

In short: because of what the U.S. government assumed it could do with information it had the technological ability to intercept, American companies and American interests are sure to suffer in their efforts to shape and benefit from the Internet's continued growth.

American companies, because no foreigners will believe these firms can guarantee security from U.S. government surveillance;
American interests, because the United States has gravely compromised its plausibility as world-wide administrator of the Internet's standards and advocate for its open, above-politics goals.
Why were U.S. authorities in a position to get at so much of the world's digital data in the first place? Because so many of the world's customers have trusted* U.S.-based firms like Google, Yahoo, Apple, Amazon, Facebook, etc with their data; and because so many of the world's nations have tolerated an info-infrastructure in which an outsized share of data flows at some point through U.S. systems. Those are the conditions of trust and toleration that likely will change.

The problem for the companies, it's worth emphasizing, is not that they were so unduly eager to cooperate with U.S. government surveillance. Many seem to have done what they could to resist. The problem is what the U.S. government -- first under Bush and Cheney, now under Obama and Biden -- asked them to do. As long as they operate in U.S. territory and under U.S. laws, companies like Google or Facebook had no choice but to comply. But people around the world who have a choice about where to store their data, may understandably choose to avoid leaving it with companies subject to the way America now defines its security interests.

Here's Naughton's version of the implications:

The first is that the days of the internet as a truly global network are numbered. It was always a possibility that the system would eventually be Balkanised, ie divided into a number of geographical or jurisdiction-determined subnets as societies such as China, Russia, Iran and other Islamic states decided that they needed to control how their citizens communicated. Now, Balkanisation is a certainty....

Second, the issue of internet governance is about to become very contentious. Given what we now know about how the US and its satraps have been abusing their privileged position in the global infrastructure, the idea that the western powers can be allowed to continue to control it has become untenable.... Nothing, but nothing, that is stored in their [ie, US-based companies] "cloud" services can be guaranteed to be safe from surveillance or from illicit downloading by employees of the consultancies employed by the NSA.

The real threat from terrorism has never been the damage it does directly, even though attacks as horrific as those on 9/11. The more serious threat comes from the over-reaction, the collective insanity or the simple loss of perspective, that an attack evokes. Our government's ambition to do everything possible to keep us "safe" has put us at jeopardy in other ways.

One more note: it is also worth emphasizing that this damage was not done by Edward Snowden, except in an incidental and instrumental sense. The damage comes from the policies themselves, just as the lasting damage from Abu Ghraib came not from the leaked photos but from the abuse they portrayed.
What governments do eventually becomes known. Eventual disclosure is likely when a program involves even a handful of people. (Latest case in point: Seal Team Six.) It is certain when an effort stretches over many years, entails contracts worth billions of dollars, and requires the efforts of tens of thousands of people -- any one of whom, as we've seen from Snowden, may at any point decide to tell what he knows.

In launching such an effort, a government must assume as a given that what it is doing will become known, and then calculate whether it will still seem "worthwhile" when it does. Based on what we've seen so far, Prism would have failed that test.

____

* Of course the "trust" comes with the caveat that the companies have been piling up this data for their own commercial, ad-targeting, data-mining purposes. But that's a known risk, more or less. The demands placed on the companies by the U.S. government are, for the public at large, the main news of the Snowden revelations
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Jul 30, 2013 10:50 am

What the Ashcroft “Hospital Showdown” on NSA spying was all about
How the government sought to justify blanket collection of Internet metadata.

by Julian Sanchez - July 29 2013, 8:00am CDT

We’ve known for years that the STELLAR WIND surveillance program—a massive NSA effort authorized by President George W. Bush after 9/11—eventually led to a dramatic showdown at the bedside of then-attorney general John Ashcroft. The situation surrounding STELLAR WIND was on such shaky legal ground that top members of the government threatened to quit in protest, though the exact reasons for their unease have been difficult to pinpoint.

Now, documents leaked by Edward Snowden have finally given us a clearer idea of what that showdown was really about: the wholesale collection of Internet metadata.

