Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "classified-records" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
14More

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
13More

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
6More

Billionaires Make War on Iran - The Unz Review - 0 views

  • All the pro-Israel anti-Iran groups engage in pressure tactics on Capitol Hill and have been effective in dominating the political debate. Of thirty-six outside witnesses brought in to testify at seven Senate hearings on Iran since 2012 only one might be characterized as sensitive to Iranian concerns. The enormous lobbying effort enables the anti-Iran groups to define the actual policies, move their drafts of legislation through congress, and eventually see their bills pass with overwhelming majorities in both the House and Senate. It is democracy in action if one accepts that popular rule ought to be guided by money and pressure groups rather than by national interests. Less well known is United Against Nuclear Iran, which has a budget just shy of $2 million. UANI is involved in the New York lawsuit. The group, which has somehow obtained a 501[c]3 “educational” tax status that inter alia allows it to conceal its donors, has offices in Rockefeller Center in New York City. It is active on Capitol Hill providing “expert testimony” on Iran for congressional committees, to include “help” in drafting legislation. At a July Senate Foreign Relations Committee hearing on Iran all three outside witnesses were from UANI. It is also active in the media but is perhaps best known for its “name and shame” initiatives in which it exposes companies that it claims are doing business with Tehran in violation of US sanctions.
  • UANI is being sued by a Greek billionaire Victor Restis whom it had outed in 2013. Restis, claiming the exposure was fraudulent and carried out to damage his business, has filed suit demanding that UANI and billionaire Thomas Kaplan turn over documents and details of relationships regarding UANI donors who it is claimed are linked to the case. Kaplan, a New York City resident, made his initial fortune on energy exploration and development. More recently he has been involved in commodities trading in precious metals. His wife Daphne is Israeli and his involvement in various Jewish philanthropies both in the US and in Israel have invited comparison with controversial deceased commodities trader Marc Rich, who reportedly worked closely with the Israeli government on a number of projects. The Justice department would like to the see the UANI lawsuit go away as it is aware that what is being described as “law enforcement” documents would include both privileged and classified Treasury Department work product relating to individuals and companies that it has investigated for sanctions busting. Passing either intelligence related or law enforcement documents to a private organization is illegal but the Justice Department’s only apparent concern is that the activity might be exposed. There is no indication that it would go after UANI for having acquired the information and it perhaps should be presumed that the source of the leak is the Treasury Department itself.
  • Who or what provided the documents to a private advocacy group that is also a tax exempt foundation supported by prominent businessmen with interests in the Middle East is consequently not completely clear but Restis is assuming that the truth will out if he can get hold of the evidence. The lawsuit claims that UANI intimidates its targets by defaming their business practices as well as by demanding both examination of their books and an audit carried out by one of its own accountants followed by review from an “independent counsel.” Kaplan is named in the suit as he appears to be the gray eminence behind UANI. He once boasted “we’ve (UANI) done more to bring Iran to heel than any other private sector initiative.” Kaplan also employs as a director or officer in six of his companies the Executive Director of UANI Mark Wallace and reportedly arranged the awarding of the Executive Director position at Harvard’s Belfer Center to its President Gary Samore. Kaplan is a business competitor to Restis, whose lawyers are apparently seeking to demonstrate two things: first, that the US government has been feeding sometimes only partially vetted information to UANI to help in its “name and shame” program and second, that UANI is itself supported by partisan business interests like Kaplan as well as by foreign sources, which apparently is meant to imply Israel. Or even the Israeli intelligence service Mossad. Meir Dagan, former head of Mossad, is on the UANI advisory board, which also includes ex-Senator Joseph Lieberman and former Senior Diplomat Dennis Ross, both of whom have frequently been accused of favoring Israeli interests and both of whom might well have easy access to US government generated information.
  • ...2 more annotations...
  • And then there is the Muhadedin-e-Khalq, the Iranian terrorist group that has assassinated at least six Americans and is now assisting the Israeli government in killing Iranian scientists, a prima facie definition of what constitutes terrorism. The group was on the State Department terrorist list from 1997 until 2012, when Secretary of State Hillary Clinton de-listed it in response to demands coming from friends of Israel in Congress as well as from a large group of ex government officials, many of whom were paid large honoraria by the group to serve as advocates. The paid American shills included former CIA Directors James Woolsey and Porter Goss, New York City Mayor Rudolph Giuliani, former Vermont Governor Howard Dean, former Director of the Federal Bureau of Investigation Louis Freeh and former United Nations Ambassador John Bolton. The promoters of MEK in congress and elsewhere claimed to be primarily motivated by MEK’s being an enemy of the current regime in Tehran, though its virulent anti-Americanism and terrorist history make it a somewhat unlikely poster child for the “Iranian resistance.”
  • Supporters of MEK also ignore the fact that the group is run like a cult, routinely executes internal dissidents, and has virtually no political support within Iran. But such are the ways of the corrupt Washington punditocracy, lionizing an organization that it should be shunning. MEK’s political arm is located in Paris and it has long been assumed that it is funded by the Israeli government and by at least some of the same gaggle of billionaires, possibly including their Israeli counterparts, who support the anti-Iranian agenda in the United States.
  •  
    More detail about the extraordinary action of the Dept. of Justice to negotiate a settlement because discovery requested from the United Against Nuclear Iran private organization would include privileged and classified "law enforcement" records.
5More

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chic... - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
6More

The US government doesn't want you to know the cops are tracking you | Trevor Timm | Co... - 0 views

  • All across America, from Florida to Colorado and back again, the country's increasingly militarized local police forces are using a secretive technology to vacuum up cellphone data from entire neighborhoods – including from people inside their own homes – almost always without a warrant. This week, numerous investigations by major news agencies revealed the US government is now taking unbelievable measures to make sure you never find out about it. But a landmark court ruling for privacy could soon force the cops to stop, even as the Obama administration fights to keep its latest tool for mass surveillance a secret.So-called International Mobile Subscriber Identity (IMSI) catchers – more often called their popular brand name, "Stingray" – have long been the talk of the civil liberties crowd, for the indiscriminate and invasive way these roving devices conduct surveillance. Essentially, Stingrays act as fake cellphone towers (usually mounted in a mobile police truck) that police can point toward any given area and force every phone in the area to connect to it. So even if you're not making a call, police can find out who you've been calling, and for how long, as well as your precise location. As Nathan Freed Wessler of the ACLU explained on Thursday, "In one Florida case, a police officer explained in court that he 'quite literally stood in front of every door and window' with his stingray to track the phones inside a large apartment complex."
  • Yet these mass surveillance devices have largely stayed out of the public eye, thanks to the federal government and local police refusing to disclose they're using them in the first place – sometimes, shockingly, even to judges. As the Associated Press reported this week, the Obama administration has been telling local cops to keep information on Stingrays secret from members of the news media, even when it seems like local public records laws would mandate their disclosure. The AP noted:Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • Some of the government's tactics to hide Stingray from journalists and the public have been downright disturbing. After the ACLU had filed a records request for information on Stingrays, the local police force initially told them that, yes, they had the documents and to come on down to the station to look at them. But just before an ACLU rep was due to arrive, US Marshals seized the records and hid them away at another location, in what Wessler describes as "a blatant violation of state open-records laws".The federal government has used various other tactics around the country to prevent disclosure of similar information.USA Today also published a significant nationwide investigation about the Stingray problem, as well as what are known as "cellphone tower dumps". When police agencies don't have Stingrays at their disposal, they can go to cell phone providers to get the cellphone location information of everyone who has connected to a specific cell tower (which inevitably includes thousands of innocent people). The paper's John Kelly reported that one Colorado case shows cellphone tower dumps got police "'cellular telephone numbers, including the date, time and duration of any calls,' as well as numbers and location data for all phones that connected to the towers searched, whether calls were being made or not."
  • ...3 more annotations...
  • It's scary enough to think that the NSA is collecting so much information, but this mass location and metadata tracking at the local level all may be about to change. This week, the ACLU won a historic victory in the 11th Circuit Court of Appeals (serving Florida, Alabama and Georgia), which ruled that police need to get a warrant from a judge before extracting from your cellphone the location data obtained by way of a cell tower. This ruling will apply whether cops are going after one person, the whole tower and, one can assume, Stingrays. (The case was also argued by the aforementioned Wessler, who clearly is this month’s civil liberties Most Valuable Player.)This case has huge implications, and not just for the Stingrays secretly being used in Florida. It virtually guarantees the US supreme court will soon have to tackle the larger cellphone location question in some form – and whether police across the country have to finally start getting a warrant to find out where your precise location for days or weeks at a time. But as Stanford law professor Jennifer Granick wrote on Friday, it could also have an impact on NSA spying, which relies on the theory that indiscriminately collecting metadata is fair game until a court says otherwise.
  • You may be asking: how, exactly, are the local cops getting their hands on such advanced military technology? Well, the feds are, in many cases, giving away the technology for free. When the US government is not loaning police agencies their own Stingrays, the Defense Department and Homeland Security are giving federal grants to cops, which allow departments to purchase the gear at the cost of $400,000 a pop from defense contractors like Harris Corporation, which makes the Stingray brand.
  • Like Stingrays, and the NSA's phone dragnet before them, the militarization of America's local cops is a phenomenon that's only now getting widespread attention. As journalist Radley Balko, who wrote a seminal book on the subject two years ago, said this week, the Obama administration could easily limit these tactics to "cases of legitimate national security" – but has clearly chosen not to.No matter how much President Obama talks about how he has "maintained a healthy skepticism toward our surveillance programs", it seems the Most Transparent Administration in American History™ remains much more interested in maintaining a healthy, top-secret surveillance state.
3More

Benghazi chair: Clinton had a 'duty' to save her emails | TheHill - 0 views

  • The chairman of the House Select Committee on Benghazi says Hillary Clinton had an obligation to preserve all of the emails from the private server she used while serving as secretary of State. "Secretary Clinton had a statutory duty to preserve records from her time in office, she had a legal duty to cooperate and tell the truth with congressional investigators requesting her records, and she was personally subpoenaed the moment the Benghazi Committee became aware of her exclusive use of personal email and a server, and that the State department was not the custodian of her official record,” Rep. Trey Gowdy (R-S.C.) said in a statement. His remarks came hours after Clinton defended using a personal email account and argued the unique arrangement did not break any existing laws or regulations. ADVERTISEMENT"Everything I did was permitted," Clinton said in an interview with CNN. "There was no law, no regulation, there was nothing that did not give me the full authority to decide how I was going to communicate.”
  • Gowdy and other Republicans have demanded Clinton turn the server, which her attorney says has been wiped clean of data, over to a neutral third-party who can conduct a forensic analysis and determine if any information can still be salvaged. "For more than two years, Clinton never availed herself of the opportunity, even in response to a direct congressional inquiry, to inform the public of her unusual email arrangement designed to evade public transparency,” Gowdy said. He said the State Department “should have informed congressional investigators years ago” about Clinton’s server. "The fact of the matter is it took the Benghazi Committee to uncover Secretary Clinton's use of personal email and a server to conduct official State Department business,” Gowdy said.
  • “And it was Benghazi Committee inquiries that led the State Department to confirm Clinton failed to turn over all emails that should be part of her public record; that Clinton's personal emails and server in fact do contain classified information; that her emails from Sidney Blumenthal were solicited; and that she used more than one device for electronic communication, undercutting her 'convenience' claim,” he added. Gowdy said that following Clinton’s comments, “the committee does not know why or when she chose to wipe clean her personal server, but we do know her way of doing things provided an incomplete public record."
4More

Senator Who Put Pentagon Papers Into Public Record Urges Udall To Do Same With Torture ... - 0 views

  • Article 1, Section 6 of the Constitution establishes an absolute free-speech right for members of Congress on the floor or in committee, even if they are disclosing classified material. It states that “for any Speech or Debate in either House, they shall not be questioned in any other Place.” Within hours of Colorado Senator Mark Udall losing his reelection bid last week, transparency activists were talking about how he should go out with a bang and put the Senate intelligence committee’s torture report into the congressional record.  The report is said to detail shockingly brutal abuse of detainees by the CIA during the George W. Bush administration, as well as rampant deception about the program by top officials. But the Obama White House is refusing to declassify even a summary of the report without major redactions. And Republicans take over the Senate in January.
  • Udall is one of two senators — along with fellow Intelligence Committee member Ron Wyden — who have consistently demanded greater transparency from the intelligence community. If he made the report public on the Senate floor or during a hearing, he couldn’t be prosecuted. The last time any senator did anything nearly so grand was in 1971, when Mike Gravel, two years into his 12 years representing the state of Alaska, entered 4,000 pages of the Pentagon Papers into the congressional record just before the U.S. Supreme Court lifted an injunction on publishing them in the press.
  • Now, Gravel is urging Udall to join the club. “If Udall wants to call me, I can explain this to him,” Gravel, pictured above, said in a phone interview from his home in Burlingame, Calif. Gravel’s recommendation: “What he’d have to do is call a subcommittee meeting like I did, late at night.”
  • ...1 more annotation...
  • Back in 1971, Gravel first tried to read the Papers from the Senate floor. He even got himself rigged up with a colostomy bag so he wouldn’t need to take breaks. But he was stymied by an unexpected procedural move. So he moved to Plan B: He called a late-night subcommittee meeting with almost no notice to the other members. Gravel read some of the Pentagon Papers out loud, but challenged by dyslexia and overcome with emotion, he finally opted for another way: “I asked for unanimous consent to put it in the record of the subcommittee. And there was no one there to object.” Here is amazing unedited footage of that night:
7More

How Israel helps eavesdrop on US citizens | The Electronic Intifada - 0 views

  • It is well-known that the two largest American telecom companies AT&T and Verizon collaborated with the US government to allow illegal eavesdropping on their customers. The known uses to which information obtained this way has been put include building the government’s massive secret “watch lists,” and “no-fly lists” and even, Bamford suggests, to deny Small Business Administration loans to citizens or reject their children’s applications to military colleges. What is less well-known is that AT&T and Verizon handed “the bugging of their entire networks — carrying billions of American communications every day” to two companies founded in Israel. Verint and Narus, as they are called, are “superintrusive — conducting mass surveillance on both international and domestic communications 24/7,” and sifting traffic at “key Internet gateways” around the US.
  • Virtually all US voice and data communications and much from the rest of the world can be remotely accessed by these companies in Israel, which Bamford describes as “the eavesdropping capital of the world.” Although there is no way to prove cooperation, Bamford writes that “the greatest potential beneficiaries of this marriage between the Israeli eavesdroppers and America’s increasingly centralized telecom grid are Israel’s intelligence agencies.” Israel’s spy agencies have long had a revolving-door relationship with Verint and Narus and other Israeli military-security firms. The relationship is particularly close between the firms and Israel’s own version of the NSA, called “Unit 8200.”
  • Israeli companies seeking a share of massively expanded US intelligence budgets formed similarly incestuous relationships with some in the American intelligence establishment: Ken Minihan, a former director of the NSA, served on Verint’s “security committee” and the former Federal Bureau of Investigation (FBI) official responsible for liaison with the telecom industry became head of the Verint unit that sold eavesdropping equipment to the FBI and NSA.
  • ...4 more annotations...
  • FISA — the Foreign Intelligence Surveillance Act of 1978 — required the government to seek court warrants for wiretaps where at least one target was in the US. In 2005, it was revealed that the Bush administration had been flagrantly violating this law. Last July, Congress passed a bill legalizing this activity and giving retroactive immunity to the telecom companies that had assisted.
  • Israel has a well-established record of compromising American national security. The most notorious case was that of convicted spy Jonathan Pollard. Although the full details of his crimes are still secret, he is thought to have passed critical information about US intelligence-gathering methods to Israel, which then traded those secrets to US adversaries. In 2005, Larry Franklin, a Defense Department analyst, pleaded guilty to spying for Israel. Most recently, Ben-Ami Kadish, a retired US army engineer, was indicted in April for allegedly passing classified documents about US nuclear weapons to Israel from 1979 to 1985. Two former officials of AIPAC, the pro-Israel lobbying group, are still awaiting trial on charges that they passed classified information between Franklin and the Israeli government.
  • Nor have particular Israeli firms established a record of trustworthiness that would justify such complacency. Jacob “Kobi” Alexander, the former Israeli intelligence officer who founded Verint, fled the US to Israel in 2006 just before he and other top executives of a subsidiary were indicted for fraud that allegedly cost US taxpayers and company shareholders $138 million. Alexander eventually adopted a fake identity and hid in the southern African country of Namibia where he is now fighting extradition
  • Israeli companies do not assist the US only to spy on its own citizens, of course. Another Israeli firm, Natural Speech Communication (NSC), among whose directors is former Mossad chief Shabtai Shavit, makes software that the US uses to electronically analyze and key-word search recorded conversations in “Levantine Arabic,” the dialects “spoken by Israeli Arabs, Jordanians, Lebanese and Palestinians.” Mexico and Australia are among other countries known to use Israeli technologies and firms to eavesdrop on their citizens.
6More

White House refuses to hand over top-secret documents to Senate committee | World news ... - 0 views

  • The White House is refusing to hand over top-secret documents to a Senate investigation into CIA torture and rendition of terrorism suspects, claiming it needs to ensure that “executive branch confidentiality” is respected.In the latest development in the spiralling clash between Congress and the administration over oversight of the intelligence agencies, Barack Obama’s spokesman Jay Carney confirmed that certain material from the George W Bush presidency was being withheld for fear of weakening Oval Office privacy.“This is about precedent, and the need, institutionally, to protect some of the prerogatives of the executive branch – and the office of the presidency,” said Carney.“All of these documents pertain to and come from a previous administration, but these are matters that need to be reviewed in light of long-recognised executive prerogatives and confidentiality interests.”
  • A report published by McClatchy newspapers on Wednesday night said that Senate investigators were trying to obtain an estimated 9,400 such documents relating to CIA detention and interrogation after 9/11.
  • In public, the White House has tried to stay out of a growing constitutional clash between Congress and the CIA over alleged interference in the investigation. Reuters reported that the White House chief lawyer, Kathryn Ruemmler, had tried to mediate in private between both sides in an attempt to “de-escalate” the tension.But the admission that the White House is withholding key documents is likely to renew criticism that the Obama administration is failing to live up to promises to fully investigate a dark chapter in CIA history.
  • ...2 more annotations...
  • Udall said he had lifted a procedural obstacle he had placed on the CIA’s nominee for its next general counsel, Caroline Krass. That sets up the departure of its acting senior attorney, Robert Eatinger, who is at the centre of this week’s extraordinary battle between the Senate intelligence committee and the CIA.Krass had already cleared the Senate committee, but Udall put her on hold to gain leverage for the committee in its struggle for access to CIA documents relevant to its extensive study of the agency’s post-9/11 interrogation, rendition and detention program, which involved torture.The Senate voted Thursday to confirm Krass, sending her to Langley at a time when relations between the CIA and the Senate have reached a nadir. While Eatinger was never going to be the agency’s permanent general counsel, he is now the first explicit casualty in the row between the CIA and its Senate overseers.Eatinger, a longtime agency lawyer with counterterrorism experience, was cited on Monday by the panel’s chairwoman, Dianne Feinstein of California, in her seminal speech lashing out at the CIA. Without naming him, Feinstein indicated he was instrumental in the agency’s now-abandoned torture practices, and had been cited over 1,600 times in the classified Senate torture investigation.
  • Feinstein said Eatinger, whom senators have taken care not to name, had alerted the Justice Department to her staff’s removal of a CIA document from a classified facility – which both Feinstein and Udall cite as a conflict of interest.Ahead of Krass’s arrival at the CIA, Udall called on Eatinger to immediately recuse himself from any internal matters related to either the torture inquiry or the Senate panel generally. “We need to correct the record on the CIA’s coercive detention and interrogation program and declassify the Senate intelligence committee’s exhaustive study of it. I released my hold on Caroline Krass’s nomination today and voted for her to help change the direction of the agency,” Udall said in a statement on Thursday.
  •  
    6 million documents. Which means that the Administration chose the time-proven tactic of emptying wastebaskets to have *something* to talk about in defense of withholding the truly damning documents. The Senate committee asked for Swiss Cheese; the administration provided only the cheese's holes. 6,400 documents is far more than the Administration will hold back if this issue winds up in court because of the truly staggering paperwork burden placed on the Administration by procedures for subpoena cases. The White House will have the burdens of proof and persuasion, with a strong presumption favoring production of the records.  For a good quick overview of the governing law and its constitutional history, see the D.C. Circuit's opinion In re sealed Case, 121 F. 3d 729 (1997),  http://scholar.google.com/scholar_case?case=7608826439463067791
4More

State Dept: Clinton's personal email use 'not acceptable' | TheHill - 0 views

  • Former Secretary of State Hillary Clinton’s use of a personal email account run through a private server was "not acceptable" and happened without officials’ knowledge, a top State Department record-keeper said on Wednesday. “I think the message is loud and clear that that is not acceptable,” Joyce Barr, the State Department’s assistant secretary for the Bureau of Administration, testified before the Senate Judiciary Committee.
  • “The actions that we’ve taken in the course of recovering these emails has made it very clear what the responsibilities are with regard to record-keeping,” she added in remarks at a Senate Judiciary Committee hearing on government transparency.Clinton’s use of the private email server has enraged Republicans and government transparency advocates, who fear it allowed one of the nation’s top officials to keep her messages secret. The behavior was not revealed just a few months ago, more than a year after Clinton left the State Department, and as she began laying the groundwork for a White House run.“These kinds of things just absolutely undermine the confidence of the American people,” said Sen. Thom Tillis (R-N.C.). “It was a bad decision. I hope that we go so far as to say that, if you do this in the future, you get fired.”Worse, he said, Clinton’s email practices were likely indicative of broader misuse of records preservation within the government.
  • “What really bothers me is when people plan, in a premeditated and deliberate sort of way, to avoid the Freedom of Information Act and federal government requirements that require them to make public information available to the public,” Sen. John Cornyn (R-Texas) said on Wednesday.Barr told lawmakers she had “no information” about how Clinton used the private server and was “not aware of the practice” ahead of time.Clinton has said that she had determined that roughly half of the 60,000 emails sent through her personal account were official government business and should be turned over to the government for safekeeping. The rest of them were deleted, she said. However, that determination was made by Clinton’s team alone, Barr acknowledged, and federal officials essentially have to take her word that all relevant communications are in the government's hands. “We have been told that she has provided those to us,” she said.
  • ...1 more annotation...
  • The State Department has previously said Clinton did not send or receive classified emails through her personal email account, and the former top diplomat has also attempted to reassure the public about the security of the system. Still, many outside analysts remain unconvinced about the security of the system, which would seem to invite hackers from foreign nations and criminal groups. Barr said she did “not have information” about the security protocols, and was “perhaps” concerned about its possible vulnerability.“Well, I would hope it would concern all of us,” Cornyn responded. “I’ll just tell you it concerns me a lot.”
4More

NASA's Secret Relationships with U.S. Defense and Intelligence Agencies - 0 views

  • Declassified Records Trace the Many Hidden Interactions Between the U.S. Civilian and National Security Space Programs Secret Cooperation Punctuated by Disputes over Budgets, Encryption of Scientific Data, and Fallout from the Challenger Tragedy National Security Archive Electronic Briefing Book No. 509
  • Furnishing cover stories for covert operations, monitoring Soviet missile tests, and supplying weather data to the U.S. military have been part of the secret side of the National Aeronautics and Space Administration (NASA) since its inception in 1958, according to declassified documents posted for the first time today by the National Security Archive at The George Washington University (www.nsarchive.org). James E. David, a curator in NASA's Division of Space History, obtained the documents in the course of researching his critically praised book, Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA (University Press of Florida, 2015). David has compiled, edited and introduced more than 50 of these records for today's posting. Even though Congress's intention in forming NASA was to establish a purely civilian space agency, according to David a combination of circumstances led the agency to commingle its activities with black programs operated by the U.S. military and Intelligence Community. This often tight cooperation did not, however, keep disputes from bubbling over on issues such as cost sharing, access to classified information, encryption of data originally intended for civilian use, and delays to military satellite launches caused by the Challenger disaster. Over the years, classification restrictions have kept most of the story of NASA's secret activities out of the public eye. Today's posting brings to light previously unpublished primary source material that underpins Spies and Shuttles and other important literature on the subject. The records were acquired through agency declassification review procedures, specific declassification requests, and archival research.
  • The documents presented here were obtained in the research and writing of Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA. Most were declassified by agencies under the automatic/systematic declassification review program or acquired through declassification requests. They are grouped into the following categories: NASA as a consumer of intelligence NASA's assistance to analyzing intelligence on foreign aeronautical and space programs NASA's participation in cover stories NASA's acquisition and use of classified technologies in its lunar exploration program Restrictions on NASA's remote sensing programs NASA's application satellites and national security requirements Space Shuttle
  •  
    For some reason, proponents of space exploration have a tendency to frame their arguments as an issue of moral necessity for human species preservation, often because self-extinction is likely. It's a weak argument. One can more forcefully argue that homo sapiens has no moral right to migrate outside the planet until such time as it learns to not destroy its own life support systems on Earth; in the meantime, the incredible funding devoted to space exploration would be better spent learning that lesson. But evidence of NASA ties to the Dark State, which has often come to mind when reading such drivel, has been wanting. Now we learn that it does exist but had been concealed. In light of these disclosures, we can discuss the moral issues with more clarity. But still missing: the obvious overlap of NASA's mission with the development of ICBMs and deployment of orbiting weapons platforms.   
2More

UNSEALED: The US Sought Permission To Change The Historical Record Of A Public Court Pr... - 0 views

  • A few weeks ago we fought a battle for transparency in our flagship NSA spying case, Jewel v. NSA. But, ironically, we weren't able to tell you anything about it until now. On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to “remove” classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so. We rightly considered this an outrageous request and vigorously opposed it. The public has a First Amendment right not only to attend the hearing but to have an accurate transcript of it. Moreover, the federal law governing court reporting requires that “each session of the court” be “recorded verbatim” and that the transcript be certified by the court reporter as “a correct statement of the testimony taken and the proceedings had.” 28 U.S.C. § 753(b).
  • The Court allowed the government a first look at the transcript and indicated that it was going to hold the government to a very high standard and would not allow the government to manufacture a misleading transcript by hiding the fact of any redactions. Ultimately, the government said that it had *not* revealed classified information at the hearing and removed its request. But the incident speaks volumes about the dangers of allowing the government free rein to claim secrecy in court proceedings and otherwise. We couldn't tell you anything about that fight because the government's request, our opposition to it, and the court's order regarding it were all sealed. But with today's order by Judge White, the transcript and the arguments over the government's request to revise it are finally public documents. Here's how the events transpired:
5More

Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s - NYTimes.com - 0 views

  • For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
  • The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant. The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.
  • The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years. Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.
  • ...1 more annotation...
  • The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.
  •  
    "Hemisphere covers every call that passes through an AT&T switch - not just those made by AT&T customers[.]"  I meant to bookmark this one back when but missed doing it.
6More

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
8More

Ron Wyden: the future of NSA programs is being determined now | World news | theguardia... - 0 views

  • Privacy advocates pressed Barack Obama to end the bulk collection of Americans’ communications data at a series of meetings at the White House on Thursday, seizing their final chance to convince him of the need for meaningful reform of sweeping surveillance practices. A key US senator left one meeting at the White House with the impression that President Obama has yet to decide on specific reforms. “The debate is clearly fluid,” senator Ron Wyden of Oregon, a longtime critic of bulk surveillance, told the Guardian after the meeting. “My sense is the president, and the administration, is wrestling with these issues,” Wyden said. Other groups were meeting presidential aides on Thursday afternoon, including the representatives of the American Civil Liberties Union, the Electronic Privacy Information Center (Epic) and the Open Technology Institute. Expectations were mounting that Obama will propose changing the National Security Agency’s controversial database of all domestic phone call records.
  • Wyden, a member of the Senate intelligence committee, said he viewed the coming days and weeks, ahead of an announcement by Obama about the future scope of surveillance, to be decisive for the debate triggered by NSA whistleblower Edward Snowden.  “What I’d say to Americans is that the future of these programs is being determined now,” Wyden said. “For those like me, who believe that security and liberty are not mutually exclusive, this is the time to weigh in.”
  • Speaking after the meeting with legislators, White House spokesman Jay Carney described the conversation as an opportunity for Obama to “solicit their input”, rather than brief them on his decisions about the future scope of surveillance activities.  The White House held meetings on Wednesday with the leadership of the intelligence agencies, including NSA director Keith Alexander and director of national intelligence James Clapper, as well as with Obama’s privacy and civil liberties advisory group. On Friday, Obama’s staff is expected to meet representatives of major technology firms, ostensibly to continue deliberations.  Shortly before the legislators’ meeting began, two of the attendees, House intelligence committee leaders Mike Rogers of Michigan and Dutch Ruppersberger of Maryland, issued a statement describing a classified Defense Department report that they said alleged that Snowden’s leaks –which they said totaled 1.7m intelligence files and impacted intelligence operations of all military branches – could “gravely impact” US national security. 
  • ...4 more annotations...
  • A spokesman for the Defense Intelligence Agency, which spearheaded the report, said the report was an “initial assessment”, and the work of the Information Review Task Force was “ongoing”. But neither the House intelligence committee leaders nor the DIA would provide additional information substantiating the allegations of Snowden’s impact.  “The report is classified and is not releasable,” said the DIA spokesman, who would not agree to be quoted by name. The classified interim assessment was delivered to the House and Senate intelligence committees on 6 January, and the DIA spokesman said there is no deadline for a final report, nor a mandate to make such a report public. 
  • Snowden's attorney, Ben Wizner, described the report as an attack on the journalism produced by the Snowden disclosures. "In truth, Mike Rogers is only indirectly attacking Snowden. He’s directly attacking the journalists who have reported on these revelations. There is not a shred of evidence that any adversary has had any access to any document other than those published by journalists, and they haven't contradicted that," Wizner told the Guardian. "We shouldn’t have any confidence in the accuracy of this innuendo. The government has shown time and again they have very little idea of what Snowden had access to."
  • Speaking outside the White House after a separate meeting with Obama, senator Rand Paul also stepped up his calls for government leniency toward Snowden, contrasting his treatment with Clapper, who has admitted misleading the Senate about surveillance. "Those who call for some sort of frontier justice for [Snowden] need to understand the laws needs to apply equally," Paul told reporters. "James Clapper by all accounts committed perjury which is punishable by five years in prison and if you want to throw the book at Snowden, it's a little hard to say 'Oh, but we're not going to do anything about James Clapper lying to Congress.'"
  • Asked if he was making a direct comparison, Paul added: "It's not my job to compare them or contrast what they did, but what James Clapper did has greatly harmed the credibility of the intelligence agencies ... he has really greatly damaged the intelligence community. It's arguable." After meeting with Obama, Wyden saw the debate over surveillance winding toward a conclusion. “This is crunch time. The decisions are going to be made in the very near future,” Wyden said. “The president made clear he wanted to hear from us. I’m going to keep urging members of Congress and the public to stand on the side of real reform and end intrusive surveillance practices that in effect violate the liberties of our people without making us safer.”
  •  
    Wyden  says it's time to get involved. Wyden is one of my senators and is about to get an email informing him that if he believes Barack Obama is the person who will decide this issue, he'd better think that over a bit more.  
11More

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
7More

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National Security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
6More

Moussaoui Calls Saudi Princes Patrons of Al Qaeda - NYTimes.com - 0 views

  • In highly unusual testimony inside the federal supermax prison, a former operative for Al Qaeda has described prominent members of Saudi Arabia’s royal family as major donors to the terrorist network in the late 1990s and claimed that he discussed a plan to shoot down Air Force One with a Stinger missile with a staff member at the Saudi Embassy in Washington.The Qaeda member, Zacarias Moussaoui, wrote last year to Judge George B. Daniels of United States District Court for the Southern District of New York, who is presiding over a lawsuit filed against Saudi Arabia by relatives of those killed in the Sept. 11, 2001, terrorist attacks. He said he wanted to testify in the case, and after lengthy negotiations with Justice Department officials and the federal Bureau of Prisons, a team of lawyers was permitted to enter the prison and question him for two days last October.
  • He said in the prison deposition that he was directed in 1998 or 1999 by Qaeda leaders in Afghanistan to create a digital database of donors to the group. Among those he said he recalled listing in the database were Prince Turki al-Faisal, then the Saudi intelligence chief; Prince Bandar Bin Sultan, the longtime Saudi ambassador to the United States; Prince al-Waleed bin Talal, a prominent billionaire investor; and many of the country’s leading clerics.“Sheikh Osama wanted to keep a record who give money,” he said in imperfect English — “who is to be listened to or who contributed to the jihad.”Mr. Moussaoui said he acted as a courier for Bin Laden, carrying personal messages to prominent Saudi princes and clerics. And he described his training in Qaeda camps in Afghanistan.
  • Transcripts of testimony by Zacarias Moussaoui, a former Qaeda operative, under questioning over two days in October by lawyers in a suit filed against Saudi Arabia by relatives of 9/11 victims. Exhibit 5 Exhibit 6 Exhibit 7 Exhibit 8
  • ...3 more annotations...
  • He helped conduct a trial explosion of a 750-kilogram bomb as a trial run for a planned truck-bomb attack on the American Embassy in London, he said, using the same weapon used in the Qaeda attacks in 1998 on the American Embassies in Kenya and Tanzania. He also studied the possibility of staging attacks with crop-dusting aircraft.In addition, Mr. Moussaoui said, “We talk about the feasibility of shooting Air Force One.” Specifically, he said, he had met an official of the Islamic Affairs Department of the Saudi Embassy in Washington when the Saudi official visited Kandahar. “I was supposed to go to Washington and go with him” to “find a location where it may be suitable to launch a Stinger attack and then, after, be able to escape,” he said.
  • Also filed on Monday in the survivors’ lawsuit were affidavits from former Senators Bob Graham of Florida and Bob Kerrey of Nebraska and the former Navy secretary John Lehman, arguing that more investigation was needed into Saudi ties to the 9/11 plot. Mr. Graham was co-chairman of the Joint Congressional Inquiry into the attacks, and Mr. Kerrey and Mr. Lehman served on the 9/11 Commission.
  • “I am convinced that there was a direct line between at least some of the terrorists who carried out the Sept. 11 attacks and the government of Saudi Arabia,” wrote Mr. Graham, who has long demanded the release of 28 pages of the congressional report on the attacks that explore Saudi connections and remain classified.Mr. Kerrey said in the affidavit that it was “fundamentally inaccurate and misleading” to argue, as lawyers for Saudi Arabia have, that the 9/11 Commission exonerated the Saudi government.
18More

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
1More

Judicial Watch: Huma Abedin Emails Reveal Transmission of Classified Information and Cl... - 0 views

  • Judicial Watch today released 1,606 pages of documents from the U.S. Department of State revealing repeated use of unsecured communications for classified information and numerous examples of Clinton Foundation donors receiving special favors from former Secretary of State Hillary Clinton’s staff. The documents, containing emails from the unsecure, non-government account of Huma Abedin, Clinton’s then-deputy chief of staff, also show Clinton or her staff expressing interest in visiting Venezuelan dictator Hugo Chavez and North Korean dictator Kim Jung II. The documents included 91 Clinton email exchanges not previously turned over to the State Department, bringing the known total to date to at least 530 emails that were not part of the 55,000 pages of emails that Clinton turned over to the State Department, and further contradicting a statement by Clinton that, “as far as she knew,” all of her government emails had been turned over to the State Department. The documents were obtained in response to a court order from a May 5, 2015, lawsuit filed against the State Department (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)) after it failed to respond to a March 18, 2015, Freedom of Information Act (FOIA) request seeking: “All emails of official State Department business received or sent by former Deputy Chief of Staff Huma Abedin from January 1, 2009 through February 1, 2013 using a non-‘state.gov’ email address.”
« First ‹ Previous 41 - 60 of 138 Next › Last »
Showing 20 items per page