The Criminal N.S.A.

Moderators: Elvis, DrVolin, Jeff

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Oct 28, 2013 8:01 am

Israel and the NSA: Partners in Crime
Documents hint Israelis behind attempt to eavesdrop on France – but America takes the blame

by Justin Raimondo, October 28, 2013
It wasn’t the US government breaking into the private communications of former French President Nicolas Sarkozy, according to top secret documents unearthed by Edward Snowden and published in Le Monde – it was the Israelis.

A four-page internal précis regarding a visit to Washington by two top French intelligence officials denies the NSA or any US intelligence agency was behind the May 2012 attempted break-in – which sought to implant a monitoring device inside the Elysee Palace’s communications system – but instead fingers the Israelis, albeit indirectly:

The visit by Barnard Barbier, head of the DGSE’s technical division, and Patrick Pailloux, a top official with France’s National Information Systems Security, was intended to elicit an explanation for the break-in, which the French media blamed on the Americans. The NSA’s inquiries to the British, Canadians, Australians, New Zealanders, and other US allies all turned up negative. However, one such close ally wasn’t asked.

As Glenn Greenwald and Jacques Follorou, citing the NSA document, put it in their Le Monde piece: the NSA "’intentionally did not ask either the Mossad or the ISNU (the technical administration of the Israeli services) whether they were involved’ in this espionage operation against the head of the French government."

An interesting omission, to say the least, one justified by the author of the memo with some odd phraseology: "France is not an approved target for joint discussion by Israel and the United States." Meaning – exactly what? This is a job for Marcy Wheeler! But I’ll hazard a guess: the US is well aware of Israeli spying on France and wants nothing to do with it, and/or the author of the memo is simply invoking some obscure protocol in order to justify going any farther.

In any case, the Israeli connection to the NSA’s global spying network – including its all-pervasive surveillance inside the US – has been well-established by Greenwald’s previous reporting on the subject: a September 11 article detailing how the NSA shares raw intercepts from its data-dragnet with Israeli intelligence, scooping up purloined emails and other data – in effect giving the Mossad a "back door" into a treasure trove of information on the private lives and activities of American citizens.

The Guardian published a five-page memorandum of understanding between Tel Aviv and Washington, provided to Greenwald by Snowden: rife with references to the legal and constitutional constraints "pertaining to the protection of US persons," it goes on to state forthrightly that the Israelis are permitted access to "raw Sigint" – unredacted and unreviewed transcripts, Internet metadata, and the content of emails and telephonic communications. While the Israelis supposedly solemnly swear to not "deliberately" target any American citizen, the agreement explicitly rules out a legal obligation on the part of the Israelis to follow the rules:

"This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law."

The Israelis are allowed to retain raw NSA data on American citizens for up to a year, as long as they inform the NSA, but when it comes to US government communications – those must be destroyed "upon recognition." This interdict presumably covers the internal communications of our law enforcement officers, but as both James Bamford and Fox News’s Carl Cameron have reported, Israeli penetration of this vital sector is already an accomplished fact.

In his book, The Shadow Factory, and a 2012 Wired piece, Bamford details the NSA’s connections to "secretive contractors with questionable histories and little oversight" which were used "to do the actual bugging of the entire U.S. telecommunications network."

According to Bamford, who cites a former Verizon employee, Verint/Comverse Technology – a company with direct ties to the Israeli government and founded by former Israeli intelligence officers – "taps the communication lines at Verizon." Over at AT&T, "wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004." As Bamford puts it:

"What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the US.

In short, much of the surveillance technology in use by the NSA originated in Israel, and was developed by Israeli companies with ties – direct subsidies, board memberships, etc. – to the Israeli government, and specifically its intelligence services. This would make is easy for the Israelis to construct a “back door” that would give them access to the system. For one early example, the eavesdropping software that allows US law enforcement to wiretap reportedly has just such a "back door," as reported by Fox’s Carl Cameron, one that has enabled Israeli Mafia and others to shield themselves from surveillance. The problem became so bad that, in October 2001 a group of law enforcement officials sent a letter to then Attorney General John Ashcroft warning that the system had been compromised. Cameron reports that the suspects in the 9/11 World Trade Center attacks may have taken advantage of the system’s vulnerabilities: "On a number of cases," says Cameron, "suspects that they had sought to wiretap and survey immediately changed their telecommunications processes. They started acting much differently as soon as those supposedly secret wiretaps went into place."