Showdown

The infamous showdown took place in March 2004, while Ashcroft was recovering from illness in a hospital bed. Acting attorney general James Comey—now President Obama’s nominee to head the FBI—was refusing to reauthorize one component of the secret surveillance program. Comey concluded that it was illegal. This prompted White House counsel Alberto Gonzales to rush to Ashcroft’s hospital room in hopes of getting the ailing AG to countermand Comey, who was tipped off about Gonzales’ plan and sped there as well.

In the confrontation that ensued, Ashcroft supported Comey both formally (because Comey was legally the attorney general while Ashcroft was incapacitated) and on the legal substance. Bush reauthorized the program despite the Justice Department’s conclusion that it was unlawful. Comey then threatened to resign—with Ashcroft, FBI director Robert Mueller, and other top officials reportedly ready to join him. Bush ultimately backed down, and the troublesome program was briefly suspended until it could be renewed under a different legal authority.

In 2008, we learned that the central bone of contention during this showdown wasn’t warrantless wiretapping but rather some form of data mining. More recently, via reporting in The Washington Post and a classified NSA report leaked by The Guardian, we learned that the controversy specifically involved Internet—not telephone—metadata. The NSA report in particular makes it fairly clear what the controversy must have been about—at least if you’re steeped in surveillance law. For those who aren’t, this is what probably happened.

Data and metadata

STELLAR WIND had four components, each corresponding to types of information that President Bush authorized the NSA to collect without a court order:

telephone content (i.e., warrantless wiretapping)
Internet content
telephone metadata (i.e., the massive call records database)
Internet metadata
The administration originally carried out this surveillance under the radical theory of “inherent presidential authority” spelled out by then-Justice Department lawyer John Yoo. The theory held that, during wartime, the president’s surveillance powers could not be constrained by Congress or even by the Fourth Amendment. After Yoo returned to academia in 2003, however, his successors grew uncomfortable with his leaps of legal logic and stopped relying on his questionable opinions on a broad range of counterterrorism issues.

Instead, to justify Bush’s surveillance programs, DOJ lawyers switched to the theory, spelled out at length in a January 2006 white paper, that Congress’ Authorization for the Use of Military Force (AUMF) against Al Qaeda and their affiliates had created a tacit exception to the Foreign Intelligence Surveillance Act (FISA). Though FISA is supposed to be the “exclusive means” by which intelligence surveillance is conducted, DOJ attorneys argued that the AUMF authority to use “all necessary and appropriate force” against those who the president “determines planned, authorized, committed, or aided” the September 11 attacks necessarily included the power to conduct surveillance, superseding FISA’s judicial review requirements.

That was far less radical than Yoo’s argument, though still a pretty problematic bit of legal reasoning. Congress, after all, explicitly expanded the government’s surveillance powers in the USA Patriot Act soon after passing the AUMF, which suggests that Congress didn’t think it already gave the president carte blanche. Moreover, the administration appears not to have asked for changes that would have made STELLAR WIND lawful—at least in part out of fear that Congress would refuse. Still, this wasn’t what Comey objected to. He and his colleagues seem to have accepted this general line of reasoning when it came to warrantless wiretapping.

The presidential authorization to intercept telephone and Internet content (as opposed to metadata) was at least somewhat limited. Though no court oversight was required, the NSA had to believe that the target of its taps was in Afghanistan or linked to terrorism. If you bought the argument that the AUMF included permission to conduct surveillance within the United States outside the bounds of FISA, the terms of Bush’s content authorization lined up, more or less, with the language of the AUMF.

Metadata was another story, however.

It's different on the Internet

The point of looking at so much metadata is, as intelligence officials like to say, to gather a haystack so you can search for needles. Analyzing the transactional information about a huge pool of phone and Internet communications was supposed to help the NSA figure out which particular calls and e-mails they needed to collect, which meant that this metadata collection couldn’t be limited to members of Al Qaeda and their allies.

Instead, the president’s authorization allowed metadata collection on any communication with at least one endpoint outside the United States, or for communications where no party was “known” to be a US citizen. Clearly, though, it was harder to rely on the AUMF as the authority for that collection. And the NSA may have had to analyze both domestic and foreign Internet traffic in many cases just to sort out which was which.

For the phone records, this wasn’t necessarily a big problem. Obtaining the phone company’s business records—the “Call Detail Records” that carriers maintain anyway for their own business purposes—would not count as “electronic surveillance” as defined by FISA. Moreover, current (and widely criticized) Supreme Court doctrine holds that such business records are not protected by the Fourth Amendment anyway. While other laws prohibit the disclosure of phone records to the government, they can be obtained without judicial approval via a National Security Letter or subpoena.

Internet metadata, however, would have been trickier. To see why, it’s important to understand how the Internet works differently from the phone network. When the phone company connects a call on a traditional circuit-switched phone network, it naturally has to know which two numbers it is connecting and for how long. That's pretty much the sum of the relevant metadata.

But that’s not how a packet-switched network like the Internet functions. Packets of Internet information don’t just consist of “metadata” and “content” but of many levels of metadata at different “layers” of the OSI stack familiar to techies. The many computers or programs involved in routing and processing that data typically only need to “look” at one or two of those layers to do their job. Especially if it’s just routing traffic from one foreign computer to another—traffic that just happens to be passing through the United States because that’s the cheapest path—the company running an Internet backbone doesn’t need to “see” or make any record of, for example, who is supposed to receive a particular e-mail or what webpage a user is trying to browse.

This is the essence of the “end to end” architecture of the Internet. The “pipes” carrying data can be relatively dumb, just moving data to the right destination server and letting the server take things from there. And that IP-level metadata wouldn’t even necessarily tell you whether the underlying communication was domestic or international. A packet of data traveling between Google’s servers and Yahoo’s, for instance, might actually be carrying a message from a Google user in Pakistan to a Yahoo user in Yemen.

What all of that means is that a company such as AT&T wouldn’t necessarily have any “business records” that contain the kind of metadata the NSA was interested in. Instead, the NSA would have to sift through the entire traffic stream itself and pluck out the metadata (and content) that needed further analysis. And that's exactly what the agency did. We know that thanks to an AT&T whistleblower, who described a series of secret rooms containing powerful “semantic analyzers” that filtered all the traffic flowing through a company’s fiber optic cables.

Such broad fiber surveillance would, however, pretty clearly be “electronic surveillance” as defined by FISA, meaning it would require either a warrant (for content) or a pen register order (for metadata) from the secret FISA court. And since the NSA wanted everyone’s metadata, not just that of suspected Al Qaeda operatives, it would have a harder time applying the “AUMF exception” theory in order to get that permission.

What to do, then?

Words and meanings

At first, according to the leaked NSA report, it seems government lawyers tried to evade this rather obvious problem through a variety of word games.

Specifically, NSA leadership interpreted the terms of the Authorization to allow the NSA to obtain bulk Internet metadata for analysis because the NSA did not actually “acquire” communications until specific communications were selected. In other words, because the Authorization permitted the NSA to conduct metadata analysis on selectors that met certain criteria, it implicitly authorized the NSA to obtain the bulk data that was needed to conduct the metadata analysis.

There were a couple of problems with this. First, while the NSA’s own internal definitions may not count a communication as “acquired” until it has been processed into a human-readable form, that’s not a definition that applies anywhere else in the law. Rather, if you bug someone’s room or tap her phone, you’ve “intercepted” her communication (and committed a felony) as soon as it is rerouted into your recording device, regardless of whether you ultimately listen to the recorded conversation. As one federal court has put it, “When the contents of a wire communication are captured or redirected in any way, an interception occurs at that time.”

Second, NSA lawyers hadn’t actually been kept in the loop on the legal justifications for the STELLAR WIND program, which means they may not have understood that the administration was now relying on the AUMF as the authority for circumventing the FISA process.

This, then, was almost certainly the problem that provoked the hospital showdown. The interception of phone and e-mail content was clearly electronic surveillance, but it was (in theory) limited to targets within the scope of the AUMF (which allowed the president to “determine” who had “aided” the 9/11 perpetrators). The bulk collection of phone records was not limited, but it also wasn’t “electronic surveillance” as defined by FISA. The bulk collection of Internet metadata, however, was both plainly “electronic surveillance” and also too broad to shoehorn into the language of the AUMF.

Comey, it would seem, wasn’t willing to countenance the legal gymnastics required to pretend otherwise.

This time, it's legal

Of course, we now know that after the hospital showdown, the administration simply went to the FISA court and obtained a blanket “pen register” order allowing the metadata collection to continue, this time with legal cover (though the Court apparently imposed stricter limits than the NSA’s own lawyers did).

This particular type of bulk Internet metadata collection was reportedly halted in 2011. What the NSA is doing now instead is anybody’s guess.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Jul 31, 2013 12:28 pm

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
• NSA's XKeyscore program – read one of the presentations

Glenn Greenwald
theguardian.com, Wednesday 31 July 2013 08.56 EDT

Image
One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10.

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.

Image

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled "plug-ins" in a December 2012 document describes the various fields of information that can be searched. It includes "every email address seen in a session by both username and domain", "every phone number seen in a session (eg address book entries or signature block)" and user activity – "the webmail and chat activity to include username, buddylist, machine specific cookies etc".

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual's email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".

To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.

Image
Image


The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, "communications that transit the United States and communications that terminate in the United States".

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

Image

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

Image

An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

Image

Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

Image

As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls "nearly everything a typical user does on the internet".

Image

The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

Image

The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store "interesting" content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.
Image


In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.



Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA's foreign targets.

The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.

"The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.



In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. "It's very rare to be questioned on our searches," Snowden told the Guardian in June, "and even when we are, it's usually along the lines of: 'let's bulk up the justification'."

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called "a number of compliance problems", Clapper attributed them to "human error" or "highly sophisticated technology issues" rather than "bad faith".

However, Wyden said on the Senate floor on Tuesday: "These violations are more serious than those stated by the intelligence community, and are troubling."

In a statement to the Guardian, the NSA said: "NSA's activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

"XKeyscore is used as a part of NSA's lawful foreign signals intelligence collection system.

"Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring."

"Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

"These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Jul 31, 2013 12:37 pm

U.S. Outlines N.S.A.’s Culling of Data for All Domestic Calls
By CHARLIE SAVAGE
Published: July 31, 2013 61 Comments

WASHINGTON — The Obama administration on Wednesday released formerly classified documents outlining a once-secret program of the National Security Agency that is collecting records of all domestic phone calls in the United States, as top officials testified before the Senate Judiciary Committee.
Enlarge This Image

Christopher Gregory/The New York Times
The chairman of the Senate Judiciary Committee, Senator Patrick J. Leahy, Democrat of Vermont, expressed deep skepticism about the domestic phone records program.

Christopher Gregory/The New York Times
Robert Litt, left, the top lawyer in the Office of the Director of National Intelligence, testified that the Obama administration was also “open to re-evaluating this program."

As the hearing began, The Guardian newspaper published another document from the archives of Top Secret surveillance matters leaked to it by the former N.S.A. contractor Edward J. Snowden. It was a 32-page presentation describing the N.S.A.'s XKeyscore program, by which N.S.A. analysts can mine vast databases of phone and Internet information the agency has vacuumed up.

The documents released by the government, meanwhile, include an April ruling by the Foreign Intelligence Surveillance Court that supported a secondary order — also leaked by Mr. Snowden — requiring a Verizon subsidiary to turn over all of its customers’ phone logs for a three-month period.

It said the government may access the logs only when an executive branch official determines that there are “facts giving rise to a reasonable, articulable suspicion” that the number searched is associated with terrorism.

The releases also included two formerly classified briefing papers to Congress from 2009 and 2011, when the provision of the Patriot Act that the court relied on to issue that order was up for reauthorization. The papers outlined the bulk collection of “metadata” logging all domestic phone calls and e-mails of Americans and are portrayed as an “early warning system” that allowed the government to quickly see who was linked to a terrorism suspect.

“Both of these programs operate on a very large scale,” the 2011 briefing paper said, followed by something that is redacted, and then: “However, as described below, only a tiny fraction of such records are ever viewed by N.S.A. intelligence analysts.”

Both programs traced back to the surveillance efforts the Bush administration secretly started after the terrorist attacks of Sept. 11, 2001, and which initially operated outside statutory authority or court oversight. The Bush administration later obtained orders from the Foreign Intelligence Surveillance Court to continue them.

The Obama administration has said it shut down the program that collected e-mail “metadata” in 2011, but it is not clear whether such collection has continued under a different program.

The newly disclosed XKeyscore presentation focuses in particular on Internet activities, including chats and Web site browsing activities, as intelligence analysts search for terrorist cells by looking at “anomalous events” like who is using encryption or “searching the web for suspicious stuff.”

In contrast to the domestic-call tracking program, the example cited in the XKeyscore presentation — which said it had generated intelligence that resulted in the capture of more than 300 terrorists — appeared to be focused on overseas activity.

Several of the pages on the presentation were redacted by The Guardian.

But the presentation shows that while much of the focus from Mr. Snowden’s revelations so far has been on communications — whether calls or e-mails — that are linked, directly or indirectly, to a known suspect, the N.S.A. is also collecting and searching through massive amounts of Web-browsing activity.

“A large amount of time spent on the Web is performing actions that are anonymous,” the presentation explains, saying the XKeyscore system can extract and store retrospective activity from “raw unselected bulk traffic” that is collected and stored for 30 days.

As one example, it cited trying to locate for a target who speaks German but is known to be in Pakistan by looking for German-language Internet activity in that country. As another, a slide said: “My target uses Google Maps to scope target locations — can I use this information to determine his e-mail address? What about the Web-searches — do any stand out and look suspicious?”

At the start of Wednesday’s hearing, the chairman of the Senate Judiciary Committee, Senator Patrick J. Leahy, Democrat of Vermont, expressed deep skepticism about the domestic phone records program. He criticized intelligence officials and defenders of the program for misleadingly saying it helped prevent 54 terrorist events, a number that conflates the usefulness of N.S.A. surveillance activities targeted at noncitizens abroad with the usefulness of the database of Americans’ phone calls.

A classified list of “terrorist events” that N.S.A. surveillance helped to prevent, he said, “simply does not reflect dozens or even several terrorist plots” that the domestic call log program “helped thwart or prevent, let alone 54, as some have suggested.”

Citing the “massive privacy implications” of the program, Mr. Leahy said: “If this program is not effective it has to end. So far I’m not convinced by what I’ve seen.”

But Senator Dianne Feinstein, the chairwoman of the Senate Intelligence Committee who is also on the judiciary panel, said that while the program could be changed with greater restrictions and safeguards, it should be preserved because it would place the nation “in jeopardy” to eliminate it.

Robert Litt, the top lawyer in the Office of the Director of National Intelligence, testified that the Obama administration was also “open to re-evaluating this program” to create greater public confidence that it protects privacy while “preserving the essence of the program.”

Last week, the House of Representatives voted narrowly to defeat an amendment to shut down the N.S.A.'s domestic phone record tracking program. The 217-to-205 vote was far closer than expected and came as members of both parties defied their leadership to oppose continuing the domestic call logging program, suggesting that momentum against it was building.

Before Mr. Snowden’s leaks made clear what the government was doing with the Patriot Act program, several senators on the Intelligence Committee had made cryptic warnings that it was interpreting the law in a twisted way to do something alarming and made reference to the 2011 briefing paper. The New York Times filed a lawsuit under the Freedom of Information Act to obtain that document.

The lawsuit contended that the abstract legal analysis outlining what the government believed the Patriot Act meant could not be withheld from the public as properly classified and should be released, even if the passages detailing the program that relied upon that interpretation was redacted.

The Obama administration had argued that it could withhold that document entirely, and in May 2012 a Federal District Court judge, William H. Pauley III, agreed to dismiss the lawsuit after reading the briefing paper, finding that the details of the classified program were “inextricably intertwined” with the rest, so releasing it in redacted form was “neither feasible nor warranted.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Jul 31, 2013 1:30 pm

Snowden Disclosures: What's Behind Hidden CIA Base in Brazil?

NIKOLAS KOZLOFF FOR BUZZFLASH AT TRUTHOUT

As whistleblower Edward Snowden releases more and more sensitive National Security Agency (NSA) files, the public is gaining unique insights into Washington’s underhanded foreign policy in South America. It’s no secret that both the Bush and Obama administrations have viewed Venezuela as a threat, but Snowden’s disclosures suggest that Washington has a bead on Brazil, too. For some time I’ve been writing about such rivalry, and recent explosive reports merely confirm what many US diplomats already concede privately: that is to say, Brazil is a force to be reckoned with and the country may even undermine or upset traditional regional US dominance in the not too distant future.

Snowden’s revelations, which have given rise to a firestorm of international controversy, underscore the growing importance of the NSA, which worked in tandem with the CIA to set up a spying operation in Brasilia. The joint espionage program, code-named “F6” but more commonly known as the “Special Collection Service,” sought to scoop up and obtain valuable satellite data. According to a recent article in The Week, “the men and women of the Special Collection Service are responsible for placing super-high-tech bugs in unbelievably hard-to-reach places.” According to the publication, Special Collection Service teams comprised of two to five people rotate into American embassies around the world, working undercover as diplomats. When the State Department is unable to offer official cover, agents may pose as businesspeople.

Glenn Greenwald, who broke the NSA story for O Globo newspaper, says the US used Brazil as a “bridge” to collect data on more protected countries whose traffic nonetheless passed through the large South American nation. At present, Brazil has no satellites of its own though the country leases eight satellites operated by foreign companies. There’s some indication that Washington views Brazil as more than just a bridge to spy on other countries, however. According to Snowden’s leaked documents, the NSA has targeted Brazil with as much vigor as other large nations like China, Pakistan and Russia. Speaking candidly, the Brazilian Minister of Communications has stated that he “has no doubt” that his country’s citizens and institutions were spied upon, and politicians from across the political spectrum have voiced outrage over US spying.

A History of Surveillance

Today, Brazil is a somewhat reliable US partner though political frictions are beginning to emerge between the two powers. Go back some twenty years, however, and relations were somewhat more harmonious. In 1994, Washington welcomed the victory of Fernando Henrique Cardoso who beat challenger Luiz Inácio “Lula” da Silva in the Brazilian presidential election. During the go-go 1990s, Cardoso was well regarded in Washington circles for espousing conservative economic policies. Lula, by contrast, was a member of the Workers’ Party and therefore more suspect in the eyes of the Clinton administration.

Whatever the case, it seems the US wasn’t taking any chances with Cardoso. According to Folha de São Paulo, Brazil’s ambassador to the U.S. suspected that his embassy had been spied upon prior to a Cardoso trip to Washington in 2001. At the time, the ambassador noted that embassy phone lines had behaved rather erratically. Cardoso himself must have been aware of such reports, though the former president recently claimed that he did not know about the Special Collections Service during his tenure. Cardoso may not have had direct knowledge of the joint NSA-CIA base in Brasilia, but he was most certainly aware of US capabilities more broadly. Indeed, according to a separate Folha de São Paulo article, Cardoso’s Minister of G.S.I. (Institutional Security Office) testified to Congress as early as 2001 that the N.S.A. had developed a program called Echelon which was designed to intercept e-mail and other communications.

Perhaps, the government was being surveilled from within as well. According to Correio do Brasil, the Cardoso administration contracted security firm Booz Allen no less to help carry out privatization plans and restructuring of the Brazilian financial system. Whistle-blower Snowden worked at the company, which has links to the N.S.A. and helps to prosecute the drug war in Latin America. Booz Allen in turn is owned by the infamous Carlyle Group, a corporation known for ties to insider politicians. Carlyle once employed none other than George Herbert Walker Bush as an adviser. His son George W., meanwhile, served on the board of directors of Carterair, an airline food company which was later acquired by Carlyle.

From Cardoso to Lula

In 1998, Lula ran for president against Cardoso for the second time but was once again roundly defeated. Four years later, however, the political situation had begun to change. For one thing, Cardoso could no longer run for reelection, and meanwhile South America’s “Pink Tide” to the left had taken Venezuela out of Washington’s traditional political orbit. Out on the campaign trail, Lula accused Cardoso of being too friendly and “submissive” to the U.S. What is more, Lula accused Washington of wanting to “annex” Brazil through the Free Trade Area of the Americas or F.T.A.A. This time, Lula finally got his wish and was elected president.

Once in office, however, Lula started to push familiar economic policies from the Cardoso era. Moreover, according to WikiLeaks cables the wily Lula sought to placate the Bush administration while occasionally appearing to side against fellow leftists across the wider region. There’s even some suggestion in the cables that members of Lula’s cabinet received U.S. intelligence dealing with Hugo Chávez of Venezuela. At the U.S. embassy in Brasilia, meanwhile, American diplomats exploited internal divisions within the Lula government to gain political advantage.

Despite such crass and cynical opportunism, the Lula administration pursued a much more independent foreign policy than Cardoso. How did the new political shakeup affect U.S. espionage? Greenwald’s reporting leads to some intriguing yet still unanswered questions. According to O Globo, the joint N.S.A-C.I.A. spying hub functioned “at least until 2002,” the same year Lula took over from Cardoso. Somewhat vaguely, O Globo adds that “there’s no proof” that the espionage station still exists in Brasilia.

Brazil is Powerless

In light of Snowden’s recent bombshell disclosures, many Brazilians may wonder whether the U.S. is concerned about the South American nation’s rise on the world stage. On the surface at least, Washington has somewhat strained if cordial diplomatic relations with Brasilia, and the two nations even conduct military exchanges. On the other hand, the Pentagon has embarked on an effort to establish military bases throughout the Southern Cone and in countries bordering Brazil. In Chile, for example, the U.S. Southern Command operates a military facility in the port city of Concón in the central province of Valparaíso. In Argentina meanwhile, the Pentagon tried to establish another military base in the Chaco region but was rebuffed by the Kirchner administration.

It’s anyone’s guess what the Brazilian military makes of such aggressive Pentagon maneuvering, but at long last the government seems to have woken up to the threat of electronic eavesdropping. According to a recent Inter Press Service report, Brazil is now “attempting to untangle a web of hi-tech espionage with low-tech equipment reminiscent of a novel by British author John le Carré.” One Brazilian foreign affairs expert told the news outlet that “in the past, spying had a specific target. It was very low-tech, and action was taken on the basis of suspicions. But now, le Carré’s novels look like they were written in the Middle Ages. We are looking at a qualitative and quantitative change in espionage.”

According to Folha, an intelligence officer told the Brazilian Congress in 2008 that G.S.I. knew about Echelon and had studied the N.S.A.’s program. Nevertheless, Brazil earmarked less than $44 million for cyber-security in 2013, a pittance which leaves the country vulnerable to attack. Though Brazil will shortly launch its own satellite, undersea fiber optic cables and internet data collection center, the Defense Minister has openly admitted that his country “is still in diapers” in terms of cyber-security.

Surveying frenetic N.S.A. spying and U.S. Pentagon activity on its borders, the Brazilian government must surely wonder about wider American objectives. The larger question, however, is whether Brasilia can do anything to counteract or mitigate Washington’s intelligence gathering. During the Cardoso years, and possibly leading into the Lula administration, the N.S.A. seems to have been able to carry out its objectives in Latin America with relative ease.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 8 guests