Tag: Civil Liberties

The Ayes Have It, The NSA Went Too Far

President Obama’s panel of security and civil liberties experts finished their work giving their recommendations to the president last Friday. The report was released to the public Tuesday. Much to the surprise of the war on terror hawks, it slammed the mass surveillance programs vindicating what critics have been saying since Edward Snowden’s revelations.

A presidential advisory panel has recommended sweeping limits on the government’s surveillance programs, including requiring a court to sign off on individual searches of phone records and stripping the National Security Agency of its ability to store that data from Americans. [..]

The recommendations include tightening federal law enforcement’s use of so-called national security letters, which give the government sweeping authority to demand financial and phone records without prior court approval in national security cases. The task force recommended that authorities should be required to obtain a prior “judicial finding” showing “reasonable grounds” that the information sought is relevant to terrorism or other intelligence activities.

In addition, the panel proposed terminating the NSA’s ability to store telephone data and instead require it to be held by the phone companies or a third party. Access to the data would then be permitted only through an order from a Foreign Intelligence Surveillance Court.

The panel called for more independent review of what the NSA collects and the process by which it goes about gathering data.

Amid an international furor over NSA spying on the leaders of allied nations such as Germany, the review group recommended that the president personally approve all sensitive methods used by the intelligence community.

President’s Review Group on Intelligence  and Communications Technologies Report On NSA

Marcy Wheeler, at emptywheel, has been pouring over the report and has pulled out what she thinks is pertinent here, here and here.

In a re-published article by Kara Brandeisky of ProPublica, that she wrote for Techdirt back in August, the folks there note that the surveillance reforms the Pres. Obama supported before he was president are remarkably similar to the Task Force’s proposals:

As a senator, Obama wanted to limit bulk records collection.

Obama co-sponsored a 2007 bill, introduced by Sen. Russ Feingold, D-Wis., that would have required the government to demonstrate, with “specific and articulable facts,” that it wanted records related to “a suspected agent of a foreign power” or the records of people with one degree of separation from a suspect. The bill died in committee. Following pressure from the Bush administration, lawmakers had abandoned a similar 2005 measure, which Obama also supported. [..]

As a senator, Obama wanted to require government analysts to get court approval before accessing incidentally collected American data.

In Feb. 2008, Obama co-sponsored an amendment, also introduced by Feingold, which would have further limited the ability of the government to collect any communications to or from people residing in the U.S.

The measure would have also required government analysts to segregate all incidentally collected American communications. If analysts wanted to access those communications, they would have needed to apply for individualized surveillance court approval.

The amendment pfailed 35-63 http://thomas.loc.gov/cgi-bin/… Obama later reversed his position and supported what became the law now known to authorize the PRISM program. That legislation – the FISA Amendments Act of 2008 – also granted immunity to telecoms that had cooperated with the government on surveillance. [..]

As a senator, Obama wanted the executive branch to report to Congress how many American communications had been swept up during surveillance.

Feingold’s 2008 amendment, which Obama supported, would have also required the Defense Department and Justice Department to complete a joint audit of all incidentally collected American communications and provide the report to congressional intelligence committees. The amendment failed 35-63. [..]

The White House has already made it clear that the recommendations are just that and has already said it will not separate the US Cyber Command from the NSA. So basically, as Charles Pierce pointedly put it, “the White House can tell the committee to pound sand.”

And, even if it doesn’t, there is no reason on god’s earth why anyone should believe that the NSA actually would abide by any agreement going forward. The all-too-human, but curiously error-prone heroes of our intelligence community, imbued as they are with a mission mindset that is perilously close to messianic, can be presumed eventually to breach by unfortunate accident almost any new protocol put in place. (And that’s not even to mingle with the wilder fauna in the jungle.)

At Democracy Now!, Amy Goodman and Juan González discuss the panel recommendations with Kirk Wiebe, a retired National Security Agency official who worked there for over 32 years, and Ben Wizner, Edward Snowden’s legal adviser and director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union.



Transcript can be read here



Transcript can be read here

Let the conversation continue.

NSA: “Electronic Omnivore”

“Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search.”