The agreement between the NSA and the Israelis, then, merely made official what was already operationally true: the Israelis can directly tap into the NSA’s data dragnet, and indeed have been doing so for years. And it looks like Snowden wasn’t the only ex-employee to reveal the NSA’s secrets: according to Bill Binney, a former NSA official cited by Bamford, a "mid level" NSA official "who was a very strong supporter of Israel" turned over the NSA’s "advanced analytical and data mining software" to the Israelis. The big difference, however, is that Snowden didn’t hand it over to a foreign country – he handed it over to us.

In the case of the attempt to penetrate the communications system of the French President, what’s interesting is that Washington said nothing in public about its strong suspicions the Israelis were behind it, even as anti-American sentiment over the incident reached a fever pitch in Paris. US officials were and are willing to sit silently while their country is excoriated, letting Uncle Sam take the heat for our "allies" in Tel Aviv.

Not only that, but the unbalanced relationship between the US and Israel when it comes to intelligence sharing is openly acknowledged by NSA officials in top secret documents unearthed by Snowden and reported by the Greenwald-Poitras-Guardian team:

"On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems. A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”

Both Bamford and Cameron have reported that it is "career suicide" for anyone inside the US government to question the one-sided "special relationship" between Israel and the US when it comes to intelligence gathering. The reason for this is the political power of the Israel lobby, and its ability to target and destroy opposition within the national security bureaucracy. No doubt their unlimited access to our communications has much to do with this: I wonder how many dark secrets they have on our politicians? Anyone who thinks the Israelis would hesitate to use this information, handed over to them so eagerly by the supine US authorities, is being willfully blind.

This is one aspect of the NSA scandal we are hearing very little about, yet the Israel connection may be key to seeing the big picture. So let’s step back, then, and look at the portrait of the Panopticon as painted by the Snowden documents, and reported on by Greenwald and others.

The US has constructed this global system of interception, which monitors, records, and stores virtually all electronic and telephonic communications. It’s an elaborate apparatus, requiring tremendous resources and complex systems that sort, file, and organize this vast databank so as to make it readily available to an analyst sitting in his cubicle at an NSA facility. Sitting in the center of this vast spiderweb, with access to all its manifold threads and extensions, is not only the US government, but, standing behind them, the Israelis – who are spying on us, as well.

The Israel lobby and its amen corner continually carp about how any attempt to negotiate with Iran – or any of their other perceived enemies – is "appeasement." Yet the real appeasers are those in our government who allow Israel to walk all over us, in public and in private – even to the extent of handing them the keys to our entire communications system. I wonder if any of the politicians, both Democrats and Republicans, who are now making noises about the NSA’s surveillance have the courage to buck the Israel lobby and bring up this matter in a public forum. Where is the congressional investigation into this serious breach of US national security? Where are the hearings?

I’m not holding my breath on this one, and neither should you. But let’s just put it out there, for the public record.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Oct 28, 2013 8:22 am

NSA 'monitored 60m Spanish calls in a month'

Demands are growing in Europe for explanations over US monitoring activities

The US National Security Agency (NSA) secretly monitored 60 million phone calls in Spain in one month, Spanish media say.

The reports say the latest allegations came from documents provided by the fugitive US analyst Edward Snowden.

They say the NSA collected the numbers and locations of the callers and the recipients, but not the calls' content.

This comes as an EU parliamentary delegation is due to meet officials in Washington to convey concerns.

The officials from the European Parliament's Committee on Civil Liberties, Justice and Home Affairs will speak to members of the US Congress to gather information.

Continue reading the main story
Analysis

image of Tom Burridge
Tom Burridge
BBC News, Madrid
So far, it appears that the allegations that Spanish communications were intercepted en masse by the NSA have not caused the level of public anger in Spain that similar claims caused in Germany and France. And that lack of popular pressure to date manifested itself in the words of Spain's Prime Minister Mariano Rajoy.

Reacting at last week's European summit, which was overshadowed by the European-US spying row, to more general allegations of US spying published in the Spanish media last week, Mr Rajoy said he had no proof that Washington had been spying on his government.

However, the latest, more explicit revelations in El Mundo newspaper, on the same day that the US ambassador to Madrid has been summoned by the government for talks on the issue, inevitably puts more pressure on the Spanish government, not only via the Spanish media, but also from Spain's European allies, to condemn the alleged spying.

