Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Slides" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Gmail blows up e-mail marketing by caching all images on Google servers | Ars Technica - 0 views

  •  
    There's an antitrust angle to this; it could be viewed by a court as anti-competitive. But given the prevailing winds on digital privacy, my guess would be that Google would slide by.
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | theguardian.com - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

How Secret Partners Expand NSA's Surveillance Dragnet - The Intercept - 0 views

  • Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden. The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.
  • It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
  • The secret documents reveal that the NSA has set up at least 13 RAMPART-A sites, nine of which were active in 2013. Three of the largest – codenamed AZUREPHOENIX, SPINNERET and MOONLIGHTPATH – mine data from some 70 different cables or networks. The precise geographic locations of the sites and the countries cooperating with the program are among the most carefully guarded of the NSA’s secrets, and these details are not contained in the Snowden files. However, the documents point towards some of the countries involved – Denmark and Germany among them. An NSA memo prepared for a 2012 meeting between the then-NSA director, Gen. Keith Alexander, and his Danish counterpart noted that the NSA had a longstanding partnership with the country’s intelligence service on a special “cable access” program. Another document, dated from 2013 and first published by Der Spiegel on Wednesday, describes a German cable access point under a program that was operated by the NSA, the German intelligence service BND, and an unnamed third partner.
  • ...2 more annotations...
  • The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute. In an emailed statement, the NSA declined to comment on the RAMPART-A program. “The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all,” said NSA spokeswoman Vanee’ Vines. “NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets only.”
  • The Danish and German operations appear to be associated with RAMPART-A because it is the only NSA cable-access initiative that depends on the cooperation of third-party partners. Other NSA operations tap cables without the consent or knowledge of the countries that host the cables, or are operated from within the United States with the assistance of American telecommunications companies that have international links. One secret NSA document notes that most of the RAMPART-A projects are operated by the partners “under the cover of an overt comsat effort,” suggesting that the tapping of the fiber-optic cables takes place at Cold War-era eavesdropping stations in the host countries, usually identifiable by their large white satellite dishes and radomes. A shortlist of other countries potentially involved in the RAMPART-A operation is contained in the Snowden archive. A classified presentation dated 2013, published recently in Intercept editor Glenn Greenwald’s book No Place To Hide, revealed that the NSA had top-secret spying agreements with 33 third-party countries, including Denmark, Germany, and 15 other European Union member states:
  •  
    Don't miss the slide with the names of the NSA-partner nations. Lots of E.U. member nations.
Gary Edwards

Economy Roundtable - Coast to Coast AM - 0 views

  •  
    "Date: 05-07-14 Host: George Noory Guests: Catherine Austin Fitts, Gerald Celente, George Ure, Robert Zimmerman This special panel discussion on the economy and related topics featured investment advisor Catherine Austin Fitts, trends analyst Gerald Celente, and consultant George Ure. Currently, the financial system is still being pumped with cheap money, such as $45 billion a month in mortgage-backed securities, and interest rates remain at record lows-- but once those interest rates go back up, the economy will tumble, said Celente. Fitts cited the continued inequality and centralization in the economy as hampering growth, while Ure noted that we're in the bottoming process with the Fed, which is trying to print money fast enough so we don't drop into something like the Great Depression. While the US continues its behind-closed-doors propping up of the economy, "I still believe we're going to see something like a panic level by the end of the second quarter," Celente remarked. America used to be the land of opportunity, but now the wealth is concentrated in the hands of the few, he added. Globalization is lowering the wealth of the middle class, and the reality is "we're automating or outsourcing jobs, and putting people on government checks," Fitts commented. Ure, who studies cyclical patterns of the economy or "long waves," said right now we're seeing a "war on cash," with a huge effort to get people into an electronic system, where all their transactions and investments can be tracked. The revelations by Edward Snowden about America's surveillance state has had a depressing effect on US economic growth, as well as inspiring other countries around the world to pull out of the system, Fitts suggested. "We live in a country where the system of creating money has basically been sublet from Congress to the Federal Reserve...and government is wholesale now, in the business of granting different franchises such as in communications and money operations," Ure detail
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

US Government Labeled Al Jazeera Journalist as Al Qaeda - 0 views

  • The U.S. government labeled a prominent journalist as a member of Al Qaeda and placed him on a watch list of suspected terrorists, according to a top-secret document that details U.S. intelligence efforts to track Al Qaeda couriers by analyzing metadata. The briefing singles out Ahmad Muaffaq Zaidan, Al Jazeera’s longtime Islamabad bureau chief, as a member of the terrorist group. A Syrian national, Zaidan has focused his reporting throughout his career on the Taliban and Al Qaeda, and has conducted several high-profile interviews with senior Al Qaeda leaders, including Osama bin Laden.
  • The document cites Zaidan as an example to demonstrate the powers of SKYNET, a program that analyzes location and communication data (or “metadata”) from bulk call records in order to detect suspicious patterns. In the Terminator movies, SKYNET is a self-aware military computer system that launches a nuclear war to exterminate the human race, and then systematically kills the survivors. According to the presentation, the NSA uses its version of SKYNET to identify people that it believes move like couriers used by Al Qaeda’s senior leadership. The program assessed Zaidan as a likely match, which raises troubling questions about the U.S. government’s method of identifying terrorist targets based on metadata. It appears, however, that Zaidan had already been identified as an Al Qaeda member before he showed up on SKYNET’s radar. That he was already assigned a watch list number would seem to indicate that the government had a prior intelligence file on him. The Terrorist Identities Datamart Environment, or TIDE, is a U.S. government database of over one million names suspected of a connection to terrorism, which is shared across the U.S. intelligence community.
  • Peter Bergen, CNN’s national security analyst and author of several books on Al Qaeda and Osama bin Laden, told The Intercept, “I’ve known [Zaidan] for well over a decade, and he’s a first class journalist.” “He has the contacts and the access that of course no Western journalist has,” said Bergen. “But by that standard any journalist who spent time with Al Qaeda would be suspect.” Bergen himself interviewed bin Laden in 1997.
  • ...6 more annotations...
  • That presentation states that the call data is acquired from major Pakistani telecom providers, though it does not specify the technical means by which the data is obtained. The June 2012 document poses the question: “Given a handful of courier selectors, can we find others that ‘behave similarly’” by analyzing cell phone metadata? “We are looking for different people using phones in similar ways,” the presentation continues, and measuring “pattern of life, social network, and travel behavior.” For the experiment, the analysts fed 55 million cell phone records from Pakistan into the system, the document states. The results identified someone who is “PROB” — which appears to mean probably — Zaidan as the “highest scoring selector” traveling between Peshawar and Lahore.
  • According to another 2012 presentation describing SKYNET, the program looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” and behaviors such as “excessive SIM or handset swapping,” “incoming calls only,” “visits to airports,” and “overnight trips.”
  • The following slide appears to show other top hits, noting that 21 of the top 500 were previously tasked for surveillance, indicating that the program is “on the right track” to finding people of interest. A portion of that list visible on the slide includes individuals supposedly affiliated with Al Qaeda and the Taliban, as well as members of Pakistan’s spy agency, Inter-Services Intelligence. But sometimes the descriptions are vague. One selector is identified simply as “Sikh Extremist.” As other documents from Snowden revealed, drone targets are often identified in part based on metadata analysis and cell phone tracking. Former NSA director Michael Hayden famously put it more bluntly in May 2014, when he said, “we kill people based on metadata.” Metadata also played a key role in locating and killing Osama bin Laden. The CIA used cell phone calling patterns to track an Al Qaeda courier and identify bin Laden’s hiding place in Pakistan.
  • A History of Targeting Al Jazeera  The U.S. government’s surveillance of Zaidan is not the first time that it has linked Al Jazeera or its personnel to Al Qaeda. During the invasion of Afghanistan, in November 2001, the United States bombed the network’s Kabul offices. The Pentagon claimed that it was “a known al-Qaeda facility.” That was just the beginning. Sami al-Hajj, an Al Jazeera cameraman, was imprisoned by the U.S. government at Guantanamo for six years before being released in 2008 without ever being charged. He has said he was repeatedly interrogated about Al Jazeera. In 2003, Al Jazeera’s financial reporters were barred from the trading floor of the New York Stock Exchange for “security reasons.” Nasdaq soon followed suit.
  • During the invasion of Iraq, U.S. forces bombed Al Jazeera’s Baghdad offices, killing correspondent Tariq Ayoub. The U.S. insisted it was unintentional, though Al Jazeera had given the Pentagon the coordinates of the building. When American forces laid siege to Fallujah, and Al Jazeera was one of the few news organizations broadcasting from within the city, Bush administration officials accused it of airing propaganda and lies. Al Jazeera’s Fallujah correspondent, Ahmed Mansour, reported that his crew had been targeted with tanks, and the house they had stayed in had been bombed by fighter jets. So great was the suspicion of Al Jazeera’s ties to terrorism that Dennis Montgomery, a contractor who had previously tried peddling cheat-detector software to Las Vegas casinos, managed to convince the CIA that he could decode secret Al Qaeda messages from Al Jazeera broadcasts. Those “codes” reportedly caused Bush to ground a number of commercial transatlantic flights in December 2003. But the U.S. government appeared to have somewhat softened its view of the network in the last several years. The Obama administration has criticized Egypt for holding three of Al Jazeera’s journalists on charges of aiding the Muslim Brotherhood. During the height of the 2011 Arab Spring, then-Secretary of State Hillary Clinton praised the network’s coverage, saying, “Viewership of Al Jazeera is going up in the United States because it’s real news.”
  • Zaidan is still Al Jazeera’s Islamabad bureau chief, and has also reported from Syria and Yemen in recent years. Al Jazeera vigorously defended his reporting. “Our commitment to our audiences is to gain access to authentic, raw, unfiltered information from key sources and present it in an honest and responsible way.” They added that, “our journalists continue to be targeted and stigmatized by governments,” even though “Al Jazeera is not the first channel that has met with controversial figures such as bin Laden and others — prominent western media outlets were among the first to do so.”
  •  
    It was crazy. I was at home in Idaho sitting there watching TV and chatting with my internet buddy in Croatia. Then the black helicopters came for me ... 
Paul Merrell

XKeyscore Exposé Reaffirms the Need to Rid the Web of Tracking Cookies | Electronic Frontier Foundation - 0 views

  • The Intercept published an expose on the NSA's XKeyscore program. Along with information on the breadth and scale of the NSA's metadata collection, The Intercept revealed how the NSA relies on unencrypted cookie data to identify users. As The Intercept says: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies." The NSA slides released by The Intercept give detailed guides to understanding the data transmitted by these cookies, as well as how to find unique machine identifiers that analysts can use to differentiate between multiple machines using the same IP address. We've written before about how spy agencies piggyback on social media account data to find Internet users' names or other identifying info, and these slides drive home the point that HTTP cookies leave users vulnerable to government surveillance, since any intermediary (or spy agency) can read the sensitive data they contain.
  • Worse yet, most of the time these identifying cookies come from third-party sources on webpages, and users have no meaningful way to opt out of receiving them (short of blocking all third party cookies) since advertisers (the main server of these types of cookies) refuse to honor the Do Not Track header.  Browser makers could help address this sort of non-consensual tracking by both advertisers and the NSA with some simple technical changes—changes that have been shown to reduce the number of third party cookies received by 67%. So far, though, they've been unwilling to build privacy protecting features in by default. Until they do, the best way for users to protect themselves is by installing a privacy protecting app like Privacy Badger, which is designed to block these types of uniquely identifying tracking cookies, or HTTPS Everywhere to block the transmission of HTTP cookies.
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Gary Edwards

50 Things Every American Should Know About The Collapse Of The Economy - 0 views

  •  
    50 Things Every American Should Know About The Collapse Of The Economy.  Stunning slide show.
Gary Edwards

The GOP Should Be Mindful Of August And Take Back Up Holding the Line | RedState - 0 views

  •  
    The White House no longer has a commander in chief in charge, but a professional victim. Last week, it was the Arab Spring, those damn Europeans, Mother Nature, etc. Now it is all about those evil tea partiers. For three years, Barack Obama has blamed George W. Bush for all his ills. Yes, it is true, Barack Obama inherited an economy sliding backward. But it is also true Barack Obama inherited a AAA credit rating from George W. Bush. Obama's policies have exacerbated a bad economy and caused us to lose our credit rating. But still, expect a full court press to blame the GOP and Tea Party. So I have some quick advice for the GOP. Back when S&P said it was considering a down grade, it set out two criteria to avoid losing the downgrade: (1) at least $4 trillion in cuts and (2) bipartisan support. Only the tea party movement came up with such a plan - Cut, Cap, and Balance. It received bipartisan support in the House, came within five votes of a majority in the Senate, and not only cut $4 trillion, but put caps on future government spending and balanced the federal budget. No other plan, including the public grand bargain and Barack Obama's own super-double-top-secret plan that no one has ever seen did that. Were I in Republican Leadership in Washington, I would haul my butt back to D.C. right now and start fighting again for Cut, Cap, and Balance. 66% of Americans support the plan. It is the only plan that would have avoided a credit decline. Go back and pick up the fight on the front lines for freedom. And if they just can't, they they better point out to the new Super Committee that it was, in fact, possible to cut $4 trillion without enacting job killing tax increases and encourage them to send back as its package Cut, Cap, and Balance.
  •  
    The Tea Party passed two plans to restore USA crdibility and good standing: The Ryan Balanced Budget and the Cut, Cap & Balance plan. Both plans passed the House with bipartisan support. Both plans were acceptable to the credit rating agencies, including Standard & Poor. Both plans were blocked by the Democrats in the Senate, and, threatened with a veto from Obama. The people with no plan blocked the only plans that would have saved the USA credit rating. Rush made the point this morning that if Obama and the Democrats cared about this country, they would be insisting that both the Tea Party plans, the Ryan Balanced Budget and the Cut, Cap & Balance plans be put forward in the Senate immediately for a vote, with the full backing of Obama. Rush pointed out that if Obama and the Democrats didn't do this, or didn't come forward with a proposal of their own that actually qualified and met the credit ratings agencies $4 Trill - stop the reckless spending criteria debt concerns, then our worst fears would be confirmed. Our worst fears being that Obama and the Democrats are worse than mere incompetent socialist ideologues. That they are in fact out to destroy the goose that laid the golden egg: Constitutional Capitalism, American exceptionalism, and our God given right to life liberty and the pursuit of happiness that under-girds the extraordinary story of American prosperity. So Obama has a choice today. He either complies with the demands that the USA Government get it's finances in order by supporting the credit ratings approved Tea Party plans. Or, explain why his vision of a downgraded, prosperity bereft and indentured debt bound America is the way forward. Time to start demanding resignations. The fish rots from the head.
Gary Edwards

The Most Corrupt Members Of Congress - 0 views

  •  
    A slide set featuring the corruption bio of the top 16 most corrupt members of congress.  Incredible.  Seems like the longer these clowns serve, the more corrupt and innovative they become.  Kudos to the  This top tier listing must have been very competitive.  Missing are criminals like Chris Dodd, Kathleen Sebelius, and Barney Frank.  Frank and Dodd are almost single handedly responsible for the Fannie Mae - Freddie Mac mortgage crisis that tripped the entire global economy.
Paul Merrell

In Britain, Spy Chief Calls for More Power for Agency - NYTimes.com - 0 views

  • Britain’s domestic intelligence chief has demanded greater authority for spies to help fight the threat of Islamist extremism, a sign that the attack on a satirical newspaper in Paris is likely to sharpen the security-versus-privacy debate in Western countries.Andrew Parker, the director general of MI5, said militants were planning attacks in Britain similar to the one that killed 12 people at the newspaper, Charlie Hebdo.
  • Amid a backlash against digital surveillance after disclosures by the former National Security Agency contractor Edward J. Snowden in 2013, Mr. Parker said there was a growing imbalance between the number of terrorist plots against Britain and the ability of spies to track their communications. Continue reading the main story Related Coverage Charlie Hebdo Suspects Dead in Raid; Hostage Taker in Paris Is Also KilledJAN. 9, 2015 Why Reams of Intelligence Did Not Thwart the Paris AttacksJAN. 9, 2015 Speaking at MI5 headquarters late on Thursday, he warned against an atmosphere in which privacy was “so absolute and sacrosanct that terrorists and others who mean us harm can confidently operate from behind those walls without fear of detection.”
  • “If we are to do our job, MI5 will continue to need to be able to penetrate their communications as we have always done,” he said. “That means having the right tools, legal powers and the assistance of companies which hold relevant data.”“Currently,” he added, “this picture is patchy.”
  • ...1 more annotation...
  • In recent months, intelligence services in Britain and the United States have publicly been campaigning against pressure to rein in their surveillance operations, notably pitting them against the American technology companies that dominate the Internet, like Google, Facebook and Apple.Robert Hannigan, the recently appointed director of GCHQ, Britain’s electronic intelligence agency, castigated Internet companies in November for providing the “command-and-control networks of choice for terrorists and criminals” and challenged them to find a better balance between privacy and security.Companies are stepping up efforts to strengthen encryption, saying they are responding to demands for more privacy from their users.
  •  
    "Our government has kept us in a perpetual state of fear - kept us in a continuous stampede of patriotic fervor - with the cry of grave national emergency. Always, there has been some terrible evil at home, or some monstrous foreign power that was going to gobble us up if we did not blindly rally behind it. Yet, in retrospect, these disasters seem never to have happened, seem never to have been quite real." - General Douglas MacArthur (1880-1964); source: Whan, ed. "A Soldier Speaks: Public Papers and Speeches of General of the Army Douglas MacArthur," (1965); Nation, August 17, 1957.
Paul Merrell

Trust in Federal Gov't on International Issues at New Low - 0 views

  • Americans' trust in the federal government to handle international problems has fallen to a record-low 43% as President Barack Obama prepares to address the nation on Wednesday to outline his plan to deal with ISIS. Separately, 40% of Americans say they have a "great deal" or "fair amount" of trust in the federal government to handle domestic problems, also the lowest Gallup has measured to date.
  • The results are based on Gallup's annual Governance poll, conducted Sept. 4-7. This year's poll was conducted at a time when the government is faced with instability in many parts of the world, including Iraq and Syria, the Middle East, and Ukraine. President Obama, who recently said he had "no strategy" for dealing with ISIS -- the Islamic extremists who have taken control of parts of Iraq and Syria and recently captured and beheaded two American journalists -- is set to present his plan for dealing with the group Wednesday.
  •  
    Trend is down since 9-11, 2001. Bit of a bump in about May of 2012 (66% on international), but a fast slide afterward to the present 43%. I'm surprised it's over 1%.
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

PRISM: Google and Facebook DID allow NSA access to data and were in talks to set up 'spying rooms' despite denials by Zuckerberg and Page over controversial project | Mail Online - 0 views

  • Mark Zuckerberg and Larry Page both issued blustery statements over recent media reports they gave the National Security Agency officials access to their troves of user informationNow sources say both tech giants were in discussion about specific ways to give U.S. officials access to their data using virtual classified information reading roomsCompanies are all compelled by the Foreign Intelligence Surveillance Act to hand over any information requested under the law, but they're not required to make access easier
  • PRISM data-mining program was launched in 2007 with approval from special federal judgesApple, Facebook, Microsoft, Google, Yahoo, YouTube, Skype, AOL and PalTalk are involved in spying program The UK has had access to the PRISM data since at least 2010Details of data collection were outlined in classified 41-slide PowerPoint presentation that was leaked by intelligence officer 
  • Mark Zuckerberg of Facebook and Larry Page of Google both strongly denied giving unfettered access to user data to U.S. officials, but it turns out both companies have, in fact, cooperated with governments requests.Zuckerberg denied his company's link to secret government data-sharing scheme PRISM on Friday in a blustery posted message that described allegations that Facebook gave 'US or any other government direct access to our servers' as 'outrageous.'Now, sources tell the New York Times that both Facebook and Google discussed plans to create secure portals for the government 'like a digital version of the secure physical rooms that have long existed for classified information' with U.S. officials.
Paul Merrell

Federal Reserve predicts new economic crisis - RT USA - 0 views

  • A recent meeting of the US Federal Reserve revealed that members of America’s central bank are not very optimistic about the future of the country’s economy. Even though the Fed is at odds regarding what to do in terms of helping economic growth — and it still remains unclear whether or not a third round of quantitative easing (QE3) is to come — the official forecast from the bank suggests that the US may be sliding into a crisis.Details from the Fed’s last meeting have been released to the public, and the minutes from that gathering reveal that the economists that oversee much of the inner-workings of the country’s fiscal policy remain concerned with the state of America.
  • “It seems as though the committee is moving away from quantitative easing as the central bank expects the economic activity to gradually gather pace over the coming months,” David Song, a currency analyst at DailyFX, adds to MarketWatch.“Although theFed kept the door open to expand monetary policy further, the recent rhetoric suggests that QE3 will be taken off the table as members of the board float the idea of looking at ‘new tools’ to strengthen the tepid recovery.”The minutes also reveal that 15 members of the Federal Open Market Committee had a poor outlook about America’s economy as of their last meeting, up from April’s figure of just eight.
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

NSA Spies on 500 Million German Data Connections - SPIEGEL ONLINE - 0 views

  • America's National Security Agency (NSA) is apparently spying on Germany more than previously believed. Secret documents from the US intelligence service, which have been viewed by SPIEGEL journalists, reveal that the NSA systematically monitors and stores a large share of the country's telephone and Internet connection data. Internal NSA statistics indicate that the agency stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts. The metadata -- or information about which call or data connections were made and when -- is then stored at the NSA's headquarters in Fort Meade, near Washington, DC.
  • The documents show for the first time the scope of American surveillance in Germany. Previously, it had only been clear that Germany had been one of the major targets of NSA spying. A map published by the Guardian shows that Germany is on a par with targets such as China, Iraq and Saudi Arabia in terms of the intensity of electronic snooping. For weeks now, new details have emerged from documents collected by whistleblower Edward Snowden about the NSA's Prism and Britain's Tempora digital spying programs. The statistics, which SPIEGEL has also seen, show that data is collected from Germany on normal days for up to 20 million telephone calls and 10 million Internet data exchanges. Last Christmas Eve, it collected data on around 13 million phone calls and about half as many online exchanges. On the busiest days, such as January 7 of this year, the information gathered spiked to nearly 60 million communication connections under surveillance.
  • The NSA, it turns out, is more active in Germany than in any other of the EU's 27 member states. By comparison, during the same time frame, the Americans only recorded data on an average of 2 million connections in France each day. The documents also show that the NSA is primarily interested in important Internet hubs in southern and western Germany. Frankfurt, for example, plays an important role in the global Internet infrastructure, and the city is listed as a central base for the country. One top secret document also states that while Germany may be a partner, it is still also a target of the NSA's electronic snooping. According to the document, Germany is a so-called "3rd party foreign partner." The only countries that are explicitly excluded from spying attacks are Australia, Canada, New Zealand and the UK. "We can, and often do, target the signals of most 3d party foreign partners," a slide from an internal presentation states.
Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | guardian.co.uk - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
Paul Merrell

Americans' Trust in Mass Media Sinks to New Low - 0 views

  • Americans' trust and confidence in the mass media "to report the news fully, accurately and fairly" has dropped to its lowest level in Gallup polling history, with 32% saying they have a great deal or fair amount of trust in the media. This is down eight percentage points from last year.
  • Gallup began asking this question in 1972, and on a yearly basis since 1997. Over the history of the entire trend, Americans' trust and confidence hit its highest point in 1976, at 72%, in the wake of widely lauded examples of investigative journalism regarding Vietnam and the Watergate scandal. After staying in the low to mid-50s through the late 1990s and into the early years of the new century, Americans' trust in the media has fallen slowly and steadily. It has consistently been below a majority level since 2007.
  • Democrats' and independents' trust in the media has declined only marginally, with 51% of Democrats (compared with 55% last year) and 30% of independents (versus 33% last year) expressing trust. Over the past 20 years, Democrats have generally expressed more trust than Republicans in the media, although in 2000, the two parties were most closely aligned, with 53% of Democrats and 47% of Republicans professing trust.
  • ...4 more annotations...
  • While it is clear Americans' trust in the media has been eroding over time, the election campaign may be the reason that it has fallen so sharply this year. With many Republican leaders and conservative pundits saying Hillary Clinton has received overly positive media attention, while Donald Trump has been receiving unfair or negative attention, this may be the prime reason their relatively low trust in the media has evaporated even more. It is also possible that Republicans think less of the media as a result of Trump's sharp criticisms of the press. Republicans who say they have trust in the media has plummeted to 14% from 32% a year ago. This is easily the lowest confidence among Republicans in 20 years.
  • Older Americans are more likely than younger Americans to say they trust the media, but trust has declined among both age groups this year. Currently, 26% of those aged 18 to 49 (down from 36% last year) and 38% of those aged 50 and older (down from 45%) say they have a great deal or fair amount of trust in the media.
  • In 2001, younger Americans (55%) were more likely than older Americans (50%) to express trust and confidence in mass media. This gap emerged again in 2005 when 53% of 18- to 49-year-olds had trust and 45% of those 50 and older expressed the same sentiment. Yet in the past decade, older Americans have mostly had more confidence than younger Americans, and this year, the gap between these age groups is 12 points. And 2016 marks the first time that confidence among older Americans has dropped below 40% in polling since 2001.
  • The divisive presidential election this year may be corroding Americans' trust and confidence in the media, particularly among Republicans who may believe the "mainstream media" are too hyperfocused on every controversial statement or policy proposal from Trump while devoting far less attention to controversies surrounding the Clinton campaign. However, the slide in media trust has been happening for the past decade. Before 2004, it was common for a majority of Americans to profess at least some trust in the mass media, but since then, less than half of Americans feel that way. Now, only about a third of the U.S. has any trust in the Fourth Estate, a stunning development for an institution designed to inform the public. With the explosion of the mass media in recent years, especially the prevalence of blogs, vlogs and social media, perhaps Americans decry lower standards for journalism. When opinion-driven writing becomes something like the norm, Americans may be wary of placing trust on the work of media institutions that have less rigorous reporting criteria than in the past. On the other hand, as blogs and social media "mature," they may improve in the American public's eyes. This could, in turn, elevate Americans' trust and confidence in the mass media as a whole.
  •  
    Personally, I suspect the fact that mainstream media's journalism standards have dropped as MSM ownership has been consolidated into 6 giant corporations might have far more to do with the decline. So declined too has been the relevance of editorial focus. In other words, MSM has only itself to blame for the public's loss of confidence. Fortunately, we've seen the rise of independent investigative journalism via the internet. Alternative media now offers far richer sources of information than MSM, once you learn to filter unreliable sources.
‹ Previous 21 - 40 of 73 Next › Last »
Showing 20 items per page