   –Keith B. Alexander, September 2013

Inside the “Electronic Omnivore”: New Leaks Show NSA Spying on U.N., Climate Summit, Text Messaging

The New York Times has revealed new details about how the National Security Agency is spying on targets ranging from the United Nations to foreign governments to global text messages. We are joined by New York Times reporter Scott Shane, who reports that the NSA has emerged “as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations.” The Times article reveals how the NSA intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama in April and mounted a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. The Times also reveals the existence of an NSA database called Dishfire that “stores years of text messages from around the world, just in case.” Another NSA program called Tracfin “accumulates gigabytes of credit card purchases.”



Transcript can be read here

As U.S. Weighs Spying Changes, Officials Say Data Sweeps Must Continue

by David E. Sanger, The New York Times

The Obama administration has told allies and lawmakers it is considering reining in a variety of National Security Agency practices overseas, including holding White House reviews of the world leaders the agency is monitoring, forging a new accord with Germany for a closer intelligence relationship and minimizing collection on some foreigners.

But for now, President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of “metadata,” including records of all telephone calls made inside the United States.

Instead, the administration has hinted it may hold that information for only three years instead of five while it seeks new technologies that would permit it to search the records of telephone and Internet companies, rather than collect the data in bulk in government computers. Gen. Keith B. Alexander, the director of the N.S.A., has told industry officials that developing the new technology would take at least three years.

NSA official cites ‘stop and frisk’ in effort to explain searches of phone records

by Ali Watkins, McClatchy Washington Bureau

The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.

“It’s effectively the same standard as stop-and-frisk,” Rajesh De said in an attempt to explain the evidentiary use of “reasonable and articulable suspicion” to identify which phone numbers to target from the agency’s huge database of stored cellphone records.

De made the comment during a rare hearing of an obscure government body, the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations but which until Monday had never held a substantive hearing. [..]

The comparison was the latest in questionable analogies that intelligence officials have used in an effort to explain the agency’s metadata collection programs since former defense contractor Edward Snowden revealed their existence in June.

Intelligence officials, for example, have said repeatedly that the collection of hundreds of millions of phone records allows them to build a haystack in which to find a needle, apparently missing the irony that “finding a needle in a haystack” is an expression meant to convey that a task is all but impossible.

NSA’s Path to Totalitarianism

by Norman Pollack, Counterpunch

The New York Times, a recipient, along with the Guardian, of Snowden’s disclosures about the illegal activities of Obama and USG, is breaking out, as now, of its reticence about the nation’s profound disregard of constitutional principles AND its related policies of global hegemony at all costs-here Scott Shane’s lengthy article (3 Nov.), “No Morsel Too Miniscule for All-Consuming N.S.A.”  NSA to all intents and purposes appears as a “rogue” organization, extremism in the putative service of liberty, except that the designation is a way of distracting attention, and removing accountability, from its authorization and mission at the highest levels-call it, licensed roguery, official (with Obama’s eyes supposedly averted).  Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical  with Fortress America, the National-Security State.

Eavesdropping on foreign leaders speaks to an arrogance of power, in which the US claims for itself every right, unilaterally, to script both sides of the foreign dialogue as well as micromanage to its own advantage the rhythm and content of global events, from regional trade partnerships to the use of military force in shoring up alliance systems against a host of enemies, some terrorist groups to be sure, but, using that as pretext, mounting counterrevolution globally against alternative modes, notably, socialist, of modernization: autonomous national and/or radical aspirations seeking distance from US market penetration, the tarnished necklace of its worldwide military bases and CIA stations, and not least, the ideological saturation (assisted by IMF and World Bank applications of pressure) of market fundamentalism, the property right, unrestricted capital flows, and the honor of serving American industry with the lowest possible labor costs, as meanwhile we see the financialization of capitalism here and the gutting of the manufacturing base.

Eavesdropping, of course, is the polite term for control freak, which translates, in the realm of power politics, into societal desperation to employ any and all means for staying on top, cyber-strategies of disruption as well as information-gathering, campaigns of disinformation, CIA-JSOC paramilitary programs of regime change, and, upping the ante, as here, learning every move in advance of foreign leaders, the better-take no chances, take no prisoners-to orchestrate world politics in our favor.

US Spying: “An Institutional Obsession”

Former constitutional lawyer and columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald joined Democracy Now!‘s Amy Goodman to discuss how US spying in out allies has become an institutionalized obsession with surveillance.