In Madrid, the US ambassador to Spain has been summoned to meet government officials to discuss earlier allegations about US spying on Spanish citizens and politicians.

It is not clear how the alleged surveillance was carried out, whether it was from monitoring fibre-optic cables, data (including metadata) obtained from telecoms companies, or other means.

Citizens
Meanwhile, a Japanese news agency says the NSA asked the Japanese government in 2011 to help it monitor fibre-optic cables carrying personal data through Japan, to the Asia-Pacific region.

The reports, carried by the Kyodo news agency, say that this was intended to allow the US to spy on China - but Japan refused, citing legal restrictions and a shortage of personnel.

The White House has so far declined to comment on Monday's claims about US spying in Spain, published in the newspapers El Pais and El Mundo.

It is alleged that the NSA tracked millions of phone calls, texts and emails from Spanish citizens between 10 December 2012 and 8 January 2013.

The allegations follow German media reports that the US was bugging Chancellor Angela Merkel's phone for more than a decade - and that the surveillance only ended a few months ago.

Mrs Merkel is sending her country's top intelligence chiefs to Washington this week to "push forward" an investigation into the spying allegations, which have caused outrage in Germany.

Mass surveillance
Britain's Guardian newspaper reported on Friday that the NSA had monitored the phones of 35 world leaders. Again Mr Snowden was the source of the report.

Continue reading the main story
What is metadata?

In emails, it is generally used to mean the sender and recipient email addresses, their IP addresses, the message file size, and sometimes the top or subject line of the message
With phones, it means the numbers of the two parties to the call, its duration, time, date and location (for mobiles, determined by which mobile signal towers relayed the call or text)
The contents of the conversation itself, however, are not covered, US intelligence officials say. The NSA has suggested it does not usually store the geo-locational information for mobile phone calls
An A-Z of surveillance
The head of the European Parliament's delegation, British MEP Claude Moraes, told the BBC it was the scale of the NSA's alleged surveillance that was worrying.

"The headline news, that 35 leaders had their phones tapped, is not the real crux of the issue," he said.

"It really is the El Mundo type story, that millions of citizens of countries... had their landlines and other communications tapped. So it's about mass surveillance. It's about scale and proportionality."

He said a priority of the European mission was to discuss the impact of American spying on EU citizens' fundamental right to privacy.

The BBC's Europe correspondent Chris Morris says that with every new allegation, demands are growing in Europe - and in Germany in particular - for explanations and for guarantees of a change in culture.

EU leaders have said that distrust of the US over spying could harm the fight against terrorism.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Oct 28, 2013 10:29 am

NSA Site Goes Down

Image
The NSA website suddenly went offline late Friday afternoon, for reasons that remained murky. Tweets suggested it was a denial-of-service attack by Anonymous or a group called The Rustle League; NSA officials said it was an internal error, but hours later it hadn't been fixed. Either way, it triggered alot of good-riddance comments online. And this: "Huh, healthcare.gov is working..."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Oct 28, 2013 4:49 pm

NSA tracked 46mln Italian phone calls - report
Published time: October 28, 2013 17:35 Get short URL

The NSA bugged 46 million phone calls in Italy in a month, according to digital library host Cryptome. The report is the latest in the revelations that the agency tapped hundreds of millions of phone lines across Europe.

The snooping, between Dec. 10, 2012 and Jan. 8, 2013, reportedly did not appear to track the content of calls but rather telephony metadata, including the origin and duration of the calls.

The alleged monitoring of citizens’ phone calls follows an article in the Italian weekly, L’Espresso, which claimed that US intelligence had monitored Italian telecoms networks, targeting the government and companies as well as suspected terrorists.

Britain's Government Communications Headquarters (GCHQ) also reportedly monitored telephone, Internet and email traffic carried through three undersea fiber-optic cables in Italy as a part of its Tempora program.

"In this mass collection, our secret services had a role," the publication cited Glenn Greenwald, the journalist who helped publish leaked documents obtained by NSA whistleblower Edward Snowden, as saying.

Italian Prime Minister Enrico Letta said Thursday that the alleged monitoring of Italian telecommunications by US and British intelligence would be both "inconceivable and unacceptable."

