twitter:ForumNetwork twitterde op maandag 19-05-2014 om 15:41:49The conversation btwn @ggreenwald and Noam Chomsky on Edward Snowden & the NSA is up: http://t.co/Fo397erv0t reageer retweet
quote:
quote:The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.
According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.
SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.
The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”
Het artikel gaat verder.quote:The NSA documents dont specify who is providing access in the Bahamas. But they do describe SOMALGET as an umbrella term for systems provided by a private firm, which is described elsewhere in the documents as a MYSTIC access provider. (The documents dont name the firm, but rather refer to a cover name that The Intercept has agreed not to publish in response to a specific, credible concern that doing so could lead to violence.)
quote:Op maandag 19 mei 2014 19:55 schreef Papierversnipperaar het volgende:
[..]
[..]
[..]
Het artikel gaat verder.
twitter:wikileaks twitterde op dinsdag 20-05-2014 om 00:35:47@GGreenwald @johnjcook We will reveal the name of the censored country whose population is being mass recorded in 72 hours. reageer retweet
quote:Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
For the first time, the founder of an encrypted email startup that was supposed to insure privacy for all reveals how the FBI and the US legal system made sure we don't have the right to much privacy in the first place
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
My company, Lavabit, provided email services to 410,000 people – including Edward Snowden, according to news reports – and thrived by offering features specifically designed to protect the privacy and security of its customers. I had no choice but to consent to the installation of their device, which would hand the US government access to all of the messages – to and from all of my customers – as they travelled between their email accounts other providers on the Internet.
But that wasn't enough. The federal agents then claimed that their court order required me to surrender my company's private encryption keys, and I balked. What they said they needed were customer passwords – which were sent securely – so that they could access the plain-text versions of messages from customers using my company's encrypted storage feature. (The government would later claim they only made this demand because of my "noncompliance".)
Bothered by what the agents were saying, I informed them that I would first need to read the order they had just delivered – and then consult with an attorney. The feds seemed surprised by my hesitation.
What ensued was a flurry of legal proceedings that would last 38 days, ending not only my startup but also destroying, bit by bit, the very principle upon which I founded it – that we all have a right to personal privacy.
In the first two weeks, I was served legal papers a total of seven times and was in contact with the FBI every other day. (This was the period a prosecutor would later characterize as my "period of silence".) It took a week for me to identify an attorney who could adequately represent me, given the complex technological and legal issues involved – and we were in contact for less than a day when agents served me with a summons ordering me to appear in a Virginia courtroom, over 1,000 miles from my home. Two days later, I was served the first subpoena for the encryption keys.
With such short notice, my first attorney was unable to appear alongside me in court. Because the whole case was under seal, I couldn't even admit to anyone who wasn't an attorney that I needed a lawyer, let alone why. In the days before my appearance, I would spend hours repeating the facts of the case to a dozen attorneys, as I sought someone else that was qualified to represent me. I also discovered that as a third party in a federal criminal indictment, I had no right to counsel. After all, only my property was in jeopardy – not my liberty. Finally, I was forced to choose between appearing alone or facing a bench warrant for my arrest.
In Virginia, the government replaced its encryption key subpoena with a search warrant and a new court date. I retained a small, local law firm before I went back to my home state, which was then forced to assemble a legal strategy and file briefs in just a few short days. The court barred them from consulting outside experts about either the statutes or the technology involved in the case. The court didn't even deliver transcripts of my first appearance to my own lawyers for two months, and forced them to proceed without access to the information they needed.
Then, a federal judge entered an order of contempt against me – without even so much as a hearing.
But the judge created a loophole: without a hearing, I was never given the opportunity to object, let alone make any any substantive defense, to the contempt change. Without any objection (because I wasn't allowed a hearing), the appellate court waived consideration of the substantive questions my case raised – and upheld the contempt charge, on the grounds that I hadn't disputed it in court. Since the US supreme court traditionally declines to review decided on wholly procedural grounds, I will be permanently denied justice.
In the meantime, I had a hard decision to make. I had not devoted 10 years of my life to building Lavabit, only to become complicit in a plan which I felt would have involved the wholesale violation of my customers' right to privacy. Thus with no alternative, the decision was obvious: I had to shut down my company.
The largest technological question we raised in our appeal (which the courts refused to consider) was what constitutes a "search", i.e., whether law enforcement can demand the encryption keys of a business and use those keys to inspect the private communications of every customer, even when the court has only authorized them to access information belonging to specific targets.
The problem here is technological: until any communication has been decrypted and the contents parsed, it is currently impossible for a surveillance device to determine which network connections belong to any given suspect. The government argued that, since the "inspection" of the data was to be carried out by a machine, they were exempt from the normal search-and-seizure protections of the Fourth Amendment.
More importantly for my case, the prosecution also argued that my users had no expectation of privacy, even though the service I provided – encryption – is designed for users' privacy.
If my experience serves any purpose, it is to illustrate what most already know: courts must not be allowed to consider matters of great importance under the shroud of secrecy, lest we find ourselves summarily deprived of meaningful due process. If we allow our government to continue operating in secret, it is only a matter of time before you or a loved one find yourself in a position like I did – standing in a secret courtroom, alone, and without any of the meaningful protections that were always supposed to be the people's defense against an abuse of the state's power.
quote:Restrictions placed on NSA's data store after intense talks over surveillance bill
USA Freedom Act heads to the House with government required to 'promptly' purge phone records that do not contain 'foreign intelligence information'
Last-minute negotiations over the details of a congressional surveillance bill have resulted in restrictions around the National Security Agency’s massive repository of analysed call data.
Intense closed-door talks between lawmakers and Obama administration and intelligence officials that wrapped up Tuesday afternoon have finalised the language of the USA Freedom Act. The bill is expected to receive a vote on the House floor on Thursday.
The latest twist for the bill is an expanded provision that would require the government to “promptly” purge phone records that do not contain “foreign intelligence information,” effectively pruning irrelevant records from the NSA’s trees of analyzed phone data.
But several other changes to the bill, which civil libertarians already considered watered down after a series of legislative compromises, have cost it critical support from privacy groups ahead of Thursday’s vote.
Under the new provision, the government would have to “adopt minimisation procedures that require the prompt destruction of all call detail records” turned over by the telecoms firms “that the government determines are not foreign intelligence information.”
The government would ultimately have to “destroy all call detail records produced under the order as prescribed by such procedures”.
A previous version of that language tasked the government merely with destroying call records “not later than five years after the production of such records, except for records that are relevant to an authorised investigation.”
While several privacy protections within the USA Freedom Act have been diluted in recent weeks, several people familiar with the negotiations said they thought the new provision better protects privacy than the old one, as it represents the first known restriction on the NSA’s “corporate store” of analysed data.
The “corporate store” is the digital warehouse where the NSA stores all the US call records it has amassed when searching for connections to the target phone numbers it believes may be tied to specific terrorist groups. Until this year, data up to three “hops” from such a phone number was fit for inclusion in the store.
Once data is placed in the store, NSA analysts face virtually no restrictions on their ability to search through it.
“NSA may apply the full range of Sigint [signals intelligence] analytic tradecraft” to phone records placed in the store, according to a footnote in a Fisa court order declassified by the government last year. Searches through data placed in the corporate store can occur “without the requirement” that reasonable articulable suspicion of connection to wrongdoing exist; nor is the NSA required to keep an “auditable record” of searches performed within the corporate store.
The amount of data contained within the corporate store is voluminous. A January report from the US government’s civil liberties watchdog estimated that the 300 searches of Americans’ phone data the NSA said it performed in 2012 would yield “records involving over 120m phone numbers” in that year alone.
The watchdog, the Privacy and Civil Liberties Oversight Board, recommended that the NSA have to possess the same “reasonable articulable suspicion” to search data in the corporate store as it must to analyse phone records once collected.
Until now, the USA Freedom Act, increasingly the consensus bill for surveillance reforms, left the “corporate store” alone.
Under the bill, the government would no longer collect call records in bulk. But it would be permitted to acquire Americans’ phone data when a judge certifies that there is reasonable articulable suspicion of a connection to terrorism or foreign espionage, and it can collect phone records from the contacts of the contacts – two “hops” – of the original person or phone account the government targets.
The new language would apparently restrict the NSA from retaining data on the contacts of the targets not believed to have a connection to foreign intelligence information – what surveillance observers sometimes refer to as the “pizza guy” problem, where the NSA amasses data on random and irrelevant people or accounts connected to targets.
But the language does not define key terms, such as how long a record can be withheld before its “prompt” destruction. Nor does it specify how the government will “determine” a call record is unrelated to foreign intelligence information if, as can occur with the corporate store today, NSA’s automated programs sift through the data.
"Placing meaningful limits on the NSA's use of this vast pool of data is crucial to protecting Americans' privacy – and to any reform effort. Congress should not leave the NSA with a wide open backdoor to many of Americans' call records via the corporate store,” said Patrick Toomey, a lawyer with the American Civil Liberties Union, who has focused on the corporate store.
A deal on the corporate store restriction was easier to reach than over a different critical definition contained within the USA Freedom Act – one that defines the source of the records the government will be able to collect.
That category is a “specific selection term.” That is the root data from which the government must suspect of connection to terrorism or espionage to launch the collection of call records. Without possessing that term, the government cannot collect obtain the call records at issue.
The version of the USA Freedom Act that cleared House committees earlier this month defined it simply as a term that “uniquely describe[s] a person, entity, or account.”
But the version that will head to the floor, at the Obama administration’s insistence, has broadened the definition, opening the door to broader data collection than the bill’s architect’s initially envisioned.
The bill now defines a “specific selection term” as “a discrete term, such as a term specifically identifying a person, entity, account, or device, used by the government to limit the scope of the information or tangible things sought.”
Sources familiar with the process said the government had pushed for an even broader definition.
Privacy groups had already watched with dismay as their favored bill gradually grew less restrictive on the NSA and its transparency requirements about what recipients of surveillance orders can disclose to their customers became weaker.
But after the finalized bill was released on Tuesday, the USA Freedom Act lost the support of the Open Technology Institute, which had strenuously advocated in its favor since its October introduction in the House.
“We cannot in good conscience support this weakened version of the bill, where key reforms – especially those intended to end bulk collection and increase transparency – have been substantially watered down,” policy director Kevin Bankston said in a statement.
“We're gravely disappointed that rather than respecting the wishes of the unanimous Judiciary and Intelligence Committees, the House leadership and the Obama Administration have chosen to disrupt the hard-fought compromise that so many of us were willing to support just two weeks ago.”
Amie Stepanovich, a lawyer with the digital-rights group Access, which also revoked its support for the bill, said: "It’s greatly disappointing to witness House leaders succumb to the pressure applied by the Obama administration and others, turning its back on the compromise version of USA Freedom that so many supported just two weeks ago."
Julian Sanchez of the Cato Institute tweeted: "So, seems like nobody’s happy with New Coke USA FREEDOM, but resigned to the alternative being [the House intelligence committee's] (even worse) bill."
quote:
Het artikel gaat verder.quote:While the initial disclosures by Edward Snowden revealed how US authorities are conducting mass surveillance on the world's communications, further reporting by the Guardian newspaper uncovered that UK intelligence services were just as involved in this global spying apparatus. Faced with the prospect of further public scrutiny and accountability, the UK Government gave the Guardian newspaper an ultimatum: hand over the classified documents or destroy them.
The Guardian decided that having the documents destroyed was the best option. By getting rid of only the documents stored on computers in the UK, it would allow Guardian journalists to continue their work from other locations while acquiescing to the Government's demand. However, rather than trust that the Guardian would destroy the information on their computers to the Government's satisfaction, GCHQ sent two representatives to supervise the operation. Typically, reliable destruction of such hardware in the circumstances would be to shred or melt all electronic components using a much larger version of the common paper shredder and leaving only the dust of the original devices. Indeed, some devices such as external USB sticks were turned to dust.
Alternatively, it might have been expected that GCHQ would solely target the hard drives of the devices in question. The hard drives, after all, are one of the few components of a computer where user data is supposed to be retained after the power to the device is removed.
Surprisingly, however, GCHQ were not just interested in hard drives nor did they destroy whole devices. An examination of the targeted hardware by Privacy International, with cooperation from the Guardian, has found the whole episode to be more troubling and puzzling than previously believed. 1
During our invesitgation, we were surprised to learn that a few very specific components on devices, such as the keyboard, trackpad and monitor, were targeted along with apparently trivial chips on the main boards of laptops and desktops. Initial consultation with members of the technology community supported our identification of the components and that the actions of GCHQ were worth analyzing further.
In light of GCHQ's actions, we have asked hardware manufacturers to explain what these elements actually do: what information can be stored on a device, how much information it can retain, and for how long.
quote:
quote:Greenwald was the go-between for Edward Snowden and some of the newspapers that reported on Snowdens collection of classified documents exposing huge eavesdropping by the National Security Agency, among other scandals. His story is full of journalistic derring-do, mostly set in exotic Hong Kong. Its a great yarn, which might be more entertaining if Greenwald himself didnt come across as so unpleasant. Maybe hes charming and generous in real life. But in No Place to Hide, Greenwald seems like a self-righteous sourpuss, convinced that every issue is straightforward, and if you dont agree with him, youre part of something he calls the authorities, who control everything for their own nefarious but never explained purposes.
The Intercept:quote:The trouble is this: Greenwald says that Snowden told him to use your journalistic judgment to only publish those documents that the public should see and that can be revealed without harm to any innocent people. Once again, this testimony proves the opposite of what Greenwald and Snowden seem to think. Snowden may be willing to trust Greenwald to make this judgment correctly but are you? And even if you do trust Greenwalds judgment, which on the evidence might be unwise, how can we be sure the next leaker will be so scrupulous?
