Tag: surveillance

Obama Targets Another American for Assassination by Drone

On September 30, 2011, President Barack Obama authorized the assassination of Anwar al-Awlaki, a U.S. citizen by virtue of his birth in New Mexico in 1971, by an American drone in Yemen along with another U.S. citizen, Samir Khan, who grew up in New York City and Charlotte, North Carolina. Two weeks later, Awlaki’s 16-year-old son, Abdulrahman, was killed by another US strike in Yemen. Jude Kenan Mohammad, alleged to have at one stage been part of an eight-man terror cell in North Carolina, was killed by a US drone strike in Pakistan later in 2011. These assassinations made Barack Obama the first president known president to have authorized the assassination of a US citizen.

Now, as was reported by the Associated Press, Pres. Obama is trying to find a way to legally justify the assassination of another American citizen living in Pakistan. The target has been accused, without evidence, of plotting attacks against America with Al Qaeda:

The CIA drones watching him cannot strike, because he’s a US citizen and the Justice Department must build a case against him, a task it hasn’t completed.

Four US officials said the American suspected terrorist is in a country that refuses US military action on its soil and that has proved unable to go after him. And President Obama’s new policy says American suspected terrorists overseas can only be killed by the military, not the CIA, creating a policy conundrum for the White House. [..]

Under new guidelines Obama addressed in a speech last year to calm anger overseas at the extent of the US drone campaign, lethal force must only be used “to prevent or stop attacks against US persons, and even then, only when capture is not feasible and no other reasonable alternatives exist to address the threat effectively.” The target must also pose “a continuing, imminent threat to US persons” – the legal definition of catching someone in the act of plotting a lethal attack.

Co-founders of the new digital magazine Jeremy Scahill and Glenn Greenwald discuss the issue of another American being targeted for assassination with [Democracy Now! ]’s Amy Goodman.

While the Associated Press had agreed to keep the name and location of Pres. Obama’s latest target, his location was disclosed by the Los Angeles Times.

Why should we, as Americans, accept that the Executive Branch can act as judge, jury and executioner without a trial in a duly recognized court of law? Where is any evidence that this person is a threat or even doing what the Obama administration charges are his alleged crimes? At FDL Dissenter, Kevin Gosztola asks why should a news organization should conceal the target’s identity and location for an administration that has touted greater transparency:

Knowing where he is currently located would help one understand this story appropriately. So, in what country would certain officials like to be able to launch an attack? [..]

It seems reasonable to question this decision by the AP to not publish. The decision bears a distinct similarity to refusing to print that a secret drone base is located in a certain country when covering the issue of drones, which US media organizations have previously done.

If it is illegal to add the person to a list and the government cannot come up with a legal way to launch a US military attack because the country opposes it, why should a media organization play the role of not “interrupting” this “ongoing counterterror operation”?

Just how many alleged American members of al Qaeda are there? This report disseminated on the Internet could now aid an “enemy” in figuring out some details on the extent to which he is being tracked and monitored for assassination in order to stop him from launching more attacks on Americans overseas. So, it would seem if AP really wants to protect counterterror operations from “interruption” they would simply not publish the story at all.

The story was given to Associated Press reporter Kimberly Dozier by four anonymous “US officials,” who were not authorized to speak, and a “senior administration official” possibly from the Department of Justice may have political undertones. Marcy Wheeler suggested that the sources may have been congressional staffers since Dozier mentioned Rep. Mike Rogers (R-MI), the chair of the House Intelligence Committee, who is upset because Obama’s new guidelines would impede the assassination of another American.

Whatever the allegations are against this person, it does not legally justify the use of a drone to target an American in a sovereign country that we are not at war with or without due process. Breaking the law under the guise of protecting America from terrorist attack is not justifiable. Regardless of who is in the Oval Office, the US should be a nation of laws and respect the constitutional rights of its citizens.

