Tag: Patriot Act

Worse Than NSA: DEA Deal with AT&T

In the midst of the angst of the debate over Obama bombing Syria, a front page article in Monday’s New York Times has revealed a new surveillance scandal involving a little known deal between the Drug Enforcement Agency (DEA) and AT&T called the Hemisphere Project. That deal gives the DEA access to 26 years of its phone records:

Unlike the controversial call record accesses obtained by the NSA, the data is stored by AT&T, not the government, but officials can access individual’s phone records within an hour of an administrative subpoena.

AT&T receives payment from the government in order to sit its employees alongside drug units to aid with access to the data.

The AT&T database includes every phone call which passes through the carrier’s infrastructure, not just those made by AT&T customers.

Details of the program – which was marked as law enforcement sensitive, but not classified – were released in a series of slides to an activist, Drew Hendricks, in response to freedom of information requests, and then passed to reporters at the New York Times.

Officials were instructed to take elaborate steps to ensure the secrecy of the Hemisphere program, a task described as a “formidable challenge” in the slide deck, which detailed the steps agencies had taken to “try and keep the program under the radar”.

The NYT‘s national security reporter, Scott Shane joined Democracy Now!‘s Amy Goodman to discuss the Hemisphere Project and it’s impact.



The transcript for this segment was not available at this time.

NSA: Oversight or Coverup?

NSA Spying: The Three Pillars of Government Trust Have Fallen

by Cindy Cohn and Mark Jaycox, Electronic Frontier Foundation

With each recent revelation about the NSA’s spying programs government officials have tried to reassure the American people that all three branches of government-the Executive branch, the Judiciary branch, and the Congress-knowingly approved these programs and exercised rigorous oversight over them. President Obama recited this talking point just last week, saying: “as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people.”  With these three pillars of oversight in place, the argument goes, how could the activities possibly be illegal or invasive of our privacy?

Today, the Washington Post confirmed that two of those oversight pillars-the Executive branch and the court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA court )- don’t really exist. The third pillar came down slowly over the last few weeks, with Congressional revelations about the limitations on its oversight, including what Representative Sensennbrenner called “rope a dope” classified briefings. With this, the house of government trust has fallen, and it’s time to act.

Latest Leak: NSA Abused Rules To Spy On Americans ‘Thousands Of Times Each Year

by Mike Masnick, TechDirt

(T)he latest report from the Washington Post based on leaked documents shows that an audit of the NSA’s activities shows it broke privacy rules, mostly to spy on Americans, thousands of times per year:

   The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.

   Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by law and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls.

The audit info comes from Ed Snowden’s leaks, so it seems rather incredible that President Obama, Keith Alexander and Mike Rogers didn’t seem to realize that this audit would eventually come to light, showing that they were flat out 100% lying to the American public.

That’s Not Oversight: Head Of FISC Admits He Relies On NSA’s Statements To Make Sure They’re Obeying The Law

by Mike Masnick, TechDirt

The chief judge of FISC, Reggie Walton, who has reacted angrily in the past to the claims of FISC being a “rubber stamp”, has now admitted that the FISC really can’t check on what the NSA is doing and relies on what they tell him to make sure that they’re not breaking the law.

   “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.”

That’s not quite true. You see, with “any other court” when it comes to “enforcing compliance” things aren’t all hidden away from everyone, so there is scrutiny to make sure that there’s compliance. Not here.

Either way, this again shows just how laughable President Obama’s claims are about the FISC’s oversight abilities:

   “We also have federal judges that we’ve put in place who are not subject to political pressure,” Obama said at a news conference in June. “They’ve got lifetime tenure as federal judges, and they’re empowered to look over our shoulder at the executive branch to make sure that these programs aren’t being abused.”

Not quite. Now we know that they rely on the NSA to tell the judges what they might see if they were looking over their shoulders… and the NSA isn’t entirely truthful to FISC about that.

The latest revelation that the House Intelligence Committee withheld surveillance information from Congress before a critical vote to renew the Patriot Act has resulted in pressure from both side of the aisle and government watch dogs on committee chair Mike Rogers (R-MI). The demand is for an explanation of why a document that prepared by the justice department and intelligence community was not shared by the panel’s leadership. From Spencer Ackerman at The Guardian:

The accusations broaden the focus of the surveillance controversy from the National Security Agency to one of the congressional committees charged with exercising oversight of it – and the panel’s closeness to the NSA it is supposed to oversee.