The spat over U.S. spying on Germany grew over the weekend following reports the National Security Agency has monitored the phone calls of Chancellor Angela Merkel since as early as 2002, before she even came to office. The NSA also spied on Merkel’s predecessor, Gerhard Schroeder, after he refused to support the Iraq War. NSA staffers working out of the U.S. embassy in Berlin reportedly sent their findings directly to the White House. The German tabloid Bild also reports President Obama was made aware of Merkel’s phone tap in 2010, contradicting his apparent claim to her last week that he would have stopped the spying had he known. In another new disclosure, the Spanish newspaper El Mundo reports today the NSA tracked some 60 million calls in Spain over the course of a month last year. A delegation of German and French lawmakers are now in Washington to press for answers on the allegations of U.S. spying in their home countries.

Jay Ackroyd at Eschaton thought this part of the lengthy interview deserved to be highlighted:

    So, for the top national security official in the United States to go to the Senate and lie to their faces and deny that the NSA is doing exactly that which our reporting proved that the NSA was in fact doing is plainly a crime, and of course he should be prosecuted, and would be prosecuted if we lived under anything resembling the rule of law, where everybody is held and treated equally under the law, regardless of position or prestige. Of course, we don’t have that kind of system, which is why no Wall Street executives have been prosecuted, no top-level Bush officials were prosecuted for torture or warrantless eavesdropping, and why James Clapper hasn’t been prosecuted despite telling an overt lie to Congress. And what’s even more amazing, though, Amy, is that not only has James Clapper not been prosecuted, he hasn’t even lost his job. He’s still the director of national intelligence many months after his lie was revealed, because there is no accountability for the top-level people in Washington.

   And the final thing to say about that is, there’s all kinds of American journalists who love to go on television and accuse Edward Snowden of committing all these grave and horrible crimes. They’re so brave when it comes to declaring Edward Snowden to be a criminal and calling for [inaudible]. Not one of them has ever gone on television and said, “James Clapper committed crimes, and he ought to be prosecuted.” The question that you just asked journalistically is such an important and obvious one, yet not-none of the David Gregorys or Jeffrey Toobins or all these American journalists who fancy themselves as aggressive, tough reporters, would ever dare utter the idea that James Clapper ought to be arrested or prosecuted for the crimes that he committed, because they’re there to serve those interests and not to challenge or be adversarial to them.

Jay also pointed out e-mail exchange between Glenn and Bill Keller, the former executive editor of The New York Times, in an op-ed by Keller.

Is Glenn Greenwald the Future of News?

by Bill Keller

Much of the speculation about the future of news focuses on the business model: How will we generate the revenues to pay the people who gather and disseminate the news? But the disruptive power of the Internet raises other profound questions about what journalism is becoming, about its essential character and values. This week’s column is a conversation – a (mostly) civil argument – between two very different views of how journalism fulfills its mission.

Glenn Greenwald broke what is probably the year’s biggest news story, Edward Snowden’s revelations of the vast surveillance apparatus constructed by the National Security Agency. He has also been an outspoken critic of the kind of journalism practiced at places like The New York Times, and an advocate of a more activist, more partisan kind of journalism. Earlier this month he announced he was joining a new journalistic venture, backed by eBay billionaire Pierre Omidyar, who has promised to invest $250 million and to “throw out all the old rules.” I invited Greenwald to join me in an online exchange about what, exactly, that means.

It’s long but worth the read.  

The NSA: Bigger Is Not Better

In the case of the NSA’s scooping up and storing all that private data, they ran into a glitch, too much information makes the job of surveillance harder

The volume of NSA contacts collection is so high that it has occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with “emergency detasking” orders. Three NSA documents describe short-term efforts to build an “across-the-board technology throttle for truly heinous data” and longer-term efforts to filter out information that the NSA does not need.

Spam has proven to be a significant problem for NSA – clogging databases with data that holds no foreign intelligence value. The majority of all e-mails, one NSA document says, “are SPAM from ‘fake’ addresses and never ‘delivered’ to targets.”

In fall 2011, according to an NSA presentation, the Yahoo account of an Iranian target was “hacked by an unknown actor,” who used it to send spam. The Iranian had “a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members.”

The cascading effects of repeated spam messages, compounded by the automatic addition of the Iranian’s contacts to other people’s address books, led to a massive spike in the volume of traffic collected by the Australian intelligence service on the NSA’s behalf.

After nine days of data-bombing, the Iranian’s contact book and contact books for several people within it were “emergency detasked.”

LOL. The NSA has a spam problem.

Meanwhile, the head of the NSA, Gen. Keith Alexander has had to admit to the Senate Intelligence Committee that he lied back in June about those 54 terrorists plots he claimed were “thwarted” by the agency’s phone surveillance program.

Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection.

Leahy was not happy. “We’re told we have to (conduct mass phone surveillance) to protect us, and the statistics are rolled out that they’re not accurate,” he said. “It doesn’t have the credibility here in the Congress, it doesn’t have the credibility with this chairman and it doesn’t have the credibility with the country.”

Over at the Wall Street Journal, in an op-ed behind a paywall, the committee chair, Sen Dianne Feinstein trotted out the old “9/11 be very afraid” canard and repeated the debunked Alexander lie.

Consider the case of 9/11 hijacker Khalid al-Mihdhar, who was being watched by the CIA while he was in Malaysia. U.S. intelligence agencies failed to connect the dots before the attack to recognize that al-Mihdhar had flown with (future) hijacker Nawaf al-Hazmi to Los Angeles in January 2000.

Intelligence officials knew about an al Qaeda safe house in Yemen with ties to al-Mihdhar as well as the safe house’s telephone number, but they had no way of knowing if anyone inside the U.S. was in contact with that phone number in Yemen. Only after 9/11 did we learn that al-Mihdhar, while living in San Diego, had called the safe house. [..]

Working in combination, the call-records database and other NSA programs have aided efforts by U.S. intelligence agencies to disrupt terrorism in the U.S. approximately a dozen times in recent years, according to the NSA. This summer, the agency disclosed that 54 terrorist events have been interrupted-including plots stopped and arrests made for support to terrorism. Thirteen events were in the U.S. homeland and nine involved U.S. persons or facilities overseas. Twenty-five were in Europe, five in Africa and 11 in Asia.

Can everyone say say Richard Clark.

At Techdirt, Mike Masnick points out none of what Sen. Feinstein said is true:

First off, as has been explained over and over again, the intelligence community already had certain tools in place to discover such phone calls. The problem wasn’t that they didn’t have the information — they did. It was that they failed to “connect the dots.” In other words, they had too much information which obscured the important information they needed. [..]

Note the all important “and other NSA programs” language here. Also the use of “terrorist events” not plots. And, remember, those “thirteen events… in the U.S. homeland,” have since been whittled down to only one that actually relied on the call records program that she’s defending — and that wasn’t a terrorist plot but a cab driver in San Diego sending some cash to a Somali group judged to be a terrorist organization.

So, we have elected representatives and high paid appointees blatantly lying and getting away with it to protect their turf with no one is holding them accountable,

Sam Adams Award

In Russia, NSA whistleblower Edward Snowden appeared in public for the first time since he was grated asylum by the Russian government. He met with other whistleblowers and activists to receive the Sam Adams Award for Integrity in Intelligence.

RT News interviewed whistleblowers and activists Jesselyn Radack, Thomas Andrews Drake, Ray McGovern and Coleen Rowley in their studio after the award was presented.

Let the Debate Continue

The Work of a Generation

NSA whistleblower Edward Snowden’s words were entered as testimony at the European Parliament’s Civil Liberties Committee in Brussels on Monday.

Jesselyn Radack of the US Government Accountability Project (GAP) and a former whistleblower and ethics adviser to the US Department of Justice, read Snowden’s statement into the record.



This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Transcript can be read here.

The First Thing We Do, Fire All the Liars

In Shakespeare’s “Henry VI,” the character Dick the Butcher, a follower of the rebel Jack Cade, uttered the words, “The first thing we do, let’s kill all the lawyers.” If taken in the context of the play, the line, intended as a comedic aside, was actually a compliment to those lawyers who upheld the laws and protected society. Those words have taken on different meaning over the years and are now often used in reference to those lawyers who have twisted the laws to protect the corrupt and dishonest and, often as not, defend illegal wars and torture, as well as, circumvent the US Constitution. It has often been rephrased, as the title of this article, to fit a narrative, as in the case of “reforming” the NSA, “the first thing we do, is fire all the liars.

Leading First Amendment lawyer, James Goodale, is the former general council to the New York Times and was the driving force behind the NYT‘s decision to publish the Pentagon Papers in 1971. He was instrumental in the winning strategy that resulted in the 6 – 3 Supreme Court ruling that the US government could not stop the Times from publishing the documents. In his opinion piece at The Guardian on the proposed reforming of the NSA, Prof. Goodale noted that President Barack Obama’s first concern should be to fire all the liars, starting with the Director of National Intelligence, James R Clapper and  General Keith Alexander, director of the National Security Agency, among others who have both blatantly lied to Congress.

NSA lawyers lied to secret Fisa court Judges John D Bates and Reggie B Walton. In recently released opinions, Bates said he had been lied to on three separate occasions and Walton said he had been lied to several times also.

But Clapper and Alexander have not been held in contempt of Congress. Nor have the Justice Department attorneys, who lied to Judges Walton and Bates, been disciplined. Part of the answer as to why this is so came out last week.

The Justice Department told USA Today that it had no intention of investigating the attorneys who lied to those judges. In the ordinary course, the Justice Department’s office of professional responsibility investigates the behavior of lawyers who have been subject to accusations such as those made by Judges Bates and Walton.

(emphasis mine)

You read that correctly, the Obama DOJ has no intention of investigating the attorneys who lied to Judges Bates and Walton

The Justice Department’s Office of Professional Responsibility routinely probes judges’ allegations that the department’s lawyers may have violated ethics rules that prohibit attorneys from misleading courts. Still, OPR said in response to a Freedom of Information Act request by USA TODAY that it had no record of ever having investigated – or even being made aware of – the scathing and, at the time, classified, critiques from the Foreign Intelligence Surveillance Court between 2009 and 2011.

Prof. Goodall also calls Pres. Obama’s statement in his August 9, 2013 address on the NSA that he would appoint experts to examine NSA practices, “reasonable” but points out that it doesn’t appear to be going anywhere:

Robert Atkinson, the president of the Information Technology and Innovation Foundation and an attendee, told the Guardian the he “did not hear much discussion” of changes to the bulk surveillance activities.

“My fear is it’s a simulacrum of meaningful reform,” said Sascha Meinrath, a vice president of the New America Foundation, an influential Washington think tank, and the director of the Open Technology Institute, who also attended. “Its function is to bleed off pressure, without getting to the meaningful reform.”

It’s pretty predictable that there will be no meaningful reform coming from a committee comprised of intelligence insiders, former White House officials and Obama advisers.

Michael Morell, a former deputy CIA director, is a member, as is Richard Clarke, a White House counter-terrorism aide to three presidents. Cass Sunstein, a former White House regulatory staffer who is married to the new US ambassador to the United Nations; Geoffrey Stone, a University of Chicago law professor; and Peter Swire, a Georgia Tech professor and former aide to Obama and Bill Clinton, round out the panel.

Over at emptywheel, Marcy Wheeler pointed out a detail that Prof. Goodale missed:

In just its third open hearing this year, the Senate Intelligence Committee has arranged the following witnesses for tomorrow’s hearing on NSA’s spying.

   Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.) today announced the committee will hold an open hearing to consider legislative changes to the Foreign Intelligence Surveillance Act, to include the NSA call records program, on Thursday, September 26, at 2 p.m.

   WHAT:  Public hearing on FISA, NSA call records

   WHO:

   Panel I

       Director of National Intelligence James Clapper

       National Security AgencyDirector General Keith Alexander

       Deputy Attorney General James Cole

   Panel II

       Ben Wittes, Brookings Institution

       Tim Edgar, Watson Institute for International Studies, Brown University

So DiFi’s idea of an “open hearing” is to invite two established liars. And for her non-governmental witnesses, one keeps declaring Congress NAKED! in the face of evidence the government lies to them, and the other tells fanciful stories about how much data NSA shares.

It’s like DiFi goes out of her way to find liars and their apologists to testify publicly. [..]

It’s DiFi’s committee. And if she wants every single open hearing to serve as a platform for accomplished liars, I guess that’s her prerogative.

But observers should be clear that’s the purpose of the hearings.

As Prof Goodale concludes, the culture of lying to the public and courts by the US intelligence community is nothing new but it lies with President Obama to force the NSA to change. The best place for that change would be to fire the liars, Clapper and Alexander. So far, it appears the president is not much interested in that solution.

NSA and GCHQ Make Internet Privacy

In a joint report by The Guardian, the New York Times, and ProPublica, courtesy of the documents leaked by Edward Snowden, it was revealed how the NSA and British GCHQ broke encryption to unlock unlock encryption used to protect emails, banking and medical records. The detailed article describes how the program, called “Bulrun,” foils the safeguards of our internet privacy:

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

A cryptographer and research professor at Johns Hopkins University, Michael Green summerizes some of the “bad things” that the NSA and GCHQ have been doing with the joint cost of $250 million per year:

   (1.) Tampering with national standards (NIST is specifically mentioned) to promote weak, or otherwise vulnerable cryptography.

   (2.) Influencing standards committees to weaken protocols.

   (3.) Working with hardware and software vendors to weaken encryption and random number generators.

   (4.) Attacking the encryption used by ‘the next generation of 4G phones‘.

   (5.) Obtaining cleartext access to ‘a major internet peer-to-peer voice and text communications system’ (Skype?)

   (6.) Identifying and cracking vulnerable keys.

   (7.) Establishing a Human Intelligence division to infiltrate the global telecommunications industry.

   (8.) And worst of all (to me): somehow decrypting SSL connections.

Columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald discussed this latest revelation with Amy Goodman and Juan González of DemocracyNow!.



Transcript can be read here

“It’s what lets you enter your credit card number, check your banking records, buy and sell things online, get your medical tests online, engage in private communications. It’s what protects the sanctity of the Internet.” [..]

“The entire system is now being compromised by the NSA and their British counterpart, the GCHQ,” Greenwald says. “Systematic efforts to ensure that there is no form of human commerce, human electronic communication, that is ever invulnerable to their prying eyes.”

Security technologist and a fellow at the Berkman Center for Internet and Society at Harvard Law School, Bruce Schneiner said, in an article at The Guardian, that the public has been betrayed by the US government and that the NSA has undermined the social contract with the public. He proposes that since it was engineers who built the internet, it is time that they “fix it”.

One, we should expose. If you do not have a security clearance, and if you have not received a National Security Letter, you are not bound by a federal confidentially requirements or a gag order. If you have been contacted by the NSA to subvert a product or protocol, you need to come forward with your story. Your employer obligations don’t cover illegal or unethical activity. If you work with classified data and are truly brave, expose what you know. We need whistleblowers. [..]

Two, we can design. We need to figure out how to re-engineer the internet to prevent this kind of wholesale spying. We need new techniques to prevent communications intermediaries from leaking private information.

We can make surveillance expensive again. In particular, we need open protocols, open implementations, open systems – these will be harder for the NSA to subvert.

Prof. Schneiner also offers a guide to staying secure and gives five piece of advice:

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you’re much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

These are some of the programs he has been using: GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit and Password Safe. He also advises the use of a Linux operating system.

Obama Defends NSA Surveillance on the Way to the G-20

During his stop over in Stockholm, Sweden on the way to the G-20, President Barack Obama renewed his defense of unfettered surveillance

“I can give assurances to the publics in Europe and around the world that we’re not going around snooping at people’s emails or listening to their phone calls,” Obama said in response to a Swedish reporter’s question during a news conference with Prime Minister Fredrik Reinfeldt as he began a whirlwind, 24-hour trip to Sweden. “What we try to do is to target very specifically areas of concern.”

Still, the president acknowledged that questions about privacy were likely to trail him in Europe – a continent that is protective of privacy rights – for some time. The issue also bubbled up during his trip to Germany in June, shortly after newspapers published reports based on documents leaked by former government contractor Edward Snowden.

Despite Obama’s assertions of a more narrow-scope effort, the Snowden-leaked documents show the NSA collects and stores all kinds of data traveling through the Internet, including emails, video chats and instant messages. Under one such classified program, known as Prism, the government can obtain secret court orders and gather mass amounts of data from major Internet companies such as Google, Apple, Microsoft and Facebook.

The ACLU is challenging the constitutionality of the intelligence agency’s action filing a complaint in the Southern District of New York against James Clapper in June. An up date on that lawsuit was posted today on their web site. (please note that the link contains an interesting but really annoying gif).

An impressive array of organizations and individuals filed amicus briefs yesterday in support of the ACLU’s constitutional challenge to the government’s collection of the call records of virtually everyone in the United States. The range of voices joining the protest against mass government surveillance-not to mention the bipartisan storm that has swept Congress since the recent NSA disclosures – is a real testament to the fact that the government’s dragnet surveillance practices are offensive to Americans from across the political spectrum.

Among the groups supporting our lawsuit are the National Rifle Association, the Reporters Committee for Freedom of the Press, and the PEN American Center. Philosophy Professor Michael Lynch submitted a brief arguing that privacy is fundamental to human dignity. Our friends at the Electronic Frontier Foundation submitted a brief on behalf of Rep. Jim Sensenbrenner (R-Wis.), one of the authors of the Patriot Act. Rep. Sensenbrenner has decried the now-public call-records program as outside the scope of the law he authored.

Yes, you’re reading that right, the NRA and Rep. Sensenbrenner.

NSA surveillance: National Rifle Association backs ACLU challenge

by Ewen MacAskill, The Guardian

Anger at US government’s data trawling creates unlikely alliance in court between NRA and American Civil Liberties Union

The NRA, in an amicus brief in support of the ACLU, argues that the mass surveillance programme provides “the government not only with the means of identifying members and others who communicate with the NRA and other advocacy groups, but also with the means of identifying gun owners without their knowledge or consent”.

EFF Files Brief on Behalf of Rep. Sensenbrenner in NSA Spying Case

Press release from Electronic Freedom Foundation

Original Patriot Act Author Says Call-Data Collection Exceeds Congressional Intent

San Francisco – The Electronic Frontier Foundation (EFF) today filed a brief on behalf of Rep. Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, in a case brought by the American Civil Liberties Union (ACLU) against the National Security Agency (NSA). In the brief, Sensenbrenner argues that Congress never intended the Patriot Act to permit the NSA’s collection of the records of every telephone call made to, from and within the United States. Sensenbrenner urges the court to deny the NSA’s motion to dismiss and grant the ACLU’s motion for a preliminary injunction, which would halt the program until the case is decided.

In another development today, hundreds of pages from NSA spying documents are to be released in response to an FOIA request by EFF:

In a major victory in one of EFF’s Freedom of Information Act (FOIA) lawsuits, the Justice Department conceded yesterday that it will release hundreds of pages of documents, including FISA court opinions, related to the government’s secret interpretation of Section 215 of the Patriot Act, the law the NSA has relied upon for years to mass collect the phone records of millions of innocent Americans. [..]

While the government finally released a white paper detailing its expansive (and unconstitutional) interpretation of Section 215 last month, more important FISA court opinions adopting at least part of that interpretation have remained secret. The results of EFF’s FOIA lawsuit will finally lift the veil on the dubious legal underpinnings of NSA’s domestic phone surveillance program.

This victory for EFF comes on the heels of another FOIA success two weeks ago, when the Justice Department was also forced to release a 2011 FISA court opinion ruling some NSA surveillance unconstitutional.

Now to that gif. It is visualization demonstrating the staggering scope of the NSA’s surveillance. Click on the image to view.

ACLU NRA photo blog-3hops-500x280-v01_zpsa00e2a91.jpg

Worse Than NSA: DEA Deal with AT&T

In the midst of the angst of the debate over Obama bombing Syria, a front page article in Monday’s New York Times has revealed a new surveillance scandal involving a little known deal between the Drug Enforcement Agency (DEA) and AT&T called the Hemisphere Project. That deal gives the DEA access to 26 years of its phone records:

Unlike the controversial call record accesses obtained by the NSA, the data is stored by AT&T, not the government, but officials can access individual’s phone records within an hour of an administrative subpoena.

AT&T receives payment from the government in order to sit its employees alongside drug units to aid with access to the data.

The AT&T database includes every phone call which passes through the carrier’s infrastructure, not just those made by AT&T customers.

Details of the program – which was marked as law enforcement sensitive, but not classified – were released in a series of slides to an activist, Drew Hendricks, in response to freedom of information requests, and then passed to reporters at the New York Times.

Officials were instructed to take elaborate steps to ensure the secrecy of the Hemisphere program, a task described as a “formidable challenge” in the slide deck, which detailed the steps agencies had taken to “try and keep the program under the radar”.

The NYT‘s national security reporter, Scott Shane joined Democracy Now!‘s Amy Goodman to discuss the Hemisphere Project and it’s impact.



The transcript for this segment was not available at this time.

Load more