Death by Metadata

In their premier article for the new online magazine, The Intercept, co-founders Jeremy Scahill and Glenn Greenwald take an in-depth look at how the NSA mass surveillance plays an intrinsic role in President Barack Obama’s assassination program. In the article they reveal how the NSA is providing information that targets, not an individual, but a nameless SIM cards that have led to the deaths of innocent civilians:

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. [..]

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device. [..]

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell – sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike. [..]

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

(emphasis mine)

Jeremy and Glenn joined Democracy Now!‘s Amy Goodman to discuss the NSA’s secret role in President Obama’s assassination program and, defying the threats, the launch of The Intercept.



Transcript can be read here



Transcript can be read here

Today We Fight Back

Today we take action to end the massive surveillance of the National Security Agency (NSA).

Today We Fight BAck photo 11484530_m_zpsa0cbe199.png

Click on image to participate

End NSA Massive Spying Programs

Dear Supporter,

We’ve told you about TODAY’s massive action against mass spying — and now it’s time to act.  We’re calling today The Day We Fight Back, and dozens of large organizations and websites and thousands of smaller ones are mobilizing their members and visitors to demand an end to broad suspicion-less surveillance.  

We announced it on the anniversary of the passing of Aaron Swartz, to honor him and to celebrate the victory over SOPA that he helped us achieve two years ago.

Today We Fight BAck photo 11484530_m_zpsa0cbe199.png

If all of the organizations and sites that have signed on to the cause press forward today, we should be able to drive tens of thousands of phone calls to lawmakers to demand that the NSA’s mass spying programs be reined in.

Will you place one of those calls?  It’ll only take 2 minutes, and we’ll make it easy for you by giving you a call script and connecting you to the right office.

Just click here to call your lawmakers.

Then, or if you can’t call, please click here to send an email to your lawmakers

We understand the United States to be a democracy, founded upon a Constitution that affords us critical rights, and governed by the rule of law.

Yet for years, the NSA has exploited secret legal interpretations to undermine our privacy rights — thus chilling speech and activism, and thereby threatening to subvert the very underpinnings of our democracy itself.

We are demanding that decision makers remedy this by:

  * Passing the USA FREEDOM Act, which would end the bulk collection of Americans’ phone records and institute other key reforms.

  * Defeating the so-called FISA Improvements Act, which would entrench — and potentially expand — the spying.

  * Creating additional privacy protections for non-Americans.

  * Ending the NSA’s subversion of encryption and other data security measures.

And we’re not even that far from winning on at least one key front:

The USA FREEDOM Act has more than 100 bipartisan sponsors, including two powerful lead sponsors: Chairman of the Senate Judiciary Committee Patrick Leahy (D-VT) and Representative James Sensenbrenner (R-WI), who was the original author of the PATRIOT Act and is furious that it has been abused to spy on Americans en masse.

This summer an amendment that’s very similar to parts of the USA FREEDOM Act failed to pass in the House of Representatives by just a handful of votes. Enough lawmakers now say they would have voted in support that it would pass if it came up for a vote today.

Now we need to force a vote on the issue in the House, and a first vote on it in the Senate — and we’ll do that by putting pressure on lawmakers by calling and emailing them today.  Tens of thousands of people are poised to join the cause: Please be one of them.

Just click here to call your lawmakers.

Then, or if you can’t call, please click here to send an email to your lawmakers

We’re going to persist in this fight, and we will win it.

In Solidarity,

Tim Carpenter

PDA National Director

We are in this fight together. It is time to act and end the massive surveillance of the NSA. Do it for yourself, for the future and to remember Aaron.

Today We Fight BAck photo 11484530_m_zpsa0cbe199.png

Just click here to call your lawmakers.

Then, or if you can’t call, please click here to send an email to your lawmakers

Snowden Answers Questions

Yesterday afternoon NSA whistleblower Edward Snowden answered questions in s candid on line chat. He responded not only to questions about what he believes should be done about the massive NSA surveillance programs and the threats to his life but countered some of the spurious accusations that he acted in concert with the Russians and stole his co-workers passwords.

@mperkel #ASKSNOWDEN They say it’s a balance of privacy and safety. I think spying makes us less safe. do you agree?

Intelligence agencies do have a role to play, and the people at the working level at the NSA, CIA, or any other member of the IC are not out to get you. They’re good people trying to do the right thing, and I can tell you from personal experience that they were worried about the same things I was.

The people you need to watch out for are the unaccountable senior officials authorizing these unconstitutional programs, and unreliable mechanisms like the secret FISA court, a rubber-stamp authority that approves 99.97% of government requests (which denied only 11 requests out of 33,900 in 33 years http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request. They’re the ones that get us into trouble with the Constitution by letting us go too far.

And even the President now agrees our surveillance programs are going too far, gathering massive amounts of private records on ordinary Americans who have never been suspected of any crime. This violates our constitutional protection against unlawful searches and seizure. Collecting phone and email records for every American is a waste of money, time and human resources that could be better spent pursuing those the government has reason to suspect are a serious threat.

I’m going to stop here. My deepest thanks to everyone who sent questions, and whether or not we agree on where the lines should be drawn, I encourage you to contact your members of congress and tell them how you feel about mass surveillance. This is a global problem, and the first step to tackling it is by working together to fix it at home.

If you’d like to more ideas on how to push back against unconstitutional surveillance, consider taking a look at the organizations working together to organize https://thedaywefightback.org/. [..]

@LukasReuter #AskSnowden How should the community of states react to the new information concerning surveillance? What actions have to be made?

We need to work together to agree on a reasonable international norm for the limitations on spying. Nobody should be hacking critical-to-life infrastructure like hospitals and power stations, and it’s fair to say that can be recognized in international law.

Additionally, we need to recognize that national laws are not going to solve the problem of indiscriminate surveillance. A prohibition in Burundi isn’t going to stop the spies in Greenland. We need a global forum, and global funding, committed to the development of security standards that enforce our right to privacy not through law, but through science and technology. The easiest way to ensure a country’s communications are secure is to secure them world-wide, and that means better standards, better crypto, and better research. [..]

@RagBagUSA #AskSnowden what (in your opinion) is the appropriate extent of US national security apparatus? Surely some spying is needed?

Not all spying is bad. The biggest problem we face right now is the new technique of indiscriminate mass surveillance, where governments are seizing billions and billions and billions of innocents’ communication every single day. This is done not because it’s necessary – after all, these programs are unprecedented in US history, and were begun in response to a threat that kills fewer Americans every year than bathtub falls and police officers – but because new technologies make it easy and cheap.

I think a person should be able to dial a number, make a purchase, send an SMS, write an email, or visit a website without having to think about what it’s going to look like on their permanent record. Particularly when we now have courts, reports from the federal government, and even statements from Congress making it clear these programs haven’t made us any more safe, we need to push back.

This is a global problem, and America needs to take the lead in fixing it. If our government decides our Constitution’s 4th Amendment prohibition against unreasonable seizures no longer applies simply because that’s a more efficient means of snooping, we’re setting a precedent that immunizes the government of every two-bit dictator to perform the same kind of indiscriminate, dragnet surveillance of entire populations that the NSA is doing.

It’s not good for our country, it’s not good for the world, and I wasn’t going to stand by and watch it happen, no matter how much it cost me. The NSA and the rest of the US Intelligence Community is exceptionally well positioned to meet our intelligence requirements through targeted surveillance – the same way we’ve always done it – without resorting to the mass surveillance of entire populations.

When we’re sophisticated enough to be able to break into any device in the world we want to (up to and including Angela Merkel’s phone, if reports are to be believed), there’s no excuse to be wasting our time collecting the call records of grandmothers in Missouri. [..]

@savagejen Do you think it is possible for our democracy to recover from the damage NSA spying has done to our liberties? #AskSnowden

Yes. What makes our country strong is our system of values, not a snapshot of the structure of our agencies or the framework of our laws. We can correct the laws, restrain the overreach of agencies, and hold the senior officials responsible for abusive programs to account.

The Russian government has extended Mr. Snowden’s asylum beyond next August, possibly indefinitely.

The lawmaker, Aleksei K. Pushkov, chairman of the foreign affairs committee in Russia’s lower house of Parliament, hinted during a panel discussion that the extension of temporary refugee status for Mr. Snowden, the former National Security Agency contractor, might be indefinite.

“He will not be sent out of Russia,” Mr. Pushkov said. “It will be up to Snowden.”

He added that Mr. Snowden’s father believes his son could not get a fair trial in the United States.

Mr. Pushkov made his comments came against a backdrop of broad criticism of the American spying programs that have come to light since the summer. He pointed to the sheer volume of information that American authorities are able to gather.

“The U.S. has created a Big Brother system,” Mr. Pushkov said.

Greenwald: NSA Reforms Just a Bad PR Campaign

Journalist and constitutional lawyer Glenn Greenwald and  the executive director of the American Civil Liberties Union Anthony D Romero discussed President Barack Obama’s new NSA “reforms” with Alex Wagner, the host of MSNBC’s “Now.”

Obama’s NSA ‘reforms’ are little more than a PR attempt to mollify the public

By Glenn Greenwald, The Guardian

Obama is draping the banner of change over the NSA status quo. Bulk surveillance that caused such outrage will remain in place

In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America’s most significant political scandals. Predictably, it is the same one that shaped President Obama’s much-heralded Friday speech to announce his proposals for “reforming” the National Security Agency in the wake of seven months of intense worldwide controversy.

The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are “serious questions that have been raised”. They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic “reforms” so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge. [..]

Today’s speech should be seen as the first step, not the last, on the road to restoring privacy. The causes that drove Obama to give this speech need to be, and will be, stoked and nurtured further until it becomes clear to official Washington that, this time around, cosmetic gestures are plainly inadequate.

Here is the press release from the ACLU commenting on the President’s NSA speech:

January 17, 2014

FOR IMMEDIATE RELEASE

CONTACT: [email protected]

WASHINGTON – President Obama today announced changes to some aspects of the NSA’s surveillance programs and left others in place. Anthony D. Romero, the executive director of the American Civil Liberties Union, had this reaction:

“The president’s speech outlined several developments which we welcome. Increased transparency for the Foreign Intelligence Surveillance Court, improved checks and balances at the FISA court through the creation of a panel of advocates, and increased privacy protections for non-U.S. citizens abroad – the first such assertion by a U.S. president – are all necessary and welcome reforms.

“However, the president’s decision not to end bulk collection and retention of all Americans’ data remains highly troubling. The president outlined a process to study the issue further and appears open to alternatives. But the president should end – not mend – the government’s collection and retention of all law-abiding Americans’ data. When the government collects and stores every American’s phone call data, it is engaging in a textbook example of an ‘unreasonable search’ that violates the Constitution. The president’s own review panel recommended that bulk data collection be ended, and the president should accept that recommendation in its entirety.”

A new chart comparing the ACLU’s proposals, President Obama’s announcement, and the USA FREEDOM Act (a bipartisan bill currently pending in Congress) is at: aclu.org/national-security/where-does-president-stand-nsa-reform

ACLU Action is demanding an end to dragnet surveillance at: aclu.org/endsurveillance

The President Flops on NSA Reform

President Barack Obama once again fell short of taking any meaningful action on reining in the NSA surveillance programs or assuring that American’s right to privacy under the Fourth Amendment be protected. He made one of his predictable speeches that attempted to placate both critics and defenders, failing to actually do anything significant, all the while lecturing the public on history and expressing his offense that anyone would think that he had done an inadequate job or had enabled surveillance state policies. FDL’s Kevin Gosztola contrasted today’s speech with NSA director Gen. Keith Alexander’s statements to Congress and his inaugural address last year:

The narrative that Obama promoted in the part of his speech building up to announcement of reforms was starkly similar to what NSA director Gen. Keith Alexander has said when addressing members of Congress at hearings held in the aftermath of Snowden’s first disclosures. The narrative he used should make Americans even more skeptical of how substantive the changes to surveillance will be. [..]

One might remember that just about one year ago Obama gave an inaugural speech after his re-election where he said a “decade of war is now ending” and later described how Americans believe there is no need for “perpetual war.” But the very premise of Obama’s speech involved a demand to recognize the value of militarized surveillance and this militarization keeps the US on a permanent war footing putting civil liberties of Americans at risk so long as this footing is maintained.

Since there were such low expectations, Mike Masnick at Techdirt thought the announced reforms were more significant than expected but stopped short of fixing the actual problems:

  • A judge will have to approve each query for data on the metadata collection from Section 215 of the PATRIOT Act.
  • The “three hop” dragnet will be reduced down to two hops. That does, in fact, limit how far the NSA can search by quite a bit. That last hop is quite big.
  • The NSA should no longer hold all of the data, meaning that the telcos will be expected to hold onto it (though, he leaves it up to Congress and the DOJ to figure out how to do this). He calls this a “transition” away from the Section 215 program, but that’s hardly clear.
  • National Security Letters (NSLs) will no longer have an unlimited gag order on them. The Attorney General will need to set up guidelines for a time in which gag orders expire, with the possibility of extending them for investigations that are still ongoing.
  • Companies will be given slightly more freedom to reveal data on the NSLs they get (though I don’t think he indicated the same thing for Section 702 orders…. which is a big concern).
  • The Attorney General and the Director of National Intelligence will review annually FISC rulings to figure out what can be declassified.
  • He promises to “work with Congress” to look at changes to the FISA court
  • He is adding some very limited restrictions on spying on people overseas. It should only be used for actual counterterrorism/crime/military/real national security efforts.
  • A State Department official will be in charge of handling “diplomacy issues” related to these changes on foreign spying.
  • An effort will be started with technologists and privacy experts over how to handle “big data and privacy” in both the public and private sectors.

Marcy Wheeler at emptywheel addressed what the president does not consider abuse:

  • The NSA spied on the porn and phone sex habits of ideological opponents, including those with no significant ties to extremists, and including a US person.
  • According to the NSA in 2009, it had a program similar to Project Minaret – the tracking of anti-war opponents in the 1970s – in which it spied on people in the US in the guise of counterterrorism without approval. We still don’t have details of this abuse.
  • When the NSA got FISC approval for the Internet (2004) and phone (2006) dragnets, NSA did not turn off features of Bush’s illegal program that did not comply with the FISC authorization. These abuses continued until 2009 (one of them, the collection of Internet metadata that qualified as content, continued even after 2004 identification of those abuses).
  • Even after the FISC spent 9 months reining in some of this abuse, the NSA continued to ignore limits on disseminating US person data. Similarly, the NSA and FBI never complied with PATRIOT Act requirements to develop minimization procedures for the Section 215 program (in part, probably, because NSA’s role in the phone dragnet would violate any compliant minimization procedures).
  • The NSA has twice – in 2009 and 2011 – admitted to collecting US person content in the United States in bulk after having done so for years. It tried to claim (and still claims publicly in spite of legal rulings to the contrary) this US person content did not count as intentionally-collected US person content (FISC disagreed both times), and has succeeded in continuing some of it by refusing to count it, so it can claim it doesn’t know it is happening.
  • As recently as spring 2012, 9% of the NSA’s violations involved analysts breaking standard operating procedures they know. NSA doesn’t report these as willful violations, however, because they’ve deemed any rule-breaking in pursuit of “the mission” not to be willful violations.
  • In 2008, Congress passed a law allowing bulk collection of foreign-targeted content in the US, Section 702, to end the NSA’s practice of stealing Internet company data from telecom cables. Yet in spite of having a legal way to acquire such data, the NSA (through GCHQ) continues to steal data from some of the same companies, this time overseas, from their own cables. Arguably this is a violation of Section 702 of FISA.
  • NSA may intentionally collect US person content (including Internet metadata that legally qualifies as content) overseas (it won’t count this data, so we don’t know how systematic it is). If it does, it may be a violation of Section 703 of FISA.

No, Mr. President, this is not enough.

NSA Excuses Get Moronic

We can’t tell you that we spied on you because it would violate your privacy??!!! This is precisely what the head of the NSA, General Keith B. Alexander told Senator Bernie Sanders (I-VT) in a letter responding to Sen. Sanders’ question about whether it collects information on members of Congress because doing so would violate the law.

“Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,” Alexander wrote. “For that reason, NSA cannot lawfully search to determine if any records NSA has received under the program have included metadata of the phone calls of any member of Congress, other American elected officials, or any other American without the predicate.” [..]

Alexander doesn’t actually say so in his letter, but it’s very possible that the NSA collects data on members of Congress just as it does on everyone else, in bulk. The NSA said in a statement earlier this month that members of Congress have the “same privacy protections” as ordinary citizens, which means that they too might be caught up in the NSA’s terrorism queries of its telephone database, which may sweep up millions of innocent people in a single search.

Seriously. I want to know what drugs they have given the heads of the DNI & NSA that they think that this is a plausible explanation of why that can’t tell a United States Senator whether or not they have spied on him. Alexander really wants us to believe that searching the NSA data base for information would violate the law

This certainly comes under the category of the most lamest excuses for abuse of power.



Will the NSA Be “Reformed”?

In the run up to President Barack Obama’s promised decision on reforms the National Security Agency and its surveillance programs, there has been an  unsubstantiated press release, by House Intelligence Committee chairman Rep. Mike Rogers and his Democratic counterpart Rep. Dutch Ruppersberger, that the material taken by whistleblower Edward Snowden gravely impacted America’s national security, put the lives of US military personnel at risk and aided terrorists. There are no specifics about these allegations that Snowden had downloaded 1.7 million files or had considerable information on current U.S. military operations because the Pentagon report is, of course, classified.

Meanwhile top NSA officials and their allies are making their public appeals to retain their surveillance powers

In a lengthy interview that aired on Friday on National Public Radio (NPR), the NSA’s top civilian official, the outgoing deputy director John C Inglis, said that the agency would cautiously welcome a public advocate to argue for privacy interests before the secret court which oversees surveillance. Such a measure is being promoted by some of the agency’s strongest legislative critics. [..]

But security officials are arguing strongly against curtailing the substance of domestic surveillance activities.

While Inglis conceded in his NPR interview that at most one terrorist attack might have been foiled by NSA’s bulk collection of all American phone data – a case in San Diego that involved a money transfer from four men to al-Shabaab in Somalia – he described it as an “insurance policy” against future acts of terrorism. [..]

Inglis was bolstered on Thursday by the new FBI director James Comey, who said he opposed curbing the bureau’s power to collect information from businesses through a non-judicial subpoena called a national security letter. The use of national security letters, which occurs in secret, came under sharp criticism from Obama’s surveillance review panel, which advocated judicial approval over them.

Comey told reporters that would make it harder for his agency to investigate national security issues than conduct bank fraud investigations.

What we have learned is that the massive data collection has not led to the prevention of one terrorist attack and that conventional methods using court orders were more effective (pdf).

Activist and journalist Chris Hedges, along with former NSA technical director and NSA whistle-blower William Binney, tell Real News Network‘s Paul Jay that there should be accountability, including the President himself, for the criminal practices used by the NSA against the American people.

This Friday the president will publicly announce the results of his review of National Security Agency surveillance programs at the Department of Justice, not the White House.

Every Stroke You Make

Yes, quite literally the NSA will be watching every keystroke you make on you computer, cell phone, or i-pad. How you say? Quite simply collusion with the the telecommunications industry along with companies like Microsoft and through its special unit of hackers within the agency’s department for Tailored Access Operations (TAO). In an article in Der Spiegel, these specialists are described as as “master carpenters” who step in when the usual hacking and data-skimming methods fail. These hackers at ANT, which may stand for Advanced or Access Network Technology, step in with their special tools to get the job done.

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. [..]

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million. [..]

The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on.

In another article at FDL‘s Dissenter, Peter Van Buren notes that private enterprise have also become the “tools of the national security state

Once the NSA identifies a “target” (whom we’ll refer here to as “You”), the NSA needs to know when You order a new laptop they want to intercept. That means the NSA has to spy on Your credit card, Your online activities and/or probe into the ordering systems of places like Amazon, Dell and the like. Perhaps there is a sort of “no fly” list distributed to manufacturers that requires notification to the NSA when someone like You on it buys something. Or all of the above.

The NSA then must know when and how Your laptop will be sent to you. That means they need to have been accessing the computer systems of Amazon, Dell and the like, and/or UPS, Fedex and other shippers. Or all of the above.

The NSA then has to have physical access to the warehouse of the shipping company. Or, the shipping company has to agree to mark your package, and deliver it instead to an NSA location. That all means the shipping companies are in on the NSA plot, or the NSA has to be hacking into the shipping companies’ data systems and substituting their address for Yours.

Once in NSA hands, Your package has to be opened, and Your laptop must be altered in some undetectable way. They can’t steam open a box like a letter in the old movies; someone has to open it physically and then get it all buttoned up again without a trace. Does the NSA have a way to unstick packing tape and reseal internal bags, or do they have a ready supply from Dell and Apple of packing materials?

Lastly, the NSA has to return the package into the shipping stream. That means the box, with say Amazon’s return address and Your home address, has to reenter say Fedex’s system from a third location without too many people knowing it happened. It would not do for the low-level UPS guy to pick up a ton of boxes everyday from a nondescript warehouse, all with third-party address labels. This strongly suggests cooperation by the shipping companies.

You then open Your new laptop on Christmas morning. Yeah, be sure to select a secure password. [..]

What we have here is an example of the depths into which You have fallen. The government has recruited private industry into its national security state, down to the level of the Fedex guy delivering packages to Your door in time for Christmas. For those of You who still foolishly insist that such spying is OK because they “have nothing to hide,” I sure as hell hope You are right, because whatever You do have now belongs to Them.

It is fairly certain that whether or not the NSA will be allowed to continues its bulk collection of data will be argued before the Supreme Court after two conflicting ruling from lower courts on the constitutionality of the program. Jameel Jaffer, ACLU deputy legal director and director of its Center for Democracy; and Glenn Greenwald, the journalist who first broke the story about Edward Snowden’s NSA leaks joined Amy Goodman at Democracy Now! to discuss the court rulings and how the NSA can literally watch every keystroke you make.



Transcript can gbe read here.



Transcript can be read here

Thank you, Edward Snowden.

Edward Snowden’s Christmas Message

Hi, and Merry Christmas. I’m honored to have the chance to speak with you and your family this year.

Recently, we learned that our governments, working in concert, have created a system of worldwide mass surveillance, watching everything we do.

Great Britain’s George Orwell warned us of the danger of this kind of information. The types of collection in the book — microphones and video cameras, TVs that watch us — are nothing compared to what we have available today. We have sensors in our pockets that track us everywhere we go.

Think about what this means for the privacy of the average person. A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves — an unrecorded, unanalyzed thought. And that’s a problem, because privacy matters. Privacy is what allows us to determine who we are and who we want to be.

The conversation occurring today will determine the amount of trust we can place both in the technology that surrounds us and the government that regulates it. Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.

For everyone out there listening, thank you, and Merry Christmas.

Load more