Letta questioned US Secretary of State John Kerry about the reported bugging during talks in Rome on Wednesday.

Ahead of an EU summit Friday, Letta said: "Obviously, all checks should be done, but we want the whole truth. It's not acceptable or conceivable that there are activities of this kind.”

In regards to the Cryptome report, Italian intelligence agencies had no information on the alleged monitoring and were unable to confirm it had taken place.

A statement released by an Italian parliamentary committee tasked with state security, however, said there was a difference between “spying” and "monitoring.”

“There is no evidence that the United States is spying on Italian citizens,” the statement from the Parliamentary Committee for the Intelligence and Security Services and for State Secret Control read.

The committee said that agreements on cooperation in the security sphere precluded the possibility that either side would spy on each other.

“The implementation of such activities would be a threat to national security,” it said.

Meanwhile, Cryptome reported that during the same period, the NSA monitored 361 million phone calls in Germany, 70 million in France, 61 million in Spain, and 1.8 million in the Netherlands.

With the aid of its Boundless Informant data analysis and visualization system, the agency tracked 124.8 billion calls worldwide in that period.

The revelation is part and parcel of the deepening scandal over the United States vast spying apparatus. Last week, the Germany daily Der Spiegel reported that Washington was directly spying on least 35 world leaders, including several US allies.

German Chancellor Angela Merkel’s mobile phone has reportedly been on an NSA target list since 2002, US intelligence sources telling Germany’s Bild am Sonntag that US President Barack Obama was aware of the snooping.

Despite Obama’s assurances that he has ordered a review of the US intelligence gathering operations, a coalition of over 20 countries led by Brazil and Germany are now pushing for a UN resolution condemning the US for its “indiscriminate” wiretapping and “extra-territorial” surveillance. The countries are also calling for “independent oversight” of electronic monitoring.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Oct 29, 2013 8:53 am

The Out-of-Control NSA

Posted on Oct 28, 2013

By Eugene Robinson

Let’s get this straight: The National Security Agency snooped on the cellphone conversations of German Chancellor Angela Merkel? Perhaps for as long as a decade? And President Obama didn’t know a thing about it?

Either somebody’s lying or Obama needs to acknowledge that the NSA, in its quest for omniscience beyond anything Orwell could have imagined, is simply out of control.

The White House has not denied news reports—courtesy of disclosures by whistleblower Edward Snowden—that the spy agency eavesdropped on Merkel’s phone calls. Press secretary Jay Carney said that “the United States is not monitoring and will not monitor the communications of the chancellor,” which sure sounds like an admission that such “monitoring” took place in the past.

This is a problem. Merkel is the de facto leader of Europe, which makes her, from the U.S. point of view, perhaps the most important allied leader in the world. Moreover, she and Obama have not only mutual respect but also a genuine rapport—or used to. Her government huffily demanded an explanation and said such spying “would be a serious breach of trust.”

But there’s more: News organizations have reported that Merkel was one of about 35 world leaders whose private phone communications were intercepted by the NSA. The Wall Street Journal said Obama was unaware of this eavesdropping until an internal administration review this summer.

How on earth could that be possible?
You’d think that Obama, having been given some strikingly intimate piece of intelligence about a foreign leader’s thinking or intentions, would wonder how that information was gathered. It makes no sense that he would curb his curiosity in order to maintain “deniability,” since any president is ultimately going to be held responsible for what his spies get caught doing.

But it also makes no sense that the NSA can decide on its own, with no adult supervision, to invade the privacy of even one leader of a sovereign state, let alone 35.

What did the agency do with the secrets it learned? Is the information still being stored? Are the foreign leaders in question—and we do not know who they are—supposed to believe that it’s no problem if the NSA knows all about their personal conversations, just as Americans are supposed to believe it’s acceptable that the agency keeps a record of all our phone calls?

But there’s still more: On Monday, Spanish newspapers reported that the NSA compiled a detailed log of 60 million phone calls in Spain during a one-month period beginning last December. This follows similar reports of a one-month NSA sweep of phone data in France that reportedly captured 70 million calls. Spanish and French officials are also demanding an explanation.

The NSA does have its defenders. “I think the president should stop apologizing and stop being defensive,” Rep. Peter King, R-N.Y., said on “Meet the Press,” claiming that the spy agency’s snooping “has saved thousands of lives, not just in the United States but also in France, in Germany and throughout Europe.”