The question is who decides. It seems clear, at least to me, that the private companies that own newspapers, and their employees, should not have the final say over the release of government secrets, and a free pass to make them public with no legal consequences. In a democracy (which, pace Greenwald, we still are), that decision must ultimately be made by the government. No doubt the government will usually be overprotective of its secrets, and so the process of decision-making whatever it turns out to be should openly tilt in favor of publication with minimal delay. But ultimately you cant square this circle. Someone gets to decide, and that someone cannot be Glenn Greenwald.
quote:
quote:Kinsley has actually done the book a great favor by providing a vivid example of so many of its central claims. For instance, I describe in the book the process whereby the government and its media defenders reflexively demonize the personality of anyone who brings unwanted disclosure so as to distract from and discredit the substance revelations; Kinsley dutifully tells Times readers that I “come across as so unpleasant” and that I’m a “self-righteous sourpuss” (yes, he actually wrote that). I also describe in the book how jingoistic media courtiers attack anyone who voices any fundamental critiques of American political culture; Kinsley spends much of his review deriding the notion that there could possibly be anything anti-democratic or oppressive about the United States of America.
quote:So lets recap: The New York Times chose someone to review my book about the Snowden leaks who has a record of suggesting that journalists may be committing crimes when publishing information against the governments wishes. That journalist then proceeded to strongly suggest that my prosecution could be warranted. Other prominent journalists including the one who hosts Meet the Pressthen heralded that review without noting the slightest objection to Kinsleys argument.
Do I need to continue to participate in the debate over whether many U.S. journalists are pitifiully obeisant to the U.S. government? Did they not just resolve that debate for me? What better evidence can that argument find than multiple influential American journalists standing up and cheering while a fellow journalist is given space in The New York Times to argue that those who publish information against the governments wishes are not only acting immorally but criminally?
quote:The empire strikes back: How Brandeis foreshadowed Snowden and Greenwald
So-called liberals attack the whistle-blower duo -- and a brilliant Supreme Court justice saw it all coming
quote:In the famous wiretapping case Olmstead v. United States, argued before the Supreme Court in 1928, Justice Louis Brandeis wrote one of the most influential dissenting opinions in the history of American jurisprudence. Those who are currently engaged in what might be called the Establishment counterattack against Glenn Greenwald and Edward Snowden, including the eminent liberal journalists Michael Kinsley and George Packer, might benefit from giving it a close reading and a good, long think.
Brandeis’ understanding of the problems posed by a government that could spy on its own citizens without any practical limits was so far-sighted as to seem uncanny. (We’ll get to that.) But it was his conclusion that produced a flight of memorable rhetoric from one of the most eloquent stylists ever to sit on the federal bench. Government and its officers, Brandeis argued, must be held to the same rules and laws that command individual citizens. Once you start making special rules for the rulers and their police – for instance, the near-total impunity and thick scrim of secrecy behind which government espionage has operated for more than 60 years – you undermine the rule of law and the principles of democracy.
“Our Government is the potent, the omnipresent teacher,” Brandeis concluded. “For good or for ill, it teaches the whole people by its example. Crime is contagious. If the Government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy. To declare that in the administration of the criminal law the end justifies the means — to declare that the Government may commit crimes in order to secure the conviction of a private criminal — would bring terrible retribution.”
Het artikel gaat verder.quote:Any systematic opposition to the deeds of the state, and any attempt to interrogate its mysteries beyond the boundaries of the official narrative, is likely to be depicted as treasonous, as tinfoil-hat material or even as terrorism. Doing a series of network news interviews after McVeighs execution, Vidal describes how the interchangeable TV hosts handle anyone who tries to explain why something happened. First, he is asked whether he is claiming there was a conspiracy. A twinkle starts in a pair of bright contact lenses there is a wriggling of the body, followed by a tiny snort and a significant glance into the camera to show that the guest has just been delivered to the studio by flying saucer.
It would be obscene to suggest any parallel between Timothy McVeigh and Edward Snowden, but I dont have to. Defenders of the official narrative have already drawn the comparison, explicitly or otherwise. Both are loners with no history, manifestations of a libertarian loony-tunes personality disorder that of course cannot be explained and has no roots in anything the United States government ever did. (Packer devotes a lot of virtual ink to convincing his presumed liberal readership that Snowden is a fringe right-winger.) No doubt McVeigh is understood as more extreme, but he is also less dangerous because he is more easily dismissed as a child-killing lunatic, and in any case is not available for interviews with Brian Williams.
quote:
Het artikel gaat verder.quote:In early January, Micah Lee worried journalist Glenn Greenwald's computer would get hacked, perhaps by the NSA, perhaps by foreign spies.
Greenwald was a target, and he was vulnerable. He was among the first to receive millions of top secret NSA documents from former contractor Edward Snowden, a scoop that eventually helped win the most recent Pulitzer prize.
Though Greenwald took precautions to handle the NSA documents securely, his computer could still be hacked.
"Glenn isn't a security person and he's not a huge computer nerd,"
"Glenn isn't a security person and he's not a huge computer nerd," Lee tells Mashable. "He is basically a normal computer user, and overall, normal computer users are vulnerable."
Lee, 28, is the technologist hired in November to make sure Greenwald and fellow First Look Media employees use state-of-the-art security measures when handling the NSA documents, or when exchanging emails and online chats with sensitive information. First Look was born in October 2013, after eBay founder Pierre Omydiar pledged to bankroll a new media website led by Greenwald, with documentary journalists Laura Poitras and Jeremy Scahill.
Essentially, Lee is First Look's digital bodyguard, or as Greenwald puts it, "the mastermind" behind its security operations.
Lee’s position is rare in the media world. But in the age of secret-spilling and the government clampdown on reporters' sources, news organizations are aiming to strengthen their digital savvy with hires like him — that is, if they want to resist this new media reality.
"Every news organization should have a Micah Lee on their staff," Trevor Timm, executive director and cofounder of Freedom of the Press Foundation, tells Mashable.
quote:
quote:Edward Snowden is 'meer dan alleen een hacker of systeembeheerder', zoals de Amerikaanse regering en de media hem hebben afgeschilderd. Hij werkte undercover voor de CIA en de National Security Agency (NSA). Dat zei Snowden zelf in een interview met NBC Nightly News, dat gisteravond werd uitgezonden.
quote:Snowden ging verder: 'Ik ben een technisch specialist. Ik ben een technisch expert. Ik ontwikkelde systemen voor de Verenigde Staten. Dat heb ik op alle niveaus gedaan: vanaf het begin tot het einde.'
De klokkenluider zei dat hij buiten de VS voor zowel de CIA als de NSA lesgaf bij de 'Joint Counterintelligence Training Academy', 'waar ik bronnen en methoden ontwikkelde voor de veiligheid van onze informatie en mensen in de meest vijandige en gevaarlijke gebieden over de hele wereld', aldus Snowden. 'Dus als critici zeggen dat ik een simpele systeembeheerder ben en dat ik niet weet waar ik het over heb, zou ik zeggen dat dat een beetje misleidend is.'
quote:
quote:Many of these members of the press aren't thinking, certainly not in the way Hannah Arendt spoke of it. Their hostility is aimed at the people who "misbehave" by breaking the social rules rather than the government that carried on a clandestine spy operation that is clearly running amock and is working overtime to restrict the very work they are supposedly charged with doing. And appallingly, in many cases, it's simply because of what they see as a threat to their social hierarchy and their own clubby little rules of behavior.
quote:Top NSA officials struggled over surge in Foia requests, emails reveal
• Snowden leaks prompted thousands of open record requests
• Top agency officials discussed how to fend off Foia inquiries
National Security Agency officials wrestled for weeks with how to respond to an unprecedented surge in open records requests from members of the public in the wake of the first mass surveillance revelations from Edward Snowden almost a year ago.
Newly released NSA emails, obtained by the Guardian under a Freedom of Information Act (Foia) request filed last November, reveal that top officials discussed how to fend off journalists, advocacy groups and individuals who flooded the agency with more than 1,000 requests between 5 June and 25 June last year for classified data related to the former contractor’s disclosures.
The Guardian published the first Snowden story, revealing a secret court order that allowed the NSA the phone records of millions of US citizens, on 5 June. The following day, details of the Prism program were revealed by the Guardian and the Washington Post.
The NSA is one of the few US government agencies virtually exempt from open records laws because its activities are considered properly classified under a presidential executive order and many Foia exemptions.
But since details about the NSA’s vast surveillance activities were no longer a secret thanks to Snowden's disclosures, the agency didn’t know how to respond to requesters.
Internal discussions took place between a newly formed media leaks taskforce, NSA’s public affairs office, the office of general counsel, the policy and records division and the Foia office.
Pamela Phillips, the NSA’s Foia chief, suggested in one email that the agency could “buy more time for processing” if “a paper or sheet of unclassified facts” about the metadata and the data mining program, Prism, was released to requesters.
“Having a paper or sheet of unclassified facts that could be provided to the public may make it easier to respond, because we could provide that with initial responses, and then either indicate that all other details are still classified (or have to be reviewed),” Phillips wrote on 11 June 2013. “It may buy more time for processing if requesters get something up front.”
The NSA emails specifically deal with the agency’s response to post-Snowden document requests. There are some discussions between NSA officials about transparency, particularly president Barack Obama’s “direction regarding transparency in government”.
But, ironically, the internal communications the agency turned over to the Guardian are heavily redacted and are marked “top secret”or “secret”. Phillips said in a letter included with the documents that it would “cause exceptionally grave damage to national security” if the information were disclosed.
Still, the emails leave no doubt that Snowden prompted thousands to use open records laws to push the NSA to shine even more light on the controversial surveillance programs he exposed, an achievement that the agency continues to confront to this day.
“We have received over 5,200 requests since 6 June 2013," Phillips said in a recent interview. "We received just over 800 requests for the same period last year. For the one-year period from June 2012 through May 2013, we received an average of 83 requests per month. Since June 2013, we’ve received an average of 521 requests per month.”
In a 25 June 2013 email, David Sherman, the associate director for policy and records, advised the media leaks task force and nearly a dozen NSA officials whose names are redacted that the “the overwhelming majority” of records requests the NSA had received were “from individuals seeking records the NSA allegedly holds on them”.
He said there was “at least one website facilitating individual requests accounting for half the total. By way of example [redacted].”
The NSA refused to entertain requests from private citizens about whether the agency stored their metadata. The emails provide a rare look inside the development of a “neither confirm nor deny” policy, known as a “Glomar response”, and the back and forth discussions that took place at the highest levels of the agency.
“[Redacted] has pieced together some language on the recent press coverage that would allow us to make a reasonable response to individuals who are seeking information on themselves (either broadly stated as ‘all records on me,’ or more narrowly focused to information regarding their phone number, metadata, or phone calls,” Phillips wrote on 14 June to Sherman and other NSA officials.
“It still ends up being a Glomar response, but more focused on the programs at hand. It is consistent with how we’ve always treated requests from US persons for NSA information (other than Privacy Act information).”
On 17 June, Phillips sent an email asking: “What do we need to do to have this officially blessed so that I can provide this to my folks to start responding to the requests?”
Two days later, the NSA sent out about 300 of the Glomar letters to requesters that highlighted the legality of the surveillance programs at issue.
“Thanks for your reviews and assistance so that we can begin to work down the volume of requests we’ve received over the past week and a half,” Phillips wrote in an email sent to a dozen NSA officials, a majority of whose names are redacted.
Sherman sent an email to Phillips and several other officials congratulating her office and the office of general counsel for “doing an absolutely super job under difficult and rapidly changing conditions”.
“It’s confirming every day why NSA’s Foia program is called out as best-in-class,” Sherman added in the email with the subject line, 'Media Leaks: Strategic Guidance Needed on Engaging Foia Requesters.' “I’m the new guy and the amateur at all this, but for what it is worth I am extraordinarily proud and glad that I was offered the opportunity to be here with you at this time and see what is exceptional public service, in the true sense of the words, in action.”
Phillips shared the email with her staff the next day.
“Thought you’d like to see Dave’s vote of confidence for the entire Foia/PA staff! Dave and I and OGC met with [head of media leaks task force] Rick Ledgett yesterday afternoon to go over the Glomar process, and he was totally comfortable with it after the meeting, as well as everything else the Foia Office is doing,” she wrote.
Sherman advised the Foia office staff as well as the media leaks task force that journalists were a different breed, however, and the agency would need to come up with an alternative strategy to deal with media requests that, according to the NSA, were so “broad as to be impossible to respond to”.
“In the current context, the alternative of being portrayed in the media as unresponsive seems to carry too much risk,” he said.
He suggested that NSA Foia officials attempt to “negotiate” with the media and help them “focus” their requests so the NSA could meet “their needs … consistent with [the NSA’s] obligation to protect classified information”.
The “negotiations” included personal phone calls to the journalists, according to the emails.
Patrice McDermott of transparency organization OpenTheGovernment, who is due to testify in Congress on Thursday about the continued withholding of material despite Obama's transparency order, said a line in one of the NSA emails was concerning. In Phillips advises other NSA officials that the agency "can deny all classified and all FOUO [for official use only]" Foia requests on the Prism and metadata programs and "the rest we have to process."
McDermott told the Guardian that Obama's order “was clearly intended to stop the use of markings such as FOUO and to end the use of even accepted [controlled unclassified information] markings as automatic grounds for withholding information sought through Foia” hasn't yet been implemented. Agencies such as the NSA “are using the delay to inappropriately withhold information”.
"There is no Foia exemption for FOUO or other such made-up 'agency policies,' but that has not stopped them from invoking it as a reason to deny records," McDermott said.
Nate Jones, the Foia coordinator for George Washington University's National Security Archive, said the public should not be fooled by the NSA's attempts to portray the agency as being genuinely concerned with transparency.
“For those who believe the public has the right to know what information the NSA is allowed to collect the conclusion drawn in this case is that the Snowden leaks worked and the Freedom of Information Act did not,” he said.
quote:NSA releases email in dispute over Snowden 'internal whistleblowing'
• Leaker says he raised surveillance concerns internally
• Agency: email 'did not raise allegations or concerns'
The National Security Agency has disputed Edward Snowden's insistence that he made efforts to raise his concerns about its surveillance practices internally before he decided to go public.
Releasing an email exchange it claimed to be the only record it could find of such an effort by Snowden, the agency said on Thursday he was merely “asking for an explanation of some material that was in a training course he had just completed”.
Six months ago, the agency issued a statement saying it had “not found any evidence to support Mr Snowden's contention that he brought these matters to anyone's attention”.
The email exchange with the NSA's Office of General Counsel, dated April 2013, emerged after Snowden repeated his claim to have attempted an internal whistleblowing during an interview with NBC that aired on Wednesday night.
Snowden told interviewer Brian Williams: “I actually did go through channels, and that is documented. The NSA has records, they have copies of emails right now to their Office of General Counsel, to their oversight and compliance folks, from me raising concerns about the NSA’s interpretations of its legal authorities.
“The response, more or less, in bureaucratic language, was: ‘You should stop asking questions.’”
Snowden's description appears to match parts, if not all, of the newly emerged email, which was made public on Thursday via the Senate intelligence chair, Dianne Feinstein.
“Hello, I have a question regarding the mandatory USSID 18 training,” writes Snowden to a redacted address that appears to be in the Office of General Counsel.
He goes on to cite a list provided in the training that ranks presidential executive orders alongside federal statutes in the hierarchy of orders governing NSA behaviour.
“I'm not entirely certain, but this does not seem correct, as it seems to imply Executive Orders have the same precedence as law,” adds Snowden.
“My understanding is that EOs may be superseded by federal statute, but EO's may not override statute. Am I incorrect in this?”
In a reply which was cc'd to a number of redacted email addresses, Snowden is told by an unnamed individual that he is “correct that EO's cannot override a statute” but that they have the “force and effect of law”.
The issue is an important one in the context of whether NSA surveillance activities were permissible, as it addresses possible conflict between laws passed by Congress and orders given by the White House.
Senate intelligence committee members Ron Wyden and Mark Udall have long argued the administration may have been in breach of surveillance statutes in its activities. They were prevented from raising many of their concerns in public due to confidentiality requirements.
The NSA, however, disputes that this latest email exchange is proof of Snowden raising concerns about “interpretations of its legal authorities”.
“The email did not raise allegations or concerns about wrongdoing or abuse, but posed a legal question that the Office of General Counsel addressed,” said the agency in a statement released on Thursday.
It added: “There are numerous avenues that Mr Snowden could have used to raise other concerns or whistleblower allegations.
“We have searched for additional indications of outreach from him in those areas and to date have not discovered any engagements related to his claims.”
The denial was repeated by the White House, which went further than it normally does when asked by an NBC reporter about the possibility of Snowden's return to the US and stated: “Clemency is not on the table.”
“There are avenues available to somebody like Mr Snowden to raise those kind of concerns,” added Obama spokesman Jay Carney.
Senator Feinstein said the email had been provided to her committee on 10 April, in response to a request, and added: “It does not register concerns about NSA’s intelligence activities, as was suggested by Snowden in an NBC interview this week.”
Ben Wizner, Snowden’s legal adviser, said of the email: “This whole issue is a red herring. The problem was not some unknown and isolated instance of misconduct. The problem was that an entire system of mass surveillance had been deployed – and deemed legal – without the knowledge or consent of the public. Snowden raised many complaints over many channels. The NSA is releasing a single part of a single exchange after previously claiming that no evidence existed.”
During the interview, Snowden also repeated his calls for full disclosure of the communication trail.
“I would say one of my final official acts in government was continuing one of these communications with a legal office,” he told NBC.
“And in fact, I’m so sure that these communications exist that I’ve called on Congress to write a letter to the NSA to verify that they do.”
Six months ago, responding to questions on the subject from Washington Post reporter Barton Gellman, the NSA issued a statement claiming there was no evidence of a paper trail at all.
“After extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr Snowden's contention that he brought these matters to anyone's attention," said the agency.
Is er ook maar iemand die de NSA nog gelooft dan?quote:Op donderdag 29 mei 2014 23:29 schreef Papierversnipperaar het volgende:
Wat leuk dat dit via de media word uitgevochten
[..]
quote:EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
EFF Urges Judge to Rule Destroyed Evidence Would Show Clients Were Surveilled
San Francisco - The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying – the government itself has admitted to it in recent court filings. In a brief filed today in response to this illegal destruction, EFF is asking that the court make an "adverse inference" that the destroyed evidence would show that plaintiffs communications and records were in fact swept up in the mass NSA spying programs.
EFF filed its first lawsuit challenging illegal government spying in 2006. The current dispute arises from Jewel v. NSA, EFF's 2008 case that challenges the government's mass seizure of three kinds of information: Internet and telephone content, telephone records, and Internet records, all going back to 2001. EFF's brief notes that the government's own declarations make clear that the government has destroyed five years of the content it collected between 2007 and 2012, three years worth of the telephone records it seized between 2006 and 2009, and seven years of the Internet records it seized between 2004 and 2011, when it claims to have ended the Internet records seizures.
"The court has issued a number of preservation orders over the years, but the government decided – without consent from the judge or even informing EFF – that those orders simply don't apply," said EFF Legal Director Cindy Cohn. "Regular civil litigants would face severe sanctions if they so obviously destroyed relevant evidence. But we are asking for a modest remedy: a ruling that we can assume the destroyed records would show that our plaintiffs were in fact surveilled by the government."
The government's reinterpretation of EFF's lawsuits and the preservation orders came to light in March, when government lawyers revealed secret court filings from 2007. In these filings, the government unilaterally claimed that EFF's lawsuits only concerned the original Bush-era spying program, which was done purely on claims of executive power. Without court approval, much less telling EFF, the government then decided that it did not need even to preserve evidence of the same mass spying done pursuant to FISA court orders, which were obtained in 2004 for Internet records, 2006 for telephone records, and 2007 for mass content collection from fiber optic cables.
"EFF and our clients have always had the same simple claim: the government's mass, warrantless surveillance violates the rights of all Americans and must be stopped. The surveillance was warrantless under the executive's authority and it is still warrantless under the FISA court, as those orders are plainly not warrants." said Cohn. "The government's attempt to limit our claims based upon their secret, shifting rationales is nothing short of outrageous, and their clandestine decision to destroy evidence under this flimsy argument is rightly sanctionable. Nevertheless, we are simply asking the court to ensure that we are not harmed by the government's now-admitted destruction of this evidence."
For the full brief on the government's non-compliance:
https://www.eff.org/docum(...)-preservation-orders
For more on Jewel v. NSA:
https://www.eff.org/cases/jewel
http://resetthenet.tumblr.com/quote:Join us on June 5th to Reset the Net
The NSA has corrupted the Internet. On June 5, we will Reset the Net. We hope you’ll join us.
June 5 is the one-year anniversary of the first documents leaked by Edward Snowden. While EFF has been fighting NSA surveillance for years, 2013 marked a new chapter in our battle against mass spying. The documents made it clear to everyone why we care so much, and why they should too.
Surveillance affects everyone, in the United States and internationally. Millions of innocent people have had their communications swept up by the NSA’s dragnet surveillance. Thomas Drake, former NSA official and whistleblower described recently retired NSA chief General Keith Alexander’s surveillance philosophy: “He is absolutely obsessed and completely driven to take it all, whenever possible.” This philosophy clearly underpinned his nearly nine year tenure at the NSA. In addition to this collect-it-all strategy, the NSA has used tactics such as deploying malware, trying to weaken encryption, and other sophisticated techniques that make the Internet less secure.
Mass surveillance is toxic for the Internet. The Internet is a powerful force that can promote democracy, innovation, and creativity, but it’s being subverted as a tool for government spying.
That’s why EFF has joined with dozens of other organizations in calling for a day of action to Reset the Net. On June 5th, Reset the Net is asking everyone to help by installing free software tools that are designed to protect your privacy on a computer or a mobile device. Reset the Net is also calling on websites and developers to add surveillance resistant features, like HTTPS and forward secrecy.
Don’t wait for your privacy and freedom. Start taking it back.
quote:N.S.A. Collecting Millions of Faces From Web Images
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.
The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.
The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.
“It’s not just the traditional communications we’re after: It’s taking a full-arsenal approach that digitally exploits the clues a target leaves behind in their regular activities on the net to compile biographic and biometric information” that can help “implement precision targeting,” noted a 2010 document.
One N.S.A. PowerPoint presentation from 2011, for example, displays several photographs of an unidentified man — sometimes bearded, other times clean-shaven — in different settings, along with more than two dozen data points about him. These include whether he was on the Transportation Security Administration no-fly list, his passport and visa status, known associates or suspected terrorist ties, and comments made about him by informants to American intelligence agencies.
It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Given the N.S.A.’s foreign intelligence mission, much of the imagery would involve people overseas whose data was scooped up through cable taps, Internet hubs and satellite transmissions.
Because the agency considers images a form of communications content, the N.S.A. would be required to get court approval for imagery of Americans collected through its surveillance programs, just as it must to read their emails or eavesdrop on their phone conversations, according to an N.S.A. spokeswoman. Cross-border communications in which an American might be emailing or texting an image to someone targeted by the agency overseas could be excepted.
Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University. “There are still technical limitations on it, but the computational power keeps growing, and the databases keep growing, and the algorithms keep improving.”
State and local law enforcement agencies are relying on a wide range of databases of facial imagery, including driver’s licenses and Facebook, to identify suspects. The F.B.I. is developing what it calls its “next generation identification” project to combine its automated fingerprint identification system with facial imagery and other biometric data.
The State Department has what several outside experts say could be the largest facial imagery database in the federal government, storing hundreds of millions of photographs of American passport holders and foreign visa applicants. And the Department of Homeland Security is funding pilot projects at police departments around the country to match suspects against faces in a crowd.
The N.S.A., though, is unique in its ability to match images with huge troves of private communications.
“We would not be doing our job if we didn’t seek ways to continuously improve the precision of signals intelligence activities — aiming to counteract the efforts of valid foreign intelligence targets to disguise themselves or conceal plans to harm the United States and its allies,” said Vanee M. Vines, the agency spokeswoman.
She added that the N.S.A. did not have access to photographs in state databases of driver’s licenses or to passport photos of Americans, while declining to say whether the agency had access to the State Department database of photos of foreign visa applicants. She also declined to say whether the N.S.A. collected facial imagery of Americans from Facebook and other social media through means other than communications intercepts.
“The government and the private sector are both investing billions of dollars into face recognition” research and development, said Jennifer Lynch, a lawyer and expert on facial recognition and privacy at the Electronic Frontier Foundation in San Francisco. “The government leads the way in developing huge face recognition databases, while the private sector leads in accurately identifying people under challenging conditions.”
Ms. Lynch said a handful of recent court decisions could lead to new constitutional protections for the privacy of sensitive face recognition data. But she added that the law was still unclear and that Washington was operating largely in a legal vacuum.
Laura Donohue, the director of the Center on National Security and the Law at Georgetown Law School, agreed. “There are very few limits on this,” she said.
Congress has largely ignored the issue. “Unfortunately, our privacy laws provide no express protections for facial recognition data,” said Senator Al Franken, Democrat of Minnesota, in a letter in December to the head of the National Telecommunications and Information Administration, which is now studying possible standards for commercial, but not governmental, use.
Facial recognition technology can still be a clumsy tool. It has difficulty matching low-resolution images, and photographs of people’s faces taken from the side or angles can be impossible to match against mug shots or other head-on photographs.
Dalila B. Megherbi, an expert on facial recognition technology at the University of Massachusetts at Lowell, explained that “when pictures come in different angles, different resolutions, that all affects the facial recognition algorithms in the software.”
That can lead to errors, the documents show. A 2011 PowerPoint showed one example when Tundra Freeze, the N.S.A.’s main in-house facial recognition program, was asked to identify photos matching the image of a bearded young man with dark hair. The document says the program returned 42 results, and displays several that were obviously false hits, including one of a middle-age man.
Similarly, another 2011 N.S.A. document reported that a facial recognition system was queried with a photograph of Osama bin Laden. Among the search results were photos of four other bearded men with only slight resemblances to Bin Laden.
But the technology is powerful. One 2011 PowerPoint showed how the software matched a bald young man, shown posing with another man in front of a water park, with another photo where he has a full head of hair, wears different clothes and is at a different location.
It is not clear how many images the agency has acquired. The N.S.A. does not collect facial imagery through its bulk metadata collection programs, including that involving Americans’ domestic phone records, authorized under Section 215 of the Patriot Act, according to Ms. Vines.
The N.S.A. has accelerated its use of facial recognition technology under the Obama administration, the documents show, intensifying its efforts after two intended attacks on Americans that jarred the White House. The first was the case of the so-called underwear bomber, in which Umar Farouk Abdulmutallab, a Nigerian, tried to trigger a bomb hidden in his underwear while flying to Detroit on Christmas in 2009. Just a few months later, in May 2010, Faisal Shahzad, a Pakistani-American, attempted a car bombing in Times Square.
The agency’s use of facial recognition technology goes far beyond one program previously reported by The Guardian, which disclosed that the N.S.A. and its British counterpart, General Communications Headquarters, have jointly intercepted webcam images, including sexually explicit material, from Yahoo users.
The N.S.A. achieved a technical breakthrough in 2010 when analysts first matched images collected separately in two databases — one in a huge N.S.A. database code-named Pinwale, and another in the government’s main terrorist watch list database, known as Tide — according to N.S.A. documents. That ability to cross-reference images has led to an explosion of analytical uses inside the agency. The agency has created teams of “identity intelligence” analysts who work to combine the facial images with other records about individuals to develop comprehensive portraits of intelligence targets.
The agency has developed sophisticated ways to integrate facial recognition programs with a wide range of other databases. It intercepts video teleconferences to obtain facial imagery, gathers airline passenger data and collects photographs from national identity card databases created by foreign countries, the documents show. They also note that the N.S.A. was attempting to gain access to such databases in Pakistan, Saudi Arabia and Iran.
The documents suggest that the agency has considered getting access to iris scans through its phone and email surveillance programs. But asked whether the agency is now doing so, officials declined to comment. The documents also indicate that the N.S.A. collects iris scans of foreigners through other means.
In addition, the agency was working with the C.I.A. and the State Department on a program called Pisces, collecting biometric data on border crossings from a wide range of countries.
One of the N.S.A.’s broadest efforts to obtain facial images is a program called Wellspring, which strips out images from emails and other communications, and displays those that might contain passport images. In addition to in-house programs, the N.S.A. relies in part on commercially available facial recognition technology, including from PittPatt, a small company owned by Google, the documents show.
The N.S.A. can now compare spy satellite photographs with intercepted personal photographs taken outdoors to determine the location. One document shows what appear to be vacation photographs of several men standing near a small waterfront dock in 2011. It matches their surroundings to a spy satellite image of the same dock taken about the same time, located at what the document describes as a militant training facility in Pakistan.
quote:Bombshell TrueCrypt advisory: Backdoor? Hack? Hoax? None of the above?
A sampling of theories behind Wednesday's notice that TrueCrypt is unsafe to use.
quote:Wednesday's bombshell advisory declaring TrueCrypt unsafe to use touched off a tsunami of comments on Ars, Twitter, and elsewhere. At times, the armchair pundits sounded like characters in Oliver Stone's 1991 movie JFK, as they speculated wildly—and contradictorily—about what was behind a notice that left so many more questions than answers. Here are some of the more common theories, along with facts that either support or challenge their accuracy.
quote:TrueCrypt krijgt doorstart
Enkele Zwitserse activisten van de Piratenpartij werken aan een doorstart van de bekende encryptiesoftware TrueCrypt, die deze week offline ging.
De mysterieuze ontwikkelaars van TrueCrypt trokken eerder deze week de stekker uit het project. Ook waarschuwden ze dat het programma onveilig zou zijn. Ze raadden gebruikers aan te migreren naar Bitlocker. Op de originele TrueCrypt-site staat nog slechts TrueCrypt 7.2, waarmee het alleen mogelijk is om versleutelde TrueCrypt-bestanden te decrypten.
Zwitsers Thomas Bruderer en Joseph Doekbrijder, ex-president en ex-vicepresident van de Zwitserse Piratenpartij, zijn nu TrueCrypt.ch gestart als een soort doorstart. De laatste werkende versie, TrueCrypt 7.1a, is door de Zwitsers weer online gebracht, hoewel zij ook waarschuwen voor mogelijke beveiligingsproblemen.
Fork
De Zwitsers willen met hun project meewerken aan een 'fork', een afsplitsing van het originele TrueCrypt. Die zou waarschijnlijk wel een andere naam krijgen. De huidige ontwikkelaars van TrueCrypt zijn onbekend. Dat zou volgens de Zwitsers voor hun fork juist niet moeten gelden.
De Zwitsers wachten voor de fork op de uitkomst van het
Crypto Open Audit-project. Het onderzoek is nog maar gedeeltelijk afgerond.
Oproep voor hulp
De Zwitsers doen ook een oproep voor mensen die willen helpen om beveiligingsrisico's in kaart te brengen. Ook wordt gezocht naar experts die kunnen helpen om juridische problemen op te lossen. Met de hosting in Zwitserland zou de juridische dreiging al minder zijn.
Handig dat encrypten, maar hoe zit dat nu met die wet dat het niet opgeven van je wachtwoord strafbaar wordt?quote:
quote:Reddit, Imgur and Boing Boing launch anti-NSA-surveillance campaign
The Reset the Net campaign aims to encourage direct action, urging visitors to install privacy and encryption tools
Some of the world's largest websites are planning a coordinated day of action on Thursday to oppose mass surveillance online.
The sites, which include Reddit, Imgur and BoingBoing, will be taking part in the campaign, called "Reset the Net", in a number of ways.
Some will showing a splash screen to all users, reminiscent of the one used in the successful protests against SOPA, the US copyright bill which many feared would damage the backbone of the internet. But rather than telling users to write to their electoral representatives, this protest will push more direct action, encouraging visitors to install privacy and encryption tools.
Other sites have committed to improving their own privacy as part of the campaign, by enabling standards such as HTTPS, which prevents attackers from eavesdropping on visitors. Such security standards are common in the world of ecommerce, but rarer for sites which don't think of themselves as holding sensitive information.
"We can take back control of our personal and private data one website, one device, one internet user at a time," said Reddit's General Manager Erik Martin. "We’re proud to stand up for our users’ rights and help Reset the Net."
The campaign is being co-ordinated by Fight for the Future, whose co-founder Tiffiniy Cheng said "Now that we know how mass surveillance works, we know how to stop it. That’s why people all over the world are going to work together to use encryption everywhere and make it too hard for any government to conduct mass surveillance.
"There are moments in history where people and organisations must choose whether to stand on the side of freedom or tyranny. On June 5th, the internet will show which side it’s on.”
quote:'Politie wilde niet dat journalist De Winter over de nucleaire top schreef'
De Nationale Politie heeft begin dit jaar geprobeerd te voorkomen dat onderzoeksjournalist Brenno de Winter zou schrijven over de beveiliging van de internationale nucleaire top (NSS) in Den Haag. Dat schrijft De Winter vandaag in zijn column voor The Post Online.
Een en ander zou blijken uit documenten die De Winter heeft opgevraagd. 'Men wilde koste wat het kost voorkomen dat ik mijn vak zou uitoefenen tijdens de NSS-top', schrijft de Winter. 'Want een andere mening over digitale spionage en criminaliteit is de Firma Opstelten niet welgevallig.'
De Winter haalt een passage aan waarin staat: 'Deze aandachtsvestiging is in de landelijke dia-bak geplaatst. Dit met het oog op de NSS en de mogelijkheden die de betrokkene zou kunnen aangrijpen om zijn vak uit te oefenen.' De Winter: 'Hoe ik het ook lees, hier staat toch echt dat ik gesignaleerd heb gestaan uit angst dat ik artikelen of columns zou gaan typen. Als de overheid haar macht inzet om kritische journalisten het werk te beletten dan is daar maar één woord voor dat nu waarschijnlijk ook door uw hoofd spookt, maar ik niet zal noemen. Hoe diep kun je zinken als land?'
De Winter zegt verder dat hem werd geadviseerd om geen accreditatie voor de NSS-top aan te vragen. 'Ik moet mijn bronnen beschermen, maar ik kan wel vertellen dat de waarschuwing uit politiekringen kwam.'
Privégegevens
Enkele maanden geleden gaf de Landelijke Politie in een brief toe dat er privégegevens van De Winter, waaronder zijn adres, zijn verzameld en intern zijn verspreid. Ten onrechte zouden medewerkers van politie en het ministerie van Binnenlandse Zaken voor de journalist zijn gewaarschuwd.
'De politie heeft zelf niet toegegeven dat dit ten onrechte is gebeurd,' licht De Winter telefonisch toe. 'Ik heb nog steeds geen fatsoenlijk gesprek met de Nationale Politie gehad. Ik krijg totaal geen informatie. Ik weet niet of ik nog steeds word gevolgd en of er een rechtszaak tegen mij komt. Ik weet helemaal niets.'
Gesignaleerd
Uit de documenten die De Winter heeft opgevraagd en ingezien blijkt verder dat hij werd gesignaleerd terwijl hij in Den Haag achter een laptop op een bankje zat. Een beveiliger van de dienst Bewaken en Beveiliging herkende hem en deed een melding. 'De beveiliger keek De Winter aan en zag dat De Winter geschrokken naar beneden naar zijn laptop keek,' staat in het verslag te lezen.
'Knullig', meent De Winter. 'Hoe eng dat er voor bewakers ook uitziet, het was niets meer dan het afmaken van een column voor ThePostOnline.' Hij vindt de inmenging onacceptabel. 'Een ieder heeft het recht zijn mening te uiten zonder de inmenging van enig openbaar gezag. Dat geldt voor iedereen dus ook voor mij.'
De Nationale Politie wil niet inhoudelijk op de beweringen van De Winter reageren. 'We hebben het met onze jurist overlegd, maar in het kader van de Wet Politiegegevens mogen wij niet ingaan op vragen over gegevens die over een specifiek persoon gaan', laat een woordvoerder desgevraagd weten.
quote:REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE
Snowden leaks that UK.gov suppressed
Above-top-secret details of Britain’s covert surveillance programme - including the location of a clandestine British base tapping undersea cables in the Middle East - have so far remained secret, despite being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure has meant that some media organisations, despite being in possession of these facts, have declined to reveal them. Today, however, the Register publishes them in full.
The secret British spy base is part of a programme codenamed “CIRCUIT” and also referred to as Overseas Processing Centre 1 (OPC-1). It is located at Seeb, on the northern coast of Oman, where it taps in to various undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. Seeb is one of a three site GCHQ network in Oman, at locations codenamed “TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can monitor Iraqi communications. CLARINET, in the south of Oman, is strategically close to Yemen.
British national telco BT, referred to within GCHQ and the American NSA under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns the former Cable & Wireless company, aka “GERONTIC”) are the two top earners of secret GCHQ payments running into tens of millions of pounds annually.
The actual locations of such codenamed “access points” into the worldwide cable backbone are classified 3 levels above Top Secret and labelled “Strap 3”. The true identities of the companies hidden behind codenames such as “REMEDY”, “GERONTIC”, “STREETCAR” or “PINNAGE” are classified one level below this, at “Strap 2”.
After these details were withheld, the government opted not to move against the Guardian newspaper last year for publishing above-top-secret information at the lower level designated “Strap 1”. This included details of the billion-pound interception storage system, Project TEMPORA, which were revealed in 2013 and which have triggered Parliamentary enquiries in Britain and Europe, and cases at the European Court of Human Rights. The Guardian was forced to destroy hard drives of leaked information to prevent political embarrassment over extensive commercial arrangements with these and other telecommunications companies who have secretly agreed to tap their own and their customers’ or partners’ overseas cables for the intelligence agency GCHQ. Intelligence chiefs also wished to conceal the identities of countries helping GCHQ and its US partner the NSA by sharing information or providing facilities.
According to documents revealed by Edward Snowden to journalists including Glenn Greenwald among others, the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers' data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.
BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).
Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks' secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall.
Among the cables specifically identified in one document as currently being intercepted or “on cover” are an Irish connection, Hibernia Atlantic, landing in Southport, and three European connections landing at Yarmouth, Dover, and Brighton.
The majority of large cables come ashore in Cornwall, and have been connected directly to Bude. These include major connections such as FLAG (Fibre optic Link Around the Globe), two of whose cables have been intercepted. Because the FLAG interceptions had to be kept secret from the cables’ owners, one report states, the tapping connections were installed in an undisclosed UK location and “backhauled” to Bude, in the technical language of the communications industry.
Although GCHQ interception of overseas communications can be authorised by a general “external” tapping warrant, the wording of the law does not permit storage of every communication for examination, as GCHQ wished to do. In 2009, the spooks persuaded then Foreign Secretary David Miliband to sign a new warrant legalising what they wished to do. The terms of such warrants have never been published.
The special “external” warrants, issued under the Regulation of Investigatory Powers Act (RIPA), authorise the interception of all communications on specified international links. Miliband’s first 2009 warrant for TEMPORA authorised GCHQ to collect information about the “political intentions of foreign powers”, terrorism, proliferation, mercenaries and private military companies, and serious financial fraud.
Certificates attached to external interception warrants are re-issued every six months, and can be changed by ministers at will. GCHQ officials are then free to target anyone who is overseas or communicating from overseas without further checks or controls, if they think they fall within the terms of a current certificate.
The secret overseas internet monitoring centre, codenamed CIRCUIT, is at Seeb in the state of Oman. It is the latest of a series of secret collaborations with the autocratic Middle Eastern state, which has been ruled for 44 years by Sultan Qaboos bin Said, installed as head of state in a British-led and SAS-supported coup against his father. The Seeb centre was originally built in collaboration with the Omani government to monitor civil communications satellites orbiting above the Middle East. It has six large satellite dishes, forming part of the well-known and long running “ECHELON” intercept system run by the “Five Eyes” English-speaking (US/UK/Australia/Canada/New Zealand) intelligence agencies.
When GCHQ obtained government approval in 2009 to go ahead with its “Mastering the Internet” project, the Seeb base became the first of its global network of Internet tapping locations. Another centre, OPC-2, has been planned, according to documents leaked by Snowden.
The CIRCUIT installation at Seeb is regarded as particularly valuable by the British and Americans because it has direct access to nine submarine cables passing through the Gulf and entering the Red Sea. All of the messages and data passed back and forth on the cables is copied into giant computer storage “buffers”, and then sifted for data of special interest.
Information about Project TEMPORA and the Seeb facility was contained in 58,000 GCHQ documents which Snowden downloaded during 2012. Many of them came from an internal Wikipedia style information site called GC-Wiki. GCHQ feared the political consequences of revelations about its spying partners other than the United States and English speaking nations, according to knowledgeable sources.
Although information about the monitoring station at Seeb in its older ECHELON role has been available on the public Internet for several years, Cabinet Secretary Sir Jeremy Heywood was determined to prevent its new importance and cost becoming known.
It was this which lay behind the British government’s successful-until-today efforts to silence the Guardian and the rest of the media on the ultra-classified, beyond Top Secret specifics of Project TEMPORA - the places and names behind the codewords CIRCUIT, TIMPANI, CLARINET, REMEDY and GERONTIC. ®
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |