Tag: Fourth Amendment

MIcrosoft a More Than Willing NSA Partner

Cross posted from The Stars Hollow Gazette

Microsoft has previously admitted to cooperating with the NSA. New revelations reveal that it is far worse than was previously disclosed giving the NSA up-to-date access to its customer data whenever the company changes its encryption and related software technology. Microsoft helped the security agency find ways to circumvent its encryption on its Outlook.com portal’s encrypted Web chat function, and the agency was given what is described as “pre-encryption stage” access to e-mail on Outlook, including Hotmail e-mail.

How Microsoft handed the NSA access to encrypted messages

by Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe, The Guardian, Thursday 11 July 2013

• Secret files show scale of Silicon Valley co-operation on Prism

• Outlook.com encryption unlocked even before official launch

• Skype worked to enable Prism collection of video calls

• Company says it is legally compelled to comply

The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

The documents show that:

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

While Microsoft claimed it had no choice but to cooperate arguing that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”. Emptywheel proprietress, Marcy Wheeler is interested in some of the details about the cooperation:

For example, the story describes that this cooperation takes place through the Special Source Operations unit.

   The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.

But we saw that when NSA approached (presumably) Microsoft in 2002, it did not approach via SSO; it used a more formal approach through counsel.

In addition, note how Skype increased cooperation in the months before Microsoft purchased it for what was then considered a hugely inflated price, and what is now being called (in other legal jurisdictions) so dominant that it doesn’t have to cooperate with others.

   One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.

   Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.

   According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.

   The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”

While this isn’t as obvious as Verizon’s MCI purchase – which for the first time led that carrier to hand over Internet data – it does seem that those companies that cooperate with the NSA end up taking over their rivals.

The Guardian article includes a statement from Microsoft and a joint statement by Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA.

In his New York Times article, James Risen reports that some Silicon Valley companies fearing negative public response have begun to openly push back against the security agency:

Yahoo, for example, is now asking the Foreign Intelligence Surveillance Court, the secret court that rules on data collection requests by the government, to allow it to make public the record of its 2008 challenge to the constitutionality of the law requiring it to provide its customer data to the agency.

A Yahoo spokeswoman said Thursday that the company was “seeking permission from the FISA court to unseal the arguments and orders from the 2008 case.”

Risen also reported that Sen. Ron Wyden (D-OR) believes that the White House is considering scaling back data collection over concerns about privacy issues and public backlash against the security agency’s large-scale collection of the personal data:

“I have a feeling that the administration is getting concerned about the bulk phone records collection, and that they are thinking about whether to move administratively to stop it,” he said. He added he believed that the continuing controversy prompted by Mr. Snowden had changed the political calculus in Congress over the balance between security and civil liberties, which has been heavily weighted toward security since the Sept. 11 terrorist attacks.

“I think we are making a comeback,” Mr. Wyden said, referring to privacy and civil liberties advocates.

Global Spying By US Is An Outrage

Cross posted from The Stars Hollow Gazette

At his blog, Glenn Greenwald posted that he had written an article for O Globo, the large Brazilian newspaper based in Rio de Janeiro revealing that millions of Brazilians emails and calls, too, had been scooped up by the US spy program. This followed on the news in Der Spiegel that gave a detailed account of the mass collection of data from the electronic communications of Germans. The Brazilian government is now demanding an explanation from the US.

The foreign minister, Antonio Patriota, expressed “deep concern” about a report that appeared in O Globo newspaper at the weekend, which detailed how the US National Security Agency (NSA) had conducted extensive spying activities in Brazil.

Based on documents provided by Snowden, the O Globo story showed how the US had been carrying out covert surveillance on ostensibly friendly nations. Similar reports in Europe and Hong Kong have sparked indignation in recent weeks.

After the Brazilian president, Dilma Rousseff, called in cabinet ministers to discuss the issue, the government issued a statement of concern.

After the flight carrying Bolivian president Evo Morales was forced to land in Austria over the suspicion that NSA whistleblower Edward Snowden was on board, Bolivia and two other Latin American countries, Venezuela and Nicaragua have offered Snowden asylum. The offers spark some rather undiplomatic responses from elected officials on the Sunday talk shows. The most notable was from Sen. Robert Menedez (D-NJ) who, after calling for sanctions against the three countries, told Meet the Press‘s David Gregory:

“I’m not surprised by the countries that are offering him asylum,” Menendez said Sunday. “They like sticking it to the United States.”

The second half of Glenn Greenwald’s interview with Snowden that was taped in Hong Kong by Laura Poitras on 6 June 2013 was posted at The Guardian.

Edward Snowden: ‘The US government will say I aided our enemies’

Juan Cole had this to say about the NSA spying and the Obama administration

The general disappointment with the Obama administration on issues of surveillance, drone warfare, the surge in Afghanistan, extension of the Bush tax cuts for the super-rich, labor issues and the environment felt by anyone to the left of David Brooks appears to be a factor in Snowden’s whistleblowing. He must also have been frustrated to see Senators such as Ron Wyden (D-OR) muzzled and unable to tell the American people forthrightly what was troubling him about the secret interpretation of the USA Patriot Act (which is of course the most unpatriotic piece of legislation ever passed). Muzzling a sitting senator about an issue of clear public concern surely is unconstitutional. You can’t have a democracy that way. Snowden knew this and is trying to restore what we lost to the National Security Super-State.

The Fall Out from NSA Spying Here and Abroad

Cross posted from The Stars Hollow Gazette

As the United States scrambles to cover up the contradictory web if lies it has woven over the NSA spying, the Europeans have expressed their displeasure and threatened to scuttle talks on the trade agreement with the US. This left President Barack Obama, who has been touring Africa, trying to mend fences:

After the Guardian’s disclosure that US agencies were secretly bugging the French embassy in Washington and France’s office at the UN in New York, (French president, François) Hollande called for an immediate halt to the alleged spying.

“We cannot accept this kind of behaviour between partners and allies,” he said. “We ask that this stop immediately … There can be no negotiations or transactions in all areas until we have obtained these guarantees, for France but also for all of the European Union … We know well that there are systems that have to be checked, especially to fight terrorism, but I don’t think that it is in our embassies or in the European Union that this threat exists.”

(German chancellor, Angela) Merkel delivered her severest warning yet on the NSA debacle. “We are no longer in the cold war,” her spokesman, Steffen Seibert, said. “If it is confirmed that diplomatic representations of the European Union and individual European countries have been spied upon, we will clearly say that bugging friends is unacceptable.”

Seibert said Berlin was keen on the trade talks with Washington, but qualified that support: “Mutual trust is necessary in order to come to an agreement.” [..]

Martin Schulz, the president of the European parliament, likened the NSA to the Soviet-era KGB and indirectly suggested a delay in the talks. Greens in the European parliament, as well as in France and Germany, called for the conference to be postponed pending an investigation of the allegations. They also called for the freezing of other data-sharing deals between the EU and the US, on air transport passengers and banking transactions, for example, and called for the NSA whistleblower, Edward Snowden, to be granted political asylum in Europe. French Greens asked Hollande to grant Snowden asylum in France.

Back in the US, Director of National Intelligence James Clapper is still in hot water despite for his halfhearted letter of apology to Congress for “erroneous” responses to questions he was given days before.

But Clapper did not say in the letter why he had taken him until June to correct the mistake. Senator Wyden’s spokesman made it clear on Monday that the senator had made attempts to get Clapper to correct the record before the revelations in the Guardian, but was rebuffed. “Senator Wyden had a staff member contact the Office of the Director of National Intelligence on a secure phone line soon after the March hearing to address the inaccurate statement regarding bulk collection on Americans.

“The ODNI acknowledged that the statement was inaccurate but refused to correct the public record when given the opportunity. Senator Wyden’s staff informed the ODNI that this was a serious concern.

“Senator Wyden continued to raise concerns about the government’s reliance on secret law in the weeks following the hearing, prior to the Guardian publishing its first story several weeks later.”

A bipartisan group of senators expressed their displeasure  and accused Clapper of intentionally misleading congress to prevent a public discussion of secret interpretations of the Patriot Act thus undermining public trust in government.

A week ago, Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) wrote Gen. Keith Alexander, head of the NSA, that documents on its web site intended to clarify the two surveillance programs, Section 215 of the Patriot Act and Section 702 of FISA, were ” misleading and inaccurate.” The “fact sheet” were scrubbed from the web site shortly after the senators complaint.

Following a complaint from two senators, the National Security Agency has removed from its website two fact sheets designed to shed light on and defend a pair of surveillance programs. Users now trying to access the documents detailing surveillance under legal authorities known as Section 215 and Section 702 receive an error message when they try to load the fact sheets. [..]

The documents, still available here, were published in the wake of revelations about the extent of the NSA’s surveillance programs. They sought to highlight the safeguards the NSA uses to make sure American communications aren’t caught up in its surveillance – or if they are, what the NSA does to remove identifying information about U.S. citizens. Wyden and Udall, both of whom sit on the Senate Intelligence Committee, have long called for more transparency on how the NSA protects Americans’ privacy — but said the NSA’s fact sheets gave the wrong impression.

Meanwhile in Russia Edward Snowden remains at the Moscow airport without a valid passport. With his asylum options shrinking, he has withdarwn his request for  asylum with Russia after President Vladimir Putin required he stop leaking information about the US spy programs.

Icelandic investigative journalist and spokesperson for WikiLeaks, Kristinn Hrafnsson appeared with Amy Goodman and Aaron Mate on today’s Democracy Now blasting the United States for leaving Snowden “stateless.”



Transcript can be read here

Even a Former Stasi Agent Says It’s a Bad Idea

Cross posted from The Stars Hollow Gazette

Obama Spy Net photo ObamaSpyNet_zpsa63a3f0b.jpg You know you’ve screwed up when an agent from one of the most secretive and notorious spy agencies tells you so. A former lieutenant colonel in the now defunct East German secret police, the Stasi, Wolfgang Schmidt was “appalled” saying that ” gathering such a broad, seemingly untargeted, amount of information is obvious”

“It is the height of naivete to think that once collected this information won’t be used,” he said. “This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”

Now the Ecuadoran government has broken its trade pact with the United States to prevent it from being used as “blackmail” over the request for asylum from Edward Snowden.

The waiving of preferential trade rights followed threats from members of the US congress to drop the ATPA in July, when it is due for renewal, unless Ecuador toed the line on Snowden.

“Ecuador does not accept pressure or threats from anyone, nor does it trade with principles or submit them to mercantile interests, however important those may be,” said Fernando Alvarado, the communications secretary.

“Ecuador gives up, unilaterally and irrevocably, the said customs benefits.”

Meanwhile the US Army has blocked access to parts of The Guardian website to preserve ‘network hygiene’

A spokesman said the military was filtering out reports and content relating to government surveillance programs to preserve “network hygiene” and prevent any classified material appearing on unclassified parts of its computer systems.[..]

The Pentagon insisted the Department of Defense was not seeking to block the whole website, merely taking steps to restrict access to certain content.

But a spokesman for the Army’s Network Enterprise Technology Command (Netcom) in Arizona confirmed that this was a widespread policy, likely to be affecting hundreds of defence facilities.

Besides being an illogical in its defense of leaked information that is now public knowledge, the dogs forbid, these young GI’s should know what it is they’re defending.

At least the Senate isn’t slacking on asking for an explanation. In bipartisan letter, 26 Senators are seeking answers from intelligence chief James Clapper over scale of and justification for NSA surveillance

The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.

In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian. [..]

They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.

The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata. [..]

In addition to raising concerns about the law’s scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.

At the National Rifle Association heads will be exploding. As Marcy Wheeler noted at emptywheel, one of the questions the Senators asked is a “loaded gun”:

It can be used to collect information on credit card purchases, pharmacy records, library records, firearm sales records, financial information, and a range of other sensitive subjects. And the bulk collection authority could potentially be used to supersede bans on maintaining gun owner databases, or laws protecting the privacy of medical records, financial records, and records of book and movie purchases. [Marcy’s emphasis]

At Hullabaloo, David Atkins points out a few problems with the arguments defending the government. He makes two very valid points that should be embarrassing for certain defenders of President Obama and the NSA spying:

In all the manufactured outrage against Snowden for leaking and Greenwald for doing his job as a journalist, there have been two main strains of thought. The first is that whatever the government does in the name of “national security” should be accepted without question, that if one is sworn to secrecy one should never reveal secrets under any circumstance, and that journalistic freedom of speech itself should be called into question if it interferes in any way with whatever government officials say they’re doing in the name of “national security.”

That is a fascist argument that has no place in civil American society, and that should embarrass anyone who uses it.

The second argument is about equal application of rule of law, and it carries a little more moral weight. That argument centers around balance of powers and the notion that it should not be up to random individuals to determine what secrets should remain secrets based on their own moral compass. It’s based around notions of universal rule of law, and is not a fascist one but an institutionalist one. It’s the argument that animates much of the anti-Snowden left.

But for anyone to argue that point with credibility, one must also oppose the rampant leaks coming from inside the government apparatus as well.[..]

If someone denounces Snowden and Greenwald but claims to be to the left of Peter King, they must also denounce the government’s selective leaks and demand prosecution of those involved, or lose all credibility and claims to intellectual consistency. To selectively defend or extol lawbreaking behavior depending on who is in office and what issue is being defended, is the worst sort of political hackery and hypocrisy.

All In host Chris Hayes points to the unequal and uneven response to leaked information that advances the Pentagon’s agenda and leaked information that doesn’t.

On that note this:

The Criminal NSA

by Jennifer Stisa Granick and Christopher Jon Sprigman, The New York Times

THE twin revelations that telecom carriers have been secretly giving the National Security Agency information about Americans’ phone calls, and that the N.S.A. has been capturing e-mail and other private communications from Internet companies as part of a secret program called Prism, have not enraged most Americans. Lulled, perhaps, by the Obama administration’s claims that these “modest encroachments on privacy” were approved by Congress and by federal judges, public opinion quickly migrated from shock to “meh.”

It didn’t help that Congressional watchdogs – with a few exceptions, like Senator Rand Paul, Republican of Kentucky – have accepted the White House’s claims of legality. The leaders of the Senate Intelligence Committee, Dianne Feinstein, Democrat of California, and Saxby Chambliss, Republican of Georgia, have called the surveillance legal. So have liberal-leaning commentators like Hendrik Hertzberg and David Ignatius.

This view is wrong – and not only, or even mainly, because of the privacy issues raised by the American Civil Liberties Union and other critics. The two programs violate both the letter and the spirit of federal law. No statute explicitly authorizes mass surveillance. Through a series of legal contortions, the Obama administration has argued that Congress, since 9/11, intended to implicitly authorize mass surveillance. But this strategy mostly consists of wordplay, fear-mongering and a highly selective reading of the law. Americans deserve better from the White House – and from President Obama, who has seemingly forgotten the constitutional law he once taught.

America’s Animal Farm: Snowden and the Squealer

by Jonathan Turley, law professor Georgetown University

For many, the recent disclosure of massive warrantless surveillance programs of all citizens by the Obama administration has brought back memories of George Orwell’s 1984. Such comparisons are understandable not only with the anniversary of the book occurring the very week of the disclosures but the Administration’s “doublethink” interpretations of common terms like “transparency” and “privacy.” According to President Obama, the secret surveillance program is not only entirely “transparent” but something of a triumph of privacy.

Yet, another Orwell book seems more apt as the White House and its allies try to contain the scandal: Animal Farm.

Orwell wrote the fanciful account of a farm society of animals at the end of World War II during a period of authoritarian power and government propaganda. The farm government proclaimed equality of all animals but, as the pig Squealer explained, “all animals are equal, but some animals are more equal than others.” As our leaders joined together on television to bloviate about the need to capture and try the “traitor” Snowden, they were affirming a system of laws that seems to apply to the governed exclusively.

Spying on Each Other

Cross posted from The Stars Hollow Gazette

The revelation of a federal program to “Keep America Safe” got little notice amidst the hullabaloo over the hunt for Edward Snowden. McClatchy News reported on The pervasive program created under the Obama administration to stop leaks and “security threats,” requiring “federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.”

President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage. [..]

As part of the initiative, Obama ordered greater protection for whistleblowers who use the proper internal channels to report official waste, fraud and abuse, but that’s hardly comforting to some national security experts and current and former U.S. officials. They worry that the Insider Threat Program won’t just discourage whistleblowing but will have other grave consequences for the public’s right to know and national security.

The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.

in an unusual Sunday article at Esquire’s Politics Blog, Charles Pierce’s reacted to this program with these remarks:

(T)he Obama administration is the most fertile environment for paranoids since the Nixon people first cut a check to Egil Krogh. [..]

You want “Nixonian”? This, right here, this is Nixonian, if Nixon had grown up in East Germany. You’ve got the entire federal bureaucracy looking for signs of “high-risk persons or behaviors” the way Nixon sent Fred Malek out to count the Jews. You’ve got created within the entire federal bureaucracy a culture of spies and informers, which will inevitably breed fear and deceit and countless acts of interoffice treachery. (Don’t like your boss at the Bureau Of Land Management? Hmm, he looks like a high-risk person. Tell someone.) And this is the clincher.

   Hammer this fact home . . . leaking is tantamount to aiding the enemies of the United States,” says a June 1, 2012, Defense Department strategy for the program that was obtained by McClatchy.

And, out in Yorba Linda, there is a dark stirring deep in the earth, and a faint chuckling is heard in the midnight breeze. [..]

No, Mr. Current President, this is not business as usual. This is not even the NSA sifting through e-mails and phone calls. This is giving Big Brother a desk in every federal agency and telling him to go to work.



Transcript can be read here

For nearly two years, the White House has waged a program called “Insider Threat” that forces government employees to remain on the constant lookout for their colleagues’ behavior and to report their suspicions. It targets government officials who leak any information, not just classified material. All of this leads McClatchy to warn: “The [Insider Threat] program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations.” We’re joined by the reporter who helped break the story, Jonathan Landay, senior national security and intelligence reporter for McClatchy Newspapers. Landay also discusses his reporting that revealed how drone strikes carried out in Pakistan over a four-year period ran contrary to standards set forth publicly by President Obama.

This is what a police state looks like.

Edward Snowden Has Left Hong Kong: Up Date

Cross posted from The Stars Hollow Gazette

Up Date: Fugitive Snowden seeks asylum in Ecuador: foreign minister

Ecuadorean Foreign Minister Ricardo Patino, visiting Vietnam, tweeted: “The Government of Ecuador has received an asylum request from Edward J. #Snowden.”

NSA whistleblower, Edward Snowden has left Hong Kong arriving in Moscow aboard a commercial flight, presumably on his way to a third country for asylum.

In a statement, WikiLeaks said the 30-year-old was heading to a democratic country “via a safe route” for asylum purposes and that the organisation was assisting at his request. Snowden had been in hiding in Hong Kong since identifying himself as the source of revelations on US surveillance programmes.

His flight from US authorities, which want to charge him with espionage, appeared set to continue with an onward flight west from Moscow to Havana on Monday. From there, various reports indicated that he would try to get to either Caracas or Quito.

The Hong Kong government said on Sunday he had left of his own accord “through a lawful and normal channel” and said the request filed by the US did not fully comply with legal requirements. Pointedly, it also said it wanted Washington to clarify Snowden’s claims that the US had hacked targets in the territory.

He was accompanied by one of Julian Assange’s closest advisers, Sarah Harrison.

On Friday, Snowden was charged with espionage under the 1917 law. He becomes the eighth whistleblower to be charged under the act by the Obama administration, which has used the charge more than any other president.

Snowden, 29, is charged with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence information to an unauthorised person, according to court documents.

The head of the NSA, Gen. Keith Alexander stated that Snowden has “caused irreversible damage to US.” This coming from the man who lied to congress and has admitted publicly that the surveillance had violated the Fourth Amendment.

Have I mentioned that David Gregory is a hack and an embarrassment for NBC?

Good luck to Mr. Snowden.

The Most Powerful Man You Never Heard Of

Cross posted from The Stars Hollow Gazette

Meet the most powerful man you’ve never heard of until recently, Gen. Keith B. Alexander,  Director of the National Security Agency (DIRNSA)and Chief of the Central Security Service (CHCSS) since August 1, 2005 and Commander of the United States Cyber Command since  May 21, 2010. He is a four star general in the United States Army and, according to Wikipedia, plans to retire in 2014, which may not be soon enough for some. Did I mention that he is also a proven liar? So, when he says, as he did, without any evidence, before the House Permanent Select Committee on Intelligence, that 50 terrorist attack were thwarted by the contested programs of the NSA take it with a large grain of salt.

Chris Hayes, host of MSNBC’s “All In,” looks at Gen. Alexander’s tenure over the NSA with James Bamford and explains why he may be the most powerful man in Washington that you have yet to hear of.

Transcript can be read here

“We jokingly referred to him as Emperor Alexander, because whatever Keith wants, Keith gets.”

The Secret War

by James Bradford, Wired

Infiltration, sabotage, mayhem, for years, four star general Keith Alexander has been building a secret army capable of launching devastating cyberattacks. Now it;s rady to unleash hell.

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings-the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

“Tell Me What You Do”

Cross posted from The Stars Hollow Gazette

To quote a phrase from a well known blogger at a formerly liberal, progressive web site:

Don’t tell me what you believe, show me what you do and I will tell you what you believe.

I give you President Barack Obama defending the Bush Administrations surveillance state.

Obama Defends Authorization of Surveillance Programs

by Peter Baker, The New York Times

“Some people say, ‘Well, you know, Obama was this raving liberal before. Now he’s, you know, Dick Cheney,’ ” Mr. Obama told Charlie Rose on his PBS interview show. “Dick Cheney sometimes says, ‘Yeah, you know, he took it all lock, stock and barrel.’ My concern has always been not that we shouldn’t do intelligence gathering to prevent terrorism, but rather, are we setting up a system of checks and balances?” [..]

Yet like Mr. Cheney, who appeared on “Fox News Sunday” over the weekend, Mr. Obama defended the effectiveness of surveillance programs in heading off threats to the United States. “The one thing people should understand about all these programs, though, is they have disrupted plots, not just here in the United States but overseas as well,” he said. He added that while other factors were at work, “we are increasing our chances of preventing a catastrophe like that through these programs.”

Partial transcript:

Barack Obama: Well, in the end, and what I’ve said, and I continue to believe, is that we don’t have to sacrifice our freedom in order to achieve security. That’s a false choice. That doesn’t mean that there are not tradeoffs involved in any given program, in any given action that we take. So all of us make a decision that we go through a whole bunch of security at airports, which when we were growing up that wasn’t the case…. And so that’s a tradeoff we make, the same way we make a tradeoff about drunk driving. We say, “Occasionally there are going to be checkpoints. They may be intrusive.” To say there’s a tradeoff doesn’t mean somehow that we’ve abandoned freedom. I don’t think anybody says we’re no longer free because we have checkpoints at airports.

Charlie Rose: But there is a balance here.

Barack Obama: But there is a balance, so I’m going to get to your – get to your question. The way I view it, my job is both to protect the American people and to protect the American way of life, which includes our privacy. And so every program that we engage in, what I’ve said is “Let’s examine and make sure that we’re making the right tradeoffs.” Now, with respect to the NSA, a government agency that has been in the intelligence gathering business for a very long time –

Charlie Rose: Bigger and better than everybody else.

Barack Obama: Bigger and better than everybody else, and we should take pride in that because they’re extraordinary professionals; they are dedicated to keeping the American people safe. What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls, and the NSA cannot target your emails … and have not. They cannot and have not, by law and by rule, and unless they – and usually it wouldn’t be “they,” it’d be the FBI – go to a court, and obtain a warrant, and seek probable cause, the same way it’s always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause….

So point number one, if you’re a U.S. person, then NSA is not listening to your phone calls and it’s not targeting your emails unless it’s getting an individualized court order. That’s the existing rule. There are two programs that were revealed by Mr. Snowden, allegedly, since there’s a criminal investigation taking place, and they caused all the ruckus. Program number one, called the 2015 Program, what that does is it gets data from the service providers like a Verizon in bulk, and basically you have call pairs. You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there. Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there’s a reasonable, articulable suspicion that this might involve foreign terrorist activity related to Al-Qaeda and some other international terrorist actors. Then, what the NSA can do is it can query that database to see did any of the – did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there’s no content that –

Charlie Rose: So I hear you saying, I have no problem with what NSA has been doing.

Barack Obama: Well, let me – let me finish, because I don’t. So, what happens is that the FBI – if, in fact, it now wants to get content; if, in fact, it wants to start tapping that phone – it’s got to go to the FISA court with probable cause and ask for a warrant.

Charlie Rose: But has FISA court turned down any request?

Barack Obama: The – because – the – first of all, Charlie, the number of requests are surprisingly small… number one. Number two, folks don’t go with a query unless they’ve got a pretty good suspicion.

Charlie Rose: Should this be transparent in some way?

Barack Obama: It is transparent. That’s why we set up the FISA court…. The whole point of my concern, before I was president – because some people say, “Well, you know, Obama was this raving liberal before. Now he’s, you know, Dick Cheney.” Dick Cheney sometimes says, “Yeah, you know? He took it all lock, stock, and barrel.” My concern has always been not that we shouldn’t do intelligence gathering to prevent terrorism, but rather are we setting up a system of checks and balances? So, on this telephone program, you’ve got a federal court with independent federal judges overseeing the entire program. And you’ve got Congress overseeing the program, not just the intelligence committee and not just the judiciary committee – but all of Congress had available to it before the last reauthorization exactly how this program works.

Now, one last point I want to make, because what you’ll hear is people say, “Okay, we have no evidence that it has been abused so far.” And they say, “Let’s even grant that Obama’s not abusing it, that all these processes – DOJ is examining it. It’s being renewed periodically, et cetera – the very fact that there is all this data in bulk, it has the enormous potential for abuse,” because they’ll say, you know, “You can – when you start looking at metadata, even if you don’t know the names, you can match it up, if there’s a call to an oncologist, and there’s a call to a lawyer, and – you can pair that up and figure out maybe this person’s dying, and they’re writing their will, and you can yield all this information.” All of that is true. Except for the fact that for the government, under the program right now, to do that, it would be illegal. We would not be allowed to do that.

Charlie Rose: So, what are you going to change? Are you going to issue any kind of instructions to the Director of National Intelligence, Mr. Clapper, and say, “I want you to change it at least in this way”?

Barack Obama: Here’s what we need to do. But before I say that – and I know that we’re running out of time, but I want to make sure I get very clear on this. Because there has been a lot of mis-information out there. There is a second program called the 702 program. And what that does is that does not apply to any U.S. person. Has to be a foreign entity. It can only be narrowly related to counter-terrorism, weapons proliferation, cyber hacking or attacks, and a select number of identifiers – phone numbers, emails, et cetera. Those – and the process has all been approved by the courts – you can send to providers – the Yahoos or the Googles, what have you. And in the same way that you present essentially a warrant. And what will happen then is that you there can obtain content. But again, that does not apply to U.S. persons. And it’s only in these very narrow bands. So, you asked, what should we do? …What I’ve said is – is that what is a legitimate concern – a legitimate critique – is that because these are classified programs – even though we have all these systems of checks and balances, Congress is overseeing it, federal courts are overseeing it – despite all that, the public may not fully know. And that can make the public kind of nervous, right? Because they say, “Well, Obama says it’s okay – or Congress says it’s okay. I don’t know who this judge is. I’m nervous about it.” What I’ve asked the intelligence community to do is see how much of this we can declassify without further compromising the program, number one. And they are in that process of doing so now so that everything that I’m describing to you today, people, the public, newspapers, etc., can look at because frankly, if people are making judgments just based on these slides that have been leaked, they’re not getting the complete story.

Number two. I’ve stood up a privacy and civil liberties oversight board, made up of independent citizens including some fierce civil libertarians. I’ll be meeting with them. And what I want to do is to set up and structure a national conversation, not only about these two programs, but also the general problem of data, big data sets, because this is not going to be restricted to government entities.

Charlie Rose: Let me just ask you this. If someone leaks all this information about NSA surveillance, as Mr. Snowden did…. Did it cause national security damage to the United States, and therefore, should he be prosecuted?

Barack Obama: I’m not going to comment on prosecution…. The case has been referred to the DOJ for criminal investigation… and possible extradition. I will leave it up to them to answer those questions.

Keep in mind that this president employs and supports two known liars, Director of National Intelligence James Clapper and National Security Agency Director Gen. Keith B. Alexander, both of whom have continuously lied to Congress about the surveillance programs. This president has approved unchecked wiretapping something he said he would end when campaigning for office.

Mr. Obama has said he does not believe he has violated the privacy of any American but this is what he does.

So what does he believe? Certainly not the Constitution and our right to protection from illegal searches.

American As Apple Spy

Cross posted from The Stars Hollow Gazette

Rep. Alan Grayson on the NSA: American As Apple Spy

I haven’t said this in awhile, what digby said:

It’s astonishing that this is necessary, but apparently it is:

Mind Your Own Business Act photo grayson_zps5587b06f.png

Click on image to enlarge.

Quite simple and to the point. Now you can support The Mind Your Own Business act by signing the petition, here.

The 4th Amendment Need Not Apply

Cross posted from The Stars Hollow Gazette

At Crooks and Liars, Suzie Madrak points out an important fact about private government contractors, the Fourth Amendment does not apply to them:

This has been an ongoing scandal in the Iraq and Afghanistan wars. Attorney Susan L. Burke represented several groups of plaintiffs (including Abu Ghraib detainees and female soldiers who had been sexually assaulted) in lawsuits in which she tried to overturn the civil immunity of government contractors. She has not been successful, and the federal government continues to subcontract with private companies to do things that would be illegal if they did them themselves. So keep that in mind as you read these NSA stories.

She highlights an interview with 70’s whistleblower, Chris Pyle at Democracy Now, who disclosed the military’s spying on civilian politics and worked for three congressional committees to end it.

Pyle discovered the Army and CIA were spying on millions of Americans engaged in lawful political activity while he was in the Army working as an instructor. His revelations prompted Senate hearings, including Senator Frank Church’s Select Committee on Intelligence, ultimately leading to a series of laws aimed at curbing government abuses. Now teaching constitutional law and civil liberties at Mount Holyoke College, Pyle says the NSA is known for attacking its critics instead of addressing the problems they expose.



Full transcript can be read here

CHRISTOPHER PYLE: Yes. The forerunner of the PRISM system that Snowden disclosed was called Trailblazer. It wasted $1 billion on private contracts. It replaced a much less expensive system called ThinThread, which had more privacy protections and had been developed inside the government. Now, the reason that private contractors get this business is because members of Congress intercede with them with government agencies. And we now have a situation where members of the Intelligence Committee and other committees of Congress intercede with the bureaucracy to get sweetheart contracts for companies that waste taxpayers’ money and also violate the Constitution and the privacy of citizens. This is a very serious situation, because it means that it’s much more difficult to get effective oversight from Congress. [..]

CHRISTOPHER PYLE: Well, we all want to protect the security of the country. We all want to protect the Constitution. But when government agencies are totally unaccountable, we can’t do that. Members of Congress do not go to those briefings, even if they’re offered, because once you go to the briefing, then you can’t talk about what you’ve been told, because it’s classified. So the briefing system is designed to silence Congress, not to promote effective oversight.

Members of Congress don’t want to spend time on oversight. They’re too busy raising money. New members of the House of Representatives this winter were told by the Democratic Campaign Committee that they should spend between four and six hours a day dialing for dollars. They have no time to do the public’s business. They’re too busy begging for money. President Obama himself attended 220 fundraisers last year. Where does he get the time to be president when he’s spending so much time asking wealthy people for money to support his campaign? [..]

CHRISTOPHER PYLE: Well, it’s true. The NSA doesn’t want to hire people like you and me. We don’t know enough about the Internet. That said, it’s important to note that the vice chairman of Booz Allen happens to be Mike McConnell, who was former director of NSA and of national intelligence. There is a revolving door between high government positions and private corporations, and this revolving door allows these people to make a great deal more money upon leaving the government, and then being rented back to the government in a contractor capacity. And that’s part of the corruption of the system. [..]

CHRISTOPHER PYLE: Well, yes. The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations. That’s a serious problem. The reason we have privatization of prisons, in some ways, is for governments to escape liability. They put the liability on the private corporations that run the prisons, and they just charge their liabilities as an operating cost.

(All emphasis by Suzie.)

The Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesn’t bind corporations.

Got that? This is the key to the rational behind privatizing everything from schools and prisons to national security. Keep it in mind as you read anything about the NSA whistleblowing and Edward Snowden.

DSWright at FDL News Desk hits the nail on the head, Freedom isn’t free:

The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed.

   Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

   These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security. The National Security Agency along with the CIA, FBI and other intelligence agencies of the U.S. government has been swapping information with private companies. In exchange for private companies giving the intelligence agencies information on their users, the private companies receive access to classified intelligence. The Corporate State indeed. [..]

No wonder the tech firms did not complain about spying on American citizens, they were getting compensation in the form of access to classified intel. So now Wall Street gets to see classified intelligence? No wonder there were no prosecutions, they’re on the team. Too Big To Fail, Too Big To Jail, and too important to National Security.

Quid pro quo, as well, as liability protection, all on the tax payer’s dime.

Metadata: More Intrusive Than You Think

Cross posted from The Stars Hollow Gazette

Metadata:

Simply put, metadata is data about data. It is descriptive information about a particular data set, object, or resource, including how it is formatted, and when and by whom it was collected. Although metadata most commonly refers to web resources, it can be about either physical or electronic resources.

Sounds harmless, so how bad could it be? According to mathematician and former Sun Microsystems engineer Susan Landau who was interviewed by Jane Mayer of The New Yorker, it’s worse than many might think:

“The public doesn’t understand,” she told me, speaking about so-called metadata. “It’s much more intrusive than content.” She explained that the government can learn immense amounts of proprietary information by studying “who you call, and who they call. If you can track that, you know exactly what is happening-you don’t need the content.”

For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: “You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.” And information from cell-phone towers can reveal the caller’s location. Metadata, she pointed out, can be so revelatory about whom reporters talk to in order to get sensitive stories that it can make more traditional tools in leak investigations, like search warrants and subpoenas, look quaint. “You can see the sources,” she said. When the F.B.I. obtains such records from news agencies, the Attorney General is required to sign off on each invasion of privacy. When the N.S.A. sweeps up millions of records a minute, it’s unclear if any such brakes are applied.

Metadata, Landau noted, can also reveal sensitive political information, showing, for instance, if opposition leaders are meeting, who is involved, where they gather, and for how long. Such data can reveal, too, who is romantically involved with whom, by tracking the locations of cell phones at night.

Ms. Landua joined Amy Goodman and Nermeen Shaikh on Democracy Now to explain just how intrusive the government’s collection of metadata is.



Transcript can be read here.

CISPA IS Dead, For Now

Cross posted from The Stars Hollow Gazette

CISPA Kitty photo blog_cispacat_zps96b502e5.jpgThe Senate will not vote on the Cyber Intelligence Sharing and Protection Act, CISPA, that was passed by the House last week.

Sen. Jay Rockefeller (D-W.V.), who is chairman of the Senate Commerce Committee, “believes that information sharing is a key component of cybersecurity legislation, but the Senate will not take up CISPA,” a committee staffer told HuffPost.

A staffer for the Senate Intelligence Committee said the committee also is working on an information-sharing bill and will not take up CISPA.

“We are currently drafting a bipartisan information sharing bill and will proceed as soon as we come to an agreement,” Sen. Dianne Feinstein (D-Calif.), chairwoman of the Senate Intelligence Committee, said in a statement Thursday.

CISPA Is ‘Dead for Now,’ Thanks to a Left-Right Coalition for Online Privacy

by John Nichols, The Nation

What brings the most seriously libertarian Republican in the US House, Michigan’s Justin Amash, together with Congressional Progressive Caucus co-chair Keith Ellison, D-Minnesota?

What unites long-time Ronald Reagan aide Dana Rohrabacher, R-California, with liberal firebrand Alan Grayson, D-Florida?

What gets steadily conservative former House Judiciary Committee chair James Sensenbrenner, R-Wisconsin, together with progressive former House Judiciary Committee chair John Conyers Jr., D-Michigan?

The Fourth Amendment to the Constitution, which has for 222 years promised that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

That’s an old commitment that members of Congress swear an oath to uphold. [..]

CISPA actually won 288 “yes” votes in the House, but the 127 “no” votes-coming from principled members on both sides of the aisle-sent a strong message to the more deliberative Senate. In combination with a grassroots campaign spearheaded by tech-savvy privacy activists and a threatened veto by President Obama, the bipartisan House opposition appears to have convinced Senate leaders have signaled that they plan to put the legislation on hold. The American Civil Liberties Union on Thursday suggestion that CISPA looks to be “dead for now.”

ACLU: CISPA Is Dead (For Now)

By Jason Koebler, US News

The Senate will not take up the controversial cybersecurity bill, is drafting separate legislation

“I think it’s dead for now,” says Michelle Richardson, legislative council with the ACLU. “CISPA is too controversial, it’s too expansive, it’s just not the same sort of program contemplated by the Senate last year. We’re pleased to hear the Senate will probably pick up where it left off last year.”

That’s not to say Congress won’t pass any cybersecurity legislation this year. Both Rockefeller and President Obama want to give American companies additional tools to fight back against cyberattacks from domestic and foreign hackers.

But cybersecurity legislation in the Senate, such as the Cybersecurity and American Cyber Competitiveness Act of 2013, has greater privacy protections than CISPA does. Richardson says that bill makes it clear that companies would have to “pull out sensitive data [about citizens]” before companies send it to the government and also puts the program under “unequivocal civilian control,” something CISPA author Rep. Mike Rogers, R-Mich., was unwilling to do.

Even if the Senate gets something done, Rogers and other CISPA supporters will likely have to compromise more than they’ve been willing to over the past year as Obama has made it clear he will veto legislation that doesn’t have more privacy protections.

CISPA Is Dead. Now Let’s Do a Cybersecurity Bill Right

by Julian Sanchez, Wired

Americans have grown so accustomed to hearing about the problem of “balancing privacy and security” that it sometimes feels as though the two are always and forever in conflict – that an initiative to improve security can’t possibly be very effective unless it’s invading privacy. Yet the conflict is often illusory: A cybersecurity law could easily be drafted that would accomplish all the goals of both tech companies and privacy groups without raising any serious civil liberties problems.

Few object to what technology companies and the government say they want to do in practice: pool data about the activity patterns of hacker-controlled “botnets,” or the digital signatures of new viruses and other malware. This information poses few risks to the privacy of ordinary users. Yet CISPA didn’t authorize only this kind of narrowly limited information sharing. Instead, it gave companies blanket immunity for feeding the government vaguely-defined “threat indicators” – anything from users’ online habits to the contents of private e-mails – creating a broad loophole in all federal and state privacy laws and even in private contracts and user agreements.

Given that recent experience has shown companies shielded by secrecy often err on the side of oversharing with the government, that loophole was a key concern. So why the gap between what the law permits and its supporters’ aims?

It’s a principle wonks call tech neutrality. Nobody wants to write a bill that refers too specifically to the information needed to protect current networks (like “Internet Protocol addresses” or “Netflow logs”) since technological evolution would render such language obsolete over time.

Load more