Besides, King said, “the French are someone to talk” because they routinely spy against the United States. And much of the planning for the 9/11 attacks took place in Hamburg, under German officials’ noses. And European countries sometimes have “dealings” with hostile countries such as Iran and North Korea.

That would be one way to look at it. Another would be that alienating key leaders—and broad public opinion—in friendly countries is a dumb, counterproductive way to fight terrorism. Following these revelations, are French, German and Spanish intelligence agencies likely to be more cooperative with their U.S. counterparts? Or less?

To me, all this is consistent with the NSA’s apparent goal of knowing, basically, everything. The agency collects information as massively and indiscriminately as possible on the theory that if you assemble a database of all the world’s communications, the few you seek—those involving terrorists—will be in there somewhere.

This is not just a massive invasion of privacy that the people of France, Spain and other countries understandably resent. It’s also a mistake.

While NSA analysts were busy sifting billions of phone records, they were unaware that one of their own contract analysts, some guy named Snowden, was about to spill all the precious beans. Big Data will prove more of an illusion than a panacea. The agency will learn—not the hard way, I hope—that knowing everything unfortunately means knowing nothing at all.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Wed Oct 30, 2013 1:56 pm

Italian magazine says U.S. spies listened to pope, Vatican says unaware
VATICAN CITY | Wed Oct 30, 2013 Reuters

(Reuters) - An Italian magazine said on Wednesday that a United States spy agency had eavesdropped on Vatican phone calls, possibly including when former Pope Benedict's successor was under discussion, but the Holy See said it had no knowledge of any such activity.

Panorama magazine said that among 46 million phone calls followed by the U.S. National Security Agency (NSA) in Italy from December 10, 2012, to January 8, 2013, were conversations in and out of the Vatican.

In a press release before full publication on Thursday, Panorama said the "NSA had tapped the pope". It cited no source for its information.

Asked to comment on the report, Vatican spokesman Father Federico Lombardi said: "We are not aware of anything on this issue and in any case we have no concerns about it."

continued....http://www.reuters.com/article/2013/10/30/us-vatican-usa-spying-idUSBRE99T11N20131030


I don't suppose they do have any concerns about, considering they're a part of the whole stinking pile.
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Oct 30, 2013 3:12 pm

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say
Image
In this slide from a National Security Agency presentation on “Google Cloud Exploitation,” a sketch shows where the “Public Internet” meets the internal “Google Cloud” where user data resides. Two engineers with close ties to Google exploded in profanity when they saw the drawing.

By Barton Gellman and Ashkan Soltani, Wednesday, October 30, 11:19 AM E-mail the writer
The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.

By tapping those links, the agency has positioned itself to collect at will from among hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.

Graphic
How the NSA is hacking private networks, such as Google’s Click Here to View Full Graphic Story
How the NSA is hacking private networks, such as Google’s
Image
11:21 AM ET
This NSA document describes a common problem of collecting too much information – and how the agency is attempting to control it.
Why the NSA wanted more access

Andrea Peterson 11:51 AM ET
The NSA already legally compelled tech companies to give it data via PRISM. So why did it hack into data links?

According to a top secret accounting dated Jan. 9, 2013, NSA’s acquisitions directorate sends millions of records every day from Yahoo and Google internal networks to data warehouses at the agency’s Fort Meade headquarters. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — ranging from “metadata,” which would indicate who sent or received e-mails and when, to content such as text, audio and video.

The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, GCHQ. From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.

The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.

The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.

White House officials and the Office of the Director of National Intelligence, which oversees the NSA, declined to confirm, deny or explain why the agency infiltrates Google and Yahoo networks overseas.

In a statement, Google said it was “troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity.”

“We have long been concerned about the possibility of this kind of snooping, which is why we continue to extend encryption across more and more Google services and links,” the company said.

At Yahoo, a spokeswoman said: “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

Under PRISM, the NSA already gathers huge volumes of online communications records by legally compelling U.S. technology companies, including Yahoo and Google, to turn over any data matching court-approved search terms. That program, which was first disclosed by The Washington Post and the Guardian newspaper, is authorized under Section 702 of the Foreign Intelligence Surveillance Act and overseen by the Foreign Intelligence Surveillance Court.

Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to “full take,” “bulk access” and “high volume” operations on Yahoo and Google networks. Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.

Outside U.S. territory, statutory restrictions on surveillance seldom apply and the Foreign Intelligence Surveillance Court has no jurisdiction. Senate Intelligence Committee Chairwoman Dianne Feinstein has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333 , which defines the basic powers and responsibilities of the intelligence agencies.

John Schindler, a former NSA chief analyst and frequent defender who teaches at the Naval War College, said it was obvious why the agency would prefer to avoid restrictions where it can.

“Look, NSA has platoons of lawyers and their entire job is figuring out how to stay within the law and maximize collection by exploiting every loophole,” he said. “It’s fair to say the rules are less restrictive under Executive Order 12333 than they are under FISA.”

The operation to infiltrate data links exploits a fundamental weakness in systems architecture. To guard against data loss and system slowdowns, Google and Yahoo maintain fortress-like data centers across four continents and connect them with thousands of miles of fiber-optic cable. These globe-spanning networks, representing billions of dollars of investment, are known as “clouds” because data moves seamlessly around them.

In order for the data centers to operate effectively, they synchronize high volumes of information about account holders. Yahoo’s internal network, for example, sometimes transmits entire e-mail archives — years of messages and attachments — from one data center to another.

Tapping the Google and Yahoo clouds allows the NSA to intercept communications in real time and to take “a retrospective look at target activity,” according to one internal NSA document.

In order to obtain free access to data center traffic, the NSA had to circumvent gold standard security measures. Google “goes to great lengths to protect the data and intellectual property in these centers,” according to one of the company’s blog posts, with tightly audited access controls, heat sensitive cameras, round-the-clock guards and biometric verification of identities.

Google and Yahoo also pay for premium data links, designed to be faster, more reliable and more secure. In recent years, each of them is said to have bought or leased thousands of miles of fiber optic cables for their own exclusive use. They had reason to think, insiders said, that their private, internal networks were safe from prying eyes.

In an NSA presentation slide on “Google Cloud Exploitation,” however, a sketch shows where the “Public Internet” meets the internal “Google Cloud” where their data resides. In hand-printed letters, the drawing notes that encryption is “added and removed here!” The artist adds a smiley face, a cheeky celebration of victory over Google security.

Two engineers with close ties to Google exploded in profanity when they saw the drawing. “I hope you publish this,” one of them said.

For the MUSCULAR project, the GCHQ directs all intake into a “buffer” that can hold three to five days of traffic before recycling storage space. From the buffer, custom-built NSA tools unpack and decode the special data formats that the two companies use inside their clouds. Then the data is sent through a series of filters to “select” information the NSA wants and “defeat” what it does not.

PowerPoint slides about the Google cloud, for example, show that the NSA tries to filter out all data from the company’s “Web crawler,” which indexes Internet pages.

According to the briefing documents, prepared by participants in the MUSCULAR project, collection from inside Yahoo and Google has produced important intelligence leads against hostile foreign governments that are specified in the documents.

Last month, long before The Post approached Google to discuss the penetration of its cloud, vice president for security engineering Eric Grosse announced that the company is racing to encrypt the links between its data centers. “It’s an arms race,” he said then. “We see these government agencies as among the most skilled players in this game.”

Yahoo has not announced plans to encrypt its data center links.

Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previously unknown scale from U.S. citizens and residents. Those operations have gone undebated in public or on the floor of Congress because their existence was classified.

The Google and Yahoo operations call attention to an asymmetry in U.S. surveillance law: While Congress has lifted some restrictions on NSA domestic surveillance on the grounds that purely foreign communications sometimes pass over U.S. switches and cables, it has not added restrictions overseas, where American communications or data stores now cross over foreign switches.

“Thirty five years ago, different countries had their own telecommunications infrastructure, so the division between foreign and domestic collection was clear,” Sen. Ron Wyden, a member of the intelligence committee, said in an interview. “Today there’s a global communications infrastructure, so there’s a greater risk of collecting on Americans when the NSA collects overseas.”

It is not clear how much data from Americans is collected, and how much of that is retained. One weekly report on MUSCULAR says the British operators of the site allow the NSA to contribute 100,000 “selectors,” or search terms. That is more than twice the number in use in the PRISM program, but even 100,000 cannot easily account for the millions of records that are said to be sent back to Fort Meade each day.

In 2011, when the Foreign Intelligence Surveