Tag: privacy

The First Thing We Do, Fire All the Liars

Cross posted from The Stars Hollow Gazette

In Shakespeare’s “Henry VI,” the character Dick the Butcher, a follower of the rebel Jack Cade, uttered the words, “The first thing we do, let’s kill all the lawyers.” If taken in the context of the play, the line, intended as a comedic aside, was actually a compliment to those lawyers who upheld the laws and protected society. Those words have taken on different meaning over the years and are now often used in reference to those lawyers who have twisted the laws to protect the corrupt and dishonest and, often as not, defend illegal wars and torture, as well as, circumvent the US Constitution. It has often been rephrased, as the title of this article, to fit a narrative, as in the case of “reforming” the NSA, “the first thing we do, is fire all the liars.

Leading First Amendment lawyer, James Goodale, is the former general council to the New York Times and was the driving force behind the NYT‘s decision to publish the Pentagon Papers in 1971. He was instrumental in the winning strategy that resulted in the 6 – 3 Supreme Court ruling that the US government could not stop the Times from publishing the documents. In his opinion piece at The Guardian on the proposed reforming of the NSA, Prof. Goodale noted that President Barack Obama’s first concern should be to fire all the liars, starting with the Director of National Intelligence, James R Clapper and  General Keith Alexander, director of the National Security Agency, among others who have both blatantly lied to Congress.

NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.

But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week.

The Justice Department told USA Today that it had no intention of investigating the attorneys who lied to those judges. In the ordinary course, the Justice Department’s office of professional responsibility investigates the behavior of lawyers who have been subject to accusations such as those made by Judges Bates and Walton.

(emphasis mine)

You read that correctly, the Obama DOJ has no intention of investigating the attorneys who lied to Judges Bates and Walton

The Justice Department’s Office of Professional Responsibility routinely probes judges’ allegations that the department’s lawyers may have violated ethics rules that prohibit attorneys from misleading courts. Still, OPR said in response to a Freedom of Information Act request by USA TODAY that it had no record of ever having investigated – or even being made aware of – the scathing and, at the time, classified, critiques from the Foreign Intelligence Surveillance Court between 2009 and 2011.

Prof. Goodall also calls Pres. Obama’s statement in his August 9, 2013 address on the NSA that he would appoint experts to examine NSA practices, “reasonable” but points out that it doesn’t appear to be going anywhere:

Robert Atkinson, the president of the Information Technology and Innovation Foundation and an attendee, told the Guardian the he “did not hear much discussion” of changes to the bulk surveillance activities.

“My fear is it’s a simulacrum of meaningful reform,” said Sascha Meinrath, a vice president of the New America Foundation, an influential Washington think tank, and the director of the Open Technology Institute, who also attended. “Its function is to bleed off pressure, without getting to the meaningful reform.”

It’s pretty predictable that there will be no meaningful reform coming from a committee comprised of intelligence insiders, former White House officials and Obama advisers.

Michael Morell, a former deputy CIA director, is a member, as is Richard Clarke, a White House counter-terrorism aide to three presidents. Cass Sunstein, a former White House regulatory staffer who is married to the new US ambassador to the United Nations; Geoffrey Stone, a University of Chicago law professor; and Peter Swire, a Georgia Tech professor and former aide to Obama and Bill Clinton, round out the panel.

Over at emptywheel, Marcy Wheeler pointed out a detail that Prof. Goodale missed:

In just its third open hearing this year, the Senate Intelligence Committee has arranged the following witnesses for tomorrow’s hearing on NSA’s spying.

   Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.) today announced the committee will hold an open hearing to consider legislative changes to the Foreign Intelligence Surveillance Act, to include the NSA call records program, on Thursday, September 26, at 2 p.m.

   WHAT:  Public hearing on FISA, NSA call records

   WHO:

   Panel I

       Director of National Intelligence James Clapper

       National Security AgencyDirector General Keith Alexander

       Deputy Attorney General James Cole

   Panel II

       Ben Wittes, Brookings Institution

       Tim Edgar, Watson Institute for International Studies, Brown University

So DiFi’s idea of an “open hearing” is to invite two established liars. And for her non-governmental witnesses, one keeps declaring Congress NAKED! in the face of evidence the government lies to them, and the other tells fanciful stories about how much data NSA shares.

It’s like DiFi goes out of her way to find liars and their apologists to testify publicly. [..]

It’s DiFi’s committee. And if she wants every single open hearing to serve as a platform for accomplished liars, I guess that’s her prerogative.

But observers should be clear that’s the purpose of the hearings.

As Prof Goodale concludes, the culture of lying to the public and courts by the US intelligence community is nothing new but it lies with President Obama to force the NSA to change. The best place for that change would be to fire the liars, Clapper and Alexander. So far, it appears the president is not much interested in that solution.

NSA and GCHQ Make Internet Privacy

Cross posted from The Stars Hollow Gazette

In a joint report by The Guardian, the New York Times, and ProPublica, courtesy of the documents leaked by Edward Snowden, it was revealed how the NSA and British GCHQ broke encryption to unlock unlock encryption used to protect emails, banking and medical records. The detailed article describes how the program, called “Bulrun,” foils the safeguards of our internet privacy:

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

A cryptographer and research professor at Johns Hopkins University, Michael Green summerizes some of the “bad things” that the NSA and GCHQ have been doing with the joint cost of $250 million per year:

   (1.) Tampering with national standards (NIST is specifically mentioned) to promote weak, or otherwise vulnerable cryptography.

   (2.) Influencing standards committees to weaken protocols.

   (3.) Working with hardware and software vendors to weaken encryption and random number generators.

   (4.) Attacking the encryption used by ‘the next generation of 4G phones‘.

   (5.) Obtaining cleartext access to ‘a major internet peer-to-peer voice and text communications system’ (Skype?)

   (6.) Identifying and cracking vulnerable keys.

   (7.) Establishing a Human Intelligence division to infiltrate the global telecommunications industry.

   (8.) And worst of all (to me): somehow decrypting SSL connections.

Columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald discussed this latest revelation with Amy Goodman and Juan González of DemocracyNow!.



Transcript can be read here

“It’s what lets you enter your credit card number, check your banking records, buy and sell things online, get your medical tests online, engage in private communications. It’s what protects the sanctity of the Internet.” [..]

“The entire system is now being compromised by the NSA and their British counterpart, the GCHQ,” Greenwald says. “Systematic efforts to ensure that there is no form of human commerce, human electronic communication, that is ever invulnerable to their prying eyes.”

Security technologist and a fellow at the Berkman Center for Internet and Society at Harvard Law School, Bruce Schneiner said, in an article at The Guardian, that the public has been betrayed by the US government and that the NSA has undermined the social contract with the public. He proposes that since it was engineers who built the internet, it is time that they “fix it”.

One, we should expose. If you do not have a security clearance, and if you have not received a National Security Letter, you are not bound by a federal confidentially requirements or a gag order. If you have been contacted by the NSA to subvert a product or protocol, you need to come forward with your story. Your employer obligations don’t cover illegal or unethical activity. If you work with classified data and are truly brave, expose what you know. We need whistleblowers. [..]

Two, we can design. We need to figure out how to re-engineer the internet to prevent this kind of wholesale spying. We need new techniques to prevent communications intermediaries from leaking private information.

We can make surveillance expensive again. In particular, we need open protocols, open implementations, open systems – these will be harder for the NSA to subvert.

Prof. Schneiner also offers a guide to staying secure and gives five piece of advice:

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you’re much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

These are some of the programs he has been using: GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit and Password Safe. He also advises the use of a Linux operating system.

Obama Defends NSA Surveillance on the Way to the G-20

Cross posted from The Stars Hollow Gazette

During his stop over in Stockholm, Sweden on the way to the G-20, President Barack Obama renewed his defense of unfettered surveillance

“I can give assurances to the publics in Europe and around the world that we’re not going around snooping at people’s emails or listening to their phone calls,” Obama said in response to a Swedish reporter’s question during a news conference with Prime Minister Fredrik Reinfeldt as he began a whirlwind, 24-hour trip to Sweden. “What we try to do is to target very specifically areas of concern.”

Still, the president acknowledged that questions about privacy were likely to trail him in Europe – a continent that is protective of privacy rights – for some time. The issue also bubbled up during his trip to Germany in June, shortly after newspapers published reports based on documents leaked by former government contractor Edward Snowden.

Despite Obama’s assertions of a more narrow-scope effort, the Snowden-leaked documents show the NSA collects and stores all kinds of data traveling through the Internet, including emails, video chats and instant messages. Under one such classified program, known as Prism, the government can obtain secret court orders and gather mass amounts of data from major Internet companies such as Google, Apple, Microsoft and Facebook.

The ACLU is challenging the constitutionality of the intelligence agency’s action filing a complaint in the Southern District of New York against James Clapper in June. An up date on that lawsuit was posted today on their web site. (please note that the link contains an interesting but really annoying gif).

An impressive array of organizations and individuals filed amicus briefs yesterday in support of the ACLU’s constitutional challenge to the government’s collection of the call records of virtually everyone in the United States. The range of voices joining the protest against mass government surveillance-not to mention the bipartisan storm that has swept Congress since the recent NSA disclosures – is a real testament to the fact that the government’s dragnet surveillance practices are offensive to Americans from across the political spectrum.

Among the groups supporting our lawsuit are the National Rifle Association, the Reporters Committee for Freedom of the Press, and the PEN American Center. Philosophy Professor Michael Lynch submitted a brief arguing that privacy is fundamental to human dignity. Our friends at the Electronic Frontier Foundation submitted a brief on behalf of Rep. Jim Sensenbrenner (R-Wis.), one of the authors of the Patriot Act. Rep. Sensenbrenner has decried the now-public call-records program as outside the scope of the law he authored.

Yes, you’re reading that right, the NRA and Rep. Sensenbrenner.

NSA surveillance: National Rifle Association backs ACLU challenge

by Ewen MacAskill, The Guardian

Anger at US government’s data trawling creates unlikely alliance in court between NRA and American Civil Liberties Union

The NRA, in an amicus brief in support of the ACLU, argues that the mass surveillance programme provides “the government not only with the means of identifying members and others who communicate with the NRA and other advocacy groups, but also with the means of identifying gun owners without their knowledge or consent”.

EFF Files Brief on Behalf of Rep. Sensenbrenner in NSA Spying Case

Press release from Electronic Freedom Foundation

Original Patriot Act Author Says Call-Data Collection Exceeds Congressional Intent

San Francisco – The Electronic Frontier Foundation (EFF) today filed a brief on behalf of Rep. Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, in a case brought by the American Civil Liberties Union (ACLU) against the National Security Agency (NSA). In the brief, Sensenbrenner argues that Congress never intended the Patriot Act to permit the NSA’s collection of the records of every telephone call made to, from and within the United States. Sensenbrenner urges the court to deny the NSA’s motion to dismiss and grant the ACLU’s motion for a preliminary injunction, which would halt the program until the case is decided.

In another development today, hundreds of pages from NSA spying documents are to be released in response to an FOIA request by EFF:

In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of pages of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. [..]

While the government finally released a white paper detailing its expansive (and unconstitutional) interpretation of Section 215 last month, more important FISA court opinions adopting at least part of that interpretation have remained secret. The results of EFF’s FOIA lawsuit will finally lift the veil on the dubious legal underpinnings of NSA’s domestic phone surveillance program.

This victory for EFF comes on the heels of another FOIA success two weeks ago, when the Justice Department was also forced to release a 2011 FISA court opinion ruling some NSA surveillance unconstitutional.

Now to that gif. It is visualization demonstrating the staggering scope of the NSA’s surveillance. Click on the image to view.

ACLU NRA photo blog-3hops-500x280-v01_zpsa00e2a91.jpg

Worse Than NSA: DEA Deal with AT&T

Cross posted fromThe Stars Hollow Gazette

In the midst of the angst of the debate over Obama bombing Syria, a front page article in Monday’s New York Times has revealed a new surveillance scandal involving a little known deal between the Drug Enforcement Agency (DEA) and AT&T called the Hemisphere Project. That deal gives the DEA access to 26 years of its phone records:

Unlike the controversial call record accesses obtained by the NSA, the data is stored by AT&T, not the government, but officials can access individual’s phone records within an hour of an administrative subpoena.

AT&T receives payment from the government in order to sit its employees alongside drug units to aid with access to the data.

The AT&T database includes every phone call which passes through the carrier’s infrastructure, not just those made by AT&T customers.

Details of the program – which was marked as law enforcement sensitive, but not classified – were released in a series of slides to an activist, Drew Hendricks, in response to freedom of information requests, and then passed to reporters at the New York Times.

Officials were instructed to take elaborate steps to ensure the secrecy of the Hemisphere program, a task described as a “formidable challenge” in the slide deck, which detailed the steps agencies had taken to “try and keep the program under the radar”.

The NYT‘s national security reporter, Scott Shane joined Democracy Now!‘s Amy Goodman to discuss the Hemisphere Project and it’s impact.



The transcript for this segment was not available at this time.

Joining the Party

Cross posted from The Stars Hollow Gazette

It was announced last week that The Guardian and The New York Times had formed a partnership to report on the documents the were leaked by Edward Snowden in relationship to the involvement of the UK’s GCHQ. The arrangement came after the British government demanded that The Guardian hand over the NSA files in their possession. Instead, The Guardian choose to destroy the records that were in their UK offices.

Journalists in America are protected by the first amendment which guarantees free speech and in practice prevents the state seeking pre-publication injunctions or “prior restraint”.

It is intended that the collaboration with the New York Times will allow the Guardian to continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach. Snowden is aware of the arrangement.

The collaboration echoes that of the partnership forged in 2010 between the Guardian, the New York Times and Der Spiegel in relation to WikiLeaks’s release of US military and diplomatic documents.

In a more quiet arrangement, ProPublica, a unique nonprofit investigative reporting group of former journalists, has also partnered with The Guardian but it is not yet known on they will focus. ProPublica has won two Pulitzer Prizes for its reporting on national and investigative reporting.

Charles Pierce, at Esquire’s Politics Blog has been following the NSA story and the unique poutrage over Snowden and The Guardian‘s journalist Glenn Greenwald that ignited a laughable mini blog war. He offered a couple of amusingly precise observations on the Snowden effect:

The current state of play seems to be centered on the new family fun game, How Much Of A Dick Is Glenn Greenwald Anyway? I decline to play. It is a stupid, wasteful exercise because, frankly, the vessel doesn’t matter to me. The information that it carries is the only thing that matters. What has Edward Snowden, International Man Of Luggage, revealed that isn’t true? I don’t want to hear that we all knew it already. I don’t want quibbling about how the data sweeps work, and how they might not be as horrible as they’re being made out to be because I don’t trust the people making that argument. I don’t to hear about how the fudging of the details of David Miranda’s arrest somehow lessens the credibility of what we now know. I don’t want to hear how it may have inconvenienced our all-too-human-mistake-prone heroes in the NSA, who are they all, all honorable men. What do we know now because of the revelations that is not true? The fact remains that we do not know any of this without Snowden’s revelations to Greenwald and, thereby, to the world. The national conversation is not even happening. The NSA is not owning up to its all-too-human mistakes. The FISA Court isn’t retroactively flexing to prove it isn’t the intelligence community’s poodle. The authoritarian impulse has not even been given the brief pause we currently enjoy. None of this happens without Snowden and Greenwald and, as a citizen, I could care less that people think Glenn Greenwald is full of himself. Don’t invite him to dinner.

Charles then jogs the memories of those who care to have forgotten how Iran/Contra began:

For the benefit of anyone for whom reading is perhaps not fundamental, Glenn Greenwald’s personality, and the peripatetic globe-trotting of Edward Snowden, are not the story here. If you decide to make them the story, then you are taking yourself off the real story, and that’s your fault, not Greenwald’s or Snowden’s. Unless, of course, you think the Times, and now ProPublica, are acting the way Lyndon LaRouche’s people did. I remind folks who get caught up in the vessel and miss what’s inside that, on November 3, 1986, there was an oddball story in an obscure Lebanese weekly newspaper called al-Shiraa about arms transfers in the Middle East. This story was flatly denied by everyone in this country — including President Ronald Reagan — and al Shiraa was treated as though it was being put out by two guys with a mimeograph machine in their mother’s basement. This, boys and girls, was how the Iran-Contra scandal began. The government “hit back.” It didn’t matter. The story remained the story. And, it could be argued, the country never really caught up with what al Shiraa reported.

The country and the world have Snowden and Greenwald to thank for holding the current administration to its promise of transparency, their personal lives and beliefs are irrelevant.  

NSA Was Found in Violation of the Fourth Amendment

Cross posted from The Stars Hollow Gazette

The Electronic Freedom Foundation has won a victory in its fight with the government in federal court to release a FISA court ruling that found the NSA in violation of the Fourth Amendment, illegally collecting e-mails of tens of thousands of Americans.

NSA illegally collected thousands of emails before Fisa court halted program

by Spencer Ackerman, The Guardian

Declassified court ruling from 2011 found government ‘disclosed substantial misrepresentation’ of data collection program

In his 86-page opinion, declassified on Wednesday, Judge John Bates wrote that the government informed the court that the “volume and nature of the information it has been collecting is fundamentally different from what the court had been led to believe”.

The ruling is one of three documents released in response to a Freedom of Information Act request by the Electronic Frontier Foundation, and comes amid growing public and congressional concern over the scope of NSA surveillance programs. [..]

Wholly domestic communications are banned from the NSA’s collection under section 702 of the 2008 Fisa Amendments Act. An NSA document leaked by whistleblower Edward Snowden and published by the Guardian on August 9 referred to an October 2011 change in the rules, by which the NSA must purge data it improperly collected but that said the NSA could still search its so-called “702” databases for “certain US person names and identifiers,” though not until an “effective oversight process” was implemented.

Senator Ron Wyden, a member of the intelligence committee, refers to the NSA’s still-current authorities to query those databases for US person information as a “backdoor search” loophole.

“The ruling states that the NSA has knowingly acquired tens of thousands of wholly domestic communications under section 702 of the Foreign Intelligence Surveillance Act, even though this law was specifically written to prohibit the warrantless acquisition of wholly domestic communications,” Wyden said.

“The FISA Court has noted that this collection violates the spirit of the law, but the government has failed to address this concern in the two years since this ruling was issued. This ruling makes it clear that FISA Section 702, as written, is insufficient to adequately protect the civil liberties and privacy rights of law-abiding Americans and should be reformed.”

October 3, 2011 FISC Opinion Holding NSA Surveillance Unconstitutional

Anchor and managing editor for “Dan Rather Reports” on AXS-TV, Dan Rather joined Rachel Maddow to talk about the abuse of power and general bungling undermines the credibility of the US and calls into question how the “war on terror’ has been conducted over the last 12 years since 9/11.

The NSA has “built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans.”

NSA: Oversight or Coverup?

Cross posted from The Stars Hollow Gazette

NSA Spying: The Three Pillars of Government Trust Have Fallen

by Cindy Cohn and Mark Jaycox, Electronic Frontier Foundation

With each recent revelation about the NSA’s spying programs government officials have tried to reassure the American people that all three branches of government-the Executive branch, the Judiciary branch, and the Congress-knowingly approved these programs and exercised rigorous oversight over them. President Obama recited this talking point just last week, saying: “as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people.”  With these three pillars of oversight in place, the argument goes, how could the activities possibly be illegal or invasive of our privacy?

Today, the Washington Post confirmed that two of those oversight pillars-the Executive branch and the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA court )- don’t really exist. The third pillar came down slowly over the last few weeks, with Congressional revelations about the limitations on its oversight, including what Representative Sensennbrenner called “rope a dope” classified briefings. With this, the house of government trust has fallen, and it’s time to act.

Latest Leak: NSA Abused Rules To Spy On Americans ‘Thousands Of Times Each Year

by Mike Masnick, TechDirt

(T)he latest report from the Washington Post based on leaked documents shows that an audit of the NSA’s activities shows it broke privacy rules, mostly to spy on Americans, thousands of times per year:

   The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.

   Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by law and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.

The audit info comes from Ed Snowden’s leaks, so it seems rather incredible that President Obama, Keith Alexander and Mike Rogers didn’t seem to realize that this audit would eventually come to light, showing that they were flat out 100% lying to the American public.

That’s Not Oversight: Head Of FISC Admits He Relies On NSA’s Statements To Make Sure They’re Obeying The Law

by Mike Masnick, TechDirt

The chief judge of FISC, Reggie Walton, who has reacted angrily in the past to the claims of FISC being a “rubber stamp”, has now admitted that the FISC really can’t check on what the NSA is doing and relies on what they tell him to make sure that they’re not breaking the law.

   “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.”

That’s not quite true. You see, with “any other court” when it comes to “enforcing compliance” things aren’t all hidden away from everyone, so there is scrutiny to make sure that there’s compliance. Not here.

Either way, this again shows just how laughable President Obama’s claims are about the FISC’s oversight abilities:

   “We also have federal judges that we’ve put in place who are not subject to political pressure,” Obama said at a news conference in June. “They’ve got lifetime tenure as federal judges, and they’re empowered to look over our shoulder at the executive branch to make sure that these programs aren’t being abused.”

Not quite. Now we know that they rely on the NSA to tell the judges what they might see if they were looking over their shoulders… and the NSA isn’t entirely truthful to FISC about that.

The latest revelation that the House Intelligence Committee withheld surveillance information from Congress before a critical vote to renew the Patriot Act has resulted in pressure from both side of the aisle and government watch dogs on committee chair Mike Rogers (R-MI). The demand is for an explanation of why a document that prepared by the justice department and intelligence community was not shared by the panel’s leadership. From Spencer Ackerman at The Guardian:

The accusations broaden the focus of the surveillance controversy from the National Security Agency to one of the congressional committees charged with exercising oversight of it – and the panel’s closeness to the NSA it is supposed to oversee.

(Michigan Republican Justin) Amash told the Guardian on Monday that he had confirmed with the House intelligence committee that the committee did not make non-committee members aware of the classified overview from 2011 of the bulk phone records collection program first revealed by the Guardian thanks to whistleblower Edward Snowden. The document was expressly designed to be shared with legislators who did not serve on the panel; it appears that a corresponding document for the Senate in 2011 was made available to all senators.

“Nobody I’ve spoken to in my legislative class remembers seeing any such document,” Amash said.

Amash speculated that the House intelligence committee withheld the document in order to ensure the Patriot Act would win congressional reauthorization, as it ultimately did.

On Monday, a former senate staffer Jennifer Hoelzer, who was deputy chief of staff for Sen. Ron Wyden (D-OR), spoke with Amy Goodman of Democracy Now! on President Barack Obama’s proposed changes to reform the government’s surveillance policies and programs.



Full transcript can be read here

“Unfortunately Edward Snowden was the only means by which we have been able to have this debate,” Hoelzer says. “We, working for Senator Wyden, did everything to try to encourage the administration to bring these facts to light. We’re not talking about sources and methods, we’re not talking about sensitive materials, we’re talking about what they believed the law allows them to do.”

As Spencer Ackerman points out in his article, both Chairman Rogers and his ranking Democratic counterpart, Dutch Ruppersberger of Maryland, are “staunch advocates of the NSA bulk surveillance programs.”

This is the government’s definition of “oversight.”

Encrypted E-Mail , FISA and Our Privacy Rights

Cross posted from The Stars Hollow Gazette

Last week, Lavabit, the privacy-conscious email service, suspended operations by its owner Ladar Levison while he fights the US government over Constitutional rights in the 4th Circuit Court of Appeals. In his letter to his customers, Mr. Levison wrote

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,

Ladar Levison

Owner and Operator, Lavabit LLC

(emphasis mine)

Lavabit allows its customers send highly encrypted emails that even if intercepted by a third party could not be opened without a password. Based in the US, it is the e-mail service that was allegedly used by whistleblower Edward Snowden.

In an exclusive interview with Amy Goodman on Tuesday’s Democracy Now!, Lavabit owner Ladar Levison and his lawyer, Jesse Binnall discuss why the decision was made to shut down rather than comply with a government order



Transcript can be read here

“I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore.

“I mean, there’s information that I can’t even share with my lawyer, let alone with the American public. So if we’re talking about secrecy, you know, it’s really been taken to the extreme.

“And I think it’s really being used by the current administration to cover up tactics that they may be ashamed of.”

~Ladar Levison~

Another encrypted service, Silent Circle has also announced it has shut down. Although it had not yet received any government requests for data, Silent Circle told Tech Crunch that it knew the government would come after them because of the high-profile nature of its users.

Despite the Promise, Still No Tranparency on Surveillance

Cross posted from The Stars Hollow Gazette

During his press conference on Friday, President Barack Obama admitted, without giving him credit, that the reason the conversation on the NSA is now taking place is thanks to Edward Snowden.

“The leaks triggered a much more rapid and passionate response than would have been the case if I had simply appointed this review board,” Obama said, while adding, “I actually think we would have gotten to the same place-and we would have done so without putting at risk our national security.”

With public opinion rapidly eroding over the surveillance, the president still refused to concede that the program was abused:

“America is not interested in spying on ordinary people,” Obama said. The surveillance programs, he said, were valuable and “should be preserved.” The flaw, if there was one, he said, lay in his assumption that the public would trust that the “checks and balances” in place between the administration, Congress, and the courts was enough to secure personal freedom. Instead, he said, after Snowden’s revelations, “I think people have questions about this program.”

While Obama promised a to create an an independent advisory group made up of “outside experts” who will review controversial surveillance programs, it’s pretty clear that [the group won’t exactly be completely independent of the NSA, as Marcy Wheeler reports:

In the memo Obama just released (pdf) ordering James Clapper to form such a committee, those words “outside” and “independent” disappear entirely.

   I believe it is important to take stock of how these technological advances alter the environment in which we conduct our intelligence mission. To this end, by the authority vested in me as President by the Constitution and the laws of the United States of America, I am directing you to establish a Review Group on Intelligence and Communications Technologies (Review Group).

   The Review Group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60 days of its establishment, the Review Group will brief their interim findings to me through the Director of National Intelligence (DNI), and the Review Group will provide a final report and recommendations to me through the DNI no later than December 15, 2013. [my emphasis]

And neither Obama nor the Intelligence Committees get to hear from this Group themselves. It all goes through James Clapper.

And the other group members

President Obama and Director Clapper may solicit advice from notable figures in the technology industry; the president reportedly met with several leaders last Thursday, including Apple CEO Tim Cook and Google VP Vint Cerf. But with both Apple and Google implicated in some level of cooperation with the government under PRISM, the government may need to solicit input from a broader coalition of stakeholders.

So, Obama is putting the liar in charge, asking advice from those who willingly aided and abetted the spying and isn’t going to make the report public but expects this will win over public opinion. Yeah, right. If the public falls for this malarkey, I have a bridge to sell, too.

The Greatest Lies Ever Told

Cross posted from The Stars Hollow Gazette

Someone suggested that latest lie told by President Barack Obama on the Jay Leno Show that other night stating, “There is no spying on Americans. We don’t have a domestic spying program,” was up there with the 10 greatest lies ever told. That fallacy of the president’s declaration was made very obvious in a New York Times article by Charlie Savage on the latest and greatest NSA domestic surveillance program. The NSA has been copying virtually all overseas messages that Americans send or receive, scanning them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

In an opinion by the New York Times Editorial Board, these messages could be very private and no connection to terrorists or terrorist activity:

That could very well include innocent communications between family members expressing fears of a terror attack. Or messages between an editor and a reporter who is covering international security issues. Or the privileged conversation between a lawyer and a client who is being investigated.

Data collection on this scale goes far beyond what Congress authorized, and it clearly shreds a common-sense understanding of the Fourth Amendment. It’s as if the government were telling its citizens not to even talk about security issues in private messages or else they will come to the attention of the nation’s spies.

At the Electronic Frontier Foundation, Mark Rumold explains what it means to be an NSA target:

When “Target” Means Searching a Specific Person’s Communications

First, at least this much is clear: a “target” under the FA (FISA Amendments Act ) must be (a) a non-US person and (b) not physically located within the United States. A “person,” for purposes of the FAA, includes individuals as well as “any group, entity, association, corporation, or foreign power.”  Under the FAA, the government can thus “target” a single individual (e.g., Vladimir Putin), a small group of people (e.g., Pussy Riot), or a formal corporation or entity (e.g., Gazprom).

So, when the NSA decides to “target” someone (or something), it turns its specific surveillance vacuum at them. [..]

When “Target” Means Searching Everyone’s Communications

Once a target is established, the NSA believes it can expand the sweep of its interception far more broadly than the communhttp://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-documentications of the particular, identified target. Notably, the NSA’s procedures state (emphasis added):

   [I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.

In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isn’t a party to the communication. The most likely way to assess if a communication is “about” a target is to conduct a content analysis of communications, probably based on specific search terms or selectors.

And that, folks, is what we call a content dragnet.

Importantly, under the NSA’s rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans’ communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow.

Jameel Jaffer, American Civil Liberties Union deputy legal director, made the following comments about the latest revelations:

“The program described by the New York Times involves a breathtaking invasion of millions of people’s privacy.  The NSA has cast a massive dragnet over Americans’ international communications, collecting and monitoring all of them, and retaining some untold number of them in government databases.  This is precisely the kind of generalized spying that the Fourth Amendment was intended to prohibit.

“The government’s scrutiny of virtually every international email sent by Americans will have extraordinary consequences for free expression. Americans will inevitably hesitate to discuss controversial topics, visit politically sensitive websites, or interact with foreigners with dissenting views. By injecting the NSA into virtually every cross-border interaction, the U.S. government will forever alter what has always been an open exchange of ideas.

“There is no spying on Americans. We don’t have a domestic spying program,” is right up there with “I am not a crook” and “I did not have sex with that woman.”

NSA Handing Information to DEA and DOJ

Cross posted from The Stars Hollow Gazette

The National Security Agency isn’t just looking to “keep us safe” from terrorists by collecting metadata, the NSA is sharing its information with the secretive Special Operations Division of the U.S. Drug Enforcement Administration (DEA) which is then passing that information to local authorities, covering up the NSA source.

U.S. directs agents to cover up program used to investigate Americans

by John Shiffman and Kristina Cooke, Reuters

A secretive US Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

It isn’t just the DEA that is doing this, the Justice Department is also receiving information about non-terrorist related criminal activity.

NSA handing over non-terror intelligence

by Stewart M. Powell, SFGate

The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Other Agencies Clamor for Data N.S.A. Compiles

by Eric Lichtblau and Michael S. Schmidt, The New York Times

The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

At emptywheel, bmaz points out this is nothing in the Reuter’s article on the SOD wasn’t already known, just no one has been paying attention:

First, the headline is misleading. The caption is:

   Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90′s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy” (pdf):

   In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas-the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

   The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

   The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

   Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

On this morning’s Democracy Now!, Guardian journalist Glenn Greenwald responded to a report by Reuters.



Transcript can be read here.

“It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained,” Greenwald says.

XKeyscore: Another NSA Program Exposed

Cross posted from The Stars Hollow Gazette

As a hearing on reining in the secret surveillance program was taking place, another “tool” in the NSA’s collection of on-line data was revealed to the public.

Senate Panel Presses N.S.A. on Phone Logs

by Charlie Savage and David E. Sanger, The New York Times

Senators of both parties on Wednesday sharply challenged the National Security Agency’s collection of records of all domestic phone calls, even as the latest leaked N.S.A. document provided new details on the way the agency monitors Web browsing around the world.

At a Senate Judiciary Committee hearing, the chairman, Patrick J. Leahy, Democrat of Vermont, accused Obama administration officials of overstating the success of the domestic call log program. He said he had been shown a classified list of “terrorist events” detected through surveillance, and it did not show that “dozens or even several terrorist plots” had been thwarted by the domestic program.

“If this program is not effective it has to end. So far, I’m not convinced by what I’ve seen,” Mr. Leahy said, citing the “massive privacy implications” of keeping records of every American’s domestic calls.

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

by Glenn Greenwald, The Guardian

• XKeyscore gives ‘widest-reaching’ collection of online data

• NSA analysts require no prior authorization for searches

• Sweeps up emails, social media activity and browsing history

• NSA’s XKeyscore program – read one of the presentations

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

All In host Chris Hayes talks about the new efforts at transparency and the latest NSA revelations courtesy of Edward Snowden with Senator Richard Blumenthal (D-CT) and Glenn Greenwald of The Guardian.

With the crackdown on whistleblowers and failure to pursue the crimes they revealed, one wonders just how far is the US from becoming the Soviet Russia of the 21st century.

Load more