(Michigan Republican Justin) Amash told the Guardian on Monday that he had confirmed with the House intelligence committee that the committee did not make non-committee members aware of the classified overview from 2011 of the bulk phone records collection program first revealed by the Guardian thanks to whistleblower Edward Snowden. The document was expressly designed to be shared with legislators who did not serve on the panel; it appears that a corresponding document for the Senate in 2011 was made available to all senators.

“Nobody I’ve spoken to in my legislative class remembers seeing any such document,” Amash said.

Amash speculated that the House intelligence committee withheld the document in order to ensure the Patriot Act would win congressional reauthorization, as it ultimately did.

On Monday, a former senate staffer Jennifer Hoelzer, who was deputy chief of staff for Sen. Ron Wyden (D-OR), spoke with Amy Goodman of Democracy Now! on President Barack Obama’s proposed changes to reform the government’s surveillance policies and programs.



Full transcript can be read here

“Unfortunately Edward Snowden was the only means by which we have been able to have this debate,” Hoelzer says. “We, working for Senator Wyden, did everything to try to encourage the administration to bring these facts to light. We’re not talking about sources and methods, we’re not talking about sensitive materials, we’re talking about what they believed the law allows them to do.”

As Spencer Ackerman points out in his article, both Chairman Rogers and his ranking Democratic counterpart, Dutch Ruppersberger of Maryland, are “staunch advocates of the NSA bulk surveillance programs.”

This is the government’s definition of “oversight.”

Encrypted E-Mail , FISA and Our Privacy Rights

Last week, Lavabit, the privacy-conscious email service, suspended operations by its owner Ladar Levison while he fights the US government over Constitutional rights in the 4th Circuit Court of Appeals. In his letter to his customers, Mr. Levison wrote

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What’s going to happen now? We’ve already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,

Ladar Levison

Owner and Operator, Lavabit LLC

(emphasis mine)

Lavabit allows its customers send highly encrypted emails that even if intercepted by a third party could not be opened without a password. Based in the US, it is the e-mail service that was allegedly used by whistleblower Edward Snowden.

In an exclusive interview with Amy Goodman on Tuesday’s Democracy Now!, Lavabit owner Ladar Levison and his lawyer, Jesse Binnall discuss why the decision was made to shut down rather than comply with a government order



Transcript can be read here

“I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore.

“I mean, there’s information that I can’t even share with my lawyer, let alone with the American public. So if we’re talking about secrecy, you know, it’s really been taken to the extreme.

“And I think it’s really being used by the current administration to cover up tactics that they may be ashamed of.”

~Ladar Levison~

Another encrypted service, Silent Circle has also announced it has shut down. Although it had not yet received any government requests for data, Silent Circle told Tech Crunch that it knew the government would come after them because of the high-profile nature of its users.

Despite the Promise, Still No Tranparency on Surveillance

During his press conference on Friday, President Barack Obama admitted, without giving him credit, that the reason the conversation on the NSA is now taking place is thanks to Edward Snowden.

“The leaks triggered a much more rapid and passionate response than would have been the case if I had simply appointed this review board,” Obama said, while adding, “I actually think we would have gotten to the same place-and we would have done so without putting at risk our national security.”

With public opinion rapidly eroding over the surveillance, the president still refused to concede that the program was abused:

“America is not interested in spying on ordinary people,” Obama said. The surveillance programs, he said, were valuable and “should be preserved.” The flaw, if there was one, he said, lay in his assumption that the public would trust that the “checks and balances” in place between the administration, Congress, and the courts was enough to secure personal freedom. Instead, he said, after Snowden’s revelations, “I think people have questions about this program.”

While Obama promised a to create an an independent advisory group made up of “outside experts” who will review controversial surveillance programs, it’s pretty clear that [the group won’t exactly be completely independent of the NSA, as Marcy Wheeler reports:

In the memo Obama just released (pdf) ordering James Clapper to form such a committee, those words “outside” and “independent” disappear entirely.

   I believe it is important to take stock of how these technological advances alter the environment in which we conduct our intelligence mission. To this end, by the authority vested in me as President by the Constitution and the laws of the United States of America, I am directing you to establish a Review Group on Intelligence and Communications Technologies (Review Group).

   The Review Group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60 days of its establishment, the Review Group will brief their interim findings to me through the Director of National Intelligence (DNI), and the Review Group will provide a final report and recommendations to me through the DNI no later than December 15, 2013. [my emphasis]

And neither Obama nor the Intelligence Committees get to hear from this Group themselves. It all goes through James Clapper.

And the other group members

President Obama and Director Clapper may solicit advice from notable figures in the technology industry; the president reportedly met with several leaders last Thursday, including Apple CEO Tim Cook and Google VP Vint Cerf. But with both Apple and Google implicated in some level of cooperation with the government under PRISM, the government may need to solicit input from a broader coalition of stakeholders.

So, Obama is putting the liar in charge, asking advice from those who willingly aided and abetted the spying and isn’t going to make the report public but expects this will win over public opinion. Yeah, right. If the public falls for this malarkey, I have a bridge to sell, too.

The Greatest Lies Ever Told

Someone suggested that latest lie told by President Barack Obama on the Jay Leno Show that other night stating, “There is no spying on Americans. We don’t have a domestic spying program,” was up there with the 10 greatest lies ever told. That fallacy of the president’s declaration was made very obvious in a New York Times article by Charlie Savage on the latest and greatest NSA domestic surveillance program. The NSA has been copying virtually all overseas messages that Americans send or receive, scanning them to see if they contain any references to people or subjects the agency thinks might have a link to terrorists.

Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency “seeks to acquire communications about the target that are not to or from the target.” The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked “Top Secret” amid 18 pages of restrictions, went largely overlooked amid other disclosures.

In an opinion by the New York Times Editorial Board, these messages could be very private and no connection to terrorists or terrorist activity:

That could very well include innocent communications between family members expressing fears of a terror attack. Or messages between an editor and a reporter who is covering international security issues. Or the privileged conversation between a lawyer and a client who is being investigated.

Data collection on this scale goes far beyond what Congress authorized, and it clearly shreds a common-sense understanding of the Fourth Amendment. It’s as if the government were telling its citizens not to even talk about security issues in private messages or else they will come to the attention of the nation’s spies.

At the Electronic Frontier Foundation, Mark Rumold explains what it means to be an NSA target:

When “Target” Means Searching a Specific Person’s Communications

First, at least this much is clear: a “target” under the FA (FISA Amendments Act ) must be (a) a non-US person and (b) not physically located within the United States. A “person,” for purposes of the FAA, includes individuals as well as “any group, entity, association, corporation, or foreign power.”  Under the FAA, the government can thus “target” a single individual (e.g., Vladimir Putin), a small group of people (e.g., Pussy Riot), or a formal corporation or entity (e.g., Gazprom).

So, when the NSA decides to “target” someone (or something), it turns its specific surveillance vacuum at them. [..]

When “Target” Means Searching Everyone’s Communications

Once a target is established, the NSA believes it can expand the sweep of its interception far more broadly than the communhttp://www.guardian.co.uk/world/interactive/2013/jun/20/exhibit-a-procedures-nsa-documentications of the particular, identified target. Notably, the NSA’s procedures state (emphasis added):

   [I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.

In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isn’t a party to the communication. The most likely way to assess if a communication is “about” a target is to conduct a content analysis of communications, probably based on specific search terms or selectors.

And that, folks, is what we call a content dragnet.

Importantly, under the NSA’s rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans’ communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow.

Jameel Jaffer, American Civil Liberties Union deputy legal director, made the following comments about the latest revelations:

“The program described by the New York Times involves a breathtaking invasion of millions of people’s privacy.  The NSA has cast a massive dragnet over Americans’ international communications, collecting and monitoring all of them, and retaining some untold number of them in government databases.  This is precisely the kind of generalized spying that the Fourth Amendment was intended to prohibit.

“The government’s scrutiny of virtually every international email sent by Americans will have extraordinary consequences for free expression. Americans will inevitably hesitate to discuss controversial topics, visit politically sensitive websites, or interact with foreigners with dissenting views. By injecting the NSA into virtually every cross-border interaction, the U.S. government will forever alter what has always been an open exchange of ideas.

“There is no spying on Americans. We don’t have a domestic spying program,” is right up there with “I am not a crook” and “I did not have sex with that woman.”

NSA Handing Information to DEA and DOJ

The National Security Agency isn’t just looking to “keep us safe” from terrorists by collecting metadata, the NSA is sharing its information with the secretive Special Operations Division of the U.S. Drug Enforcement Administration (DEA) which is then passing that information to local authorities, covering up the NSA source.

U.S. directs agents to cover up program used to investigate Americans

by John Shiffman and Kristina Cooke, Reuters

A secretive US Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

It isn’t just the DEA that is doing this, the Justice Department is also receiving information about non-terrorist related criminal activity.

NSA handing over non-terror intelligence

by Stewart M. Powell, SFGate

The National Security Agency is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism.

This little-known byproduct of counterterrorism surveillance continues amid controversy over the NSA’s wide-ranging collection of domestic communications intelligence, including Americans’ telephone calling records and Internet use.

It is unclear whether the referrals have been built upon the content of telephone calls and emails. Administration officials have previously assured Congress that NSA surveillance focuses on so-called metadata and in the main does not delve into the content of individual calls or email messages.

Also, some in the legal community question the constitutionality of criminal prosecutions stemming from intelligence-agency eavesdropping.

Other Agencies Clamor for Data N.S.A. Compiles

by Eric Lichtblau and Michael S. Schmidt, The New York Times

The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

At emptywheel, bmaz points out this is nothing in the Reuter’s article on the SOD wasn’t already known, just no one has been paying attention:

First, the headline is misleading. The caption is:

   Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90′s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy” (pdf):

   In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas-the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

   The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

   The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

   Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

On this morning’s Democracy Now!, Guardian journalist Glenn Greenwald responded to a report by Reuters.



Transcript can be read here.

“It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained,” Greenwald says.

Wyden: FISA Court is an Anachronism

Before last week’s vote on the Amash/Conyer Amendment, that would have stripped financing for the NSA program of unfettered surveillance, the American people were already shifting in how they viewed these programs. Over the weekend Pew conducted another poll showing that the shift is even more stark.

“Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person’s civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004.”

Major opinion shifts, in the US and Congress, on NSA surveillance and privacy

by Glenn Greenwald, The Guardian

Pew finds that, for the first time since 9/11, Americans are now more worried about civil liberties abuses than terrorism

Perhaps more amazingly still, this shift has infected the US Congress. Following up on last week’s momentous House vote – in which 55% of Democrats and 45% of Republicans defied the White House and their own leadership to vote for the Amash/Conyers amendment to ban the NSA’s bulk phone records collection program – the New York Times has an article this morning which it summarizes on its front page this way:

Congress Against NSA Xurveillance photo nyt1_zps2e4cb29e.png

Click on image to enlarge

The article describes how opposition to the NSA, which the paper says was recently confined to the Congressional “fringes”, has now “built a momentum that even critics say may be unstoppable, drawing support from Republican and Democratic leaders, attracting moderates in both parties and pulling in some of the most respected voices on national security in the House.” [..]

The strategy for the NSA and its Washington defenders for managing these changes is now clear: advocate their own largely meaningless reform to placate this growing sentiment while doing nothing to actually rein in the NSA’s power. “Backers of sweeping surveillance powers now say they recognize that changes are likely, and they are taking steps to make sure they maintain control over the extent of any revisions,” says the NYT.

The primary problem enabling out-of-control NSA spying has long been the Intelligence Committees in both houses of Congress. That’s an ironic twist given that those were the committees created in the wake of the mid-1970s Church Committee to provide rigorous oversight, as a response to the recognition that Executive Branch’s surveillance powers were being radically abused – and would inevitably be abused in the future – without robust transparency and accountability. [..]

The largest changes toward demanding civil liberties protections have occurred among liberal Democrats, Tea Party Republicans, independents and liberal/moderate Republicans. Only self-identified “moderate/conservative Democrats” – the Obama base – remains steadfast and steady in defense of NSA surveillance. The least divided, most-pro-NSA caucus in the House for last week’s vote was the corporatist Blue Dog Democrat caucus, which overwhelmingly voted to protect the NSA’s bulk spying on Americans.

As I’ve repeatedly said, the only ones defending the NSA at this point are the party loyalists and institutional authoritarians in both parties. That’s enough for the moment to control Washington outcomes – as epitomized by the unholy trinity that saved the NSA in the House last week: Pelosi, John Bohener and the Obama White House – but it is clearly not enough to stem the rapidly changing tide of public opinion.

On Sunday, Sen. Ron Wyden (D-OR), one of the harshest critics of the NSA and the FISA court, was a guest on C-Span’s Newsmankers. He called the FISA court “anachronistic” and stated that he is most likely to support overhaul of the secretive court. He was particularly alarmed by the way that the Patriot Act was being interpreted by the federal government in its fight against terrorism.

Microsoft a More Than Willing NSA Partner

Microsoft has previously admitted to cooperating with the NSA. New revelations reveal that it is far worse than was previously disclosed giving the NSA up-to-date access to its customer data whenever the company changes its encryption and related software technology. Microsoft helped the security agency find ways to circumvent its encryption on its Outlook.com portal’s encrypted Web chat function, and the agency was given what is described as “pre-encryption stage” access to e-mail on Outlook, including Hotmail e-mail.

How Microsoft handed the NSA access to encrypted messages

by Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe, The Guardian, Thursday 11 July 2013

• Secret files show scale of Silicon Valley co-operation on Prism

• Outlook.com encryption unlocked even before official launch

• Skype worked to enable Prism collection of video calls

• Company says it is legally compelled to comply

The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

The documents show that:

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

While Microsoft claimed it had no choice but to cooperate arguing that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”. Emptywheel proprietress, Marcy Wheeler is interested in some of the details about the cooperation:

For example, the story describes that this cooperation takes place through the Special Source Operations unit.

   The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.

But we saw that when NSA approached (presumably) Microsoft in 2002, it did not approach via SSO; it used a more formal approach through counsel.

In addition, note how Skype increased cooperation in the months before Microsoft purchased it for what was then considered a hugely inflated price, and what is now being called (in other legal jurisdictions) so dominant that it doesn’t have to cooperate with others.

   One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.

   Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.

   According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.

   The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”

While this isn’t as obvious as Verizon’s MCI purchase – which for the first time led that carrier to hand over Internet data – it does seem that those companies that cooperate with the NSA end up taking over their rivals.

The Guardian article includes a statement from Microsoft and a joint statement by Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA.

In his New York Times article, James Risen reports that some Silicon Valley companies fearing negative public response have begun to openly push back against the security agency:

Yahoo, for example, is now asking the Foreign Intelligence Surveillance Court, the secret court that rules on data collection requests by the government, to allow it to make public the record of its 2008 challenge to the constitutionality of the law requiring it to provide its customer data to the agency.

A Yahoo spokeswoman said Thursday that the company was “seeking permission from the FISA court to unseal the arguments and orders from the 2008 case.”

Risen also reported that Sen. Ron Wyden (D-OR) believes that the White House is considering scaling back data collection over concerns about privacy issues and public backlash against the security agency’s large-scale collection of the personal data:

“I have a feeling that the administration is getting concerned about the bulk phone records collection, and that they are thinking about whether to move administratively to stop it,” he said. He added he believed that the continuing controversy prompted by Mr. Snowden had changed the political calculus in Congress over the balance between security and civil liberties, which has been heavily weighted toward security since the Sept. 11 terrorist attacks.

“I think we are making a comeback,” Mr. Wyden said, referring to privacy and civil liberties advocates.

The Most Powerful Man You Never Heard Of

Meet the most powerful man you’ve never heard of until recently, Gen. Keith B. Alexander,  Director of the National Security Agency (DIRNSA)and Chief of the Central Security Service (CHCSS) since August 1, 2005 and Commander of the United States Cyber Command since  May 21, 2010. He is a four star general in the United States Army and, according to Wikipedia, plans to retire in 2014, which may not be soon enough for some. Did I mention that he is also a proven liar? So, when he says, as he did, without any evidence, before the House Permanent Select Committee on Intelligence, that 50 terrorist attack were thwarted by the contested programs of the NSA take it with a large grain of salt.

Chris Hayes, host of MSNBC’s “All In,” looks at Gen. Alexander’s tenure over the NSA with James Bamford and explains why he may be the most powerful man in Washington that you have yet to hear of.

Transcript can be read here

“We jokingly referred to him as Emperor Alexander, because whatever Keith wants, Keith gets.”

The Secret War

by James Bradford, Wired

Infiltration, sabotage, mayhem, for years, four star general Keith Alexander has been building a secret army capable of launching devastating cyberattacks. Now it;s rady to unleash hell.

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings-the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

NSA Whistleblower Comes Out of the Shadows

Despite the risks to his personal safety, the whistleblower who leaked the FISA court order and NSA surveillance programs to The Guardian has revealed himself. Prior to giving the tapes to columnist Glenn Greenwald, the 29 year old Edward Snowden chose to leave the US for Hong Kong because of it long history of respect for freedom of speech. Like six other whistleblowers, he expects that he will be charged by the Obama administration under the 1917 Espionage Act. In the 12 minute video that was produced and copyrighted* by American documentary film director and producer, Laura Poitras, he explains his decision to give the secret warrant and programs to Greenwald and leave the United States.

Edward Snowden: the whistleblower behind the NSA surveillance revelations

by Glenn Greenwald, Ewen MacAskill and Laura Poitras, The Guardian

The 29-year-old source behind the biggest intelligence leak in the NSA’s history explains his motives, his uncertain future and why he never intended on hiding in the shadows

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.

Snowden will go down in history as one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world’s most secretive organisations – the NSA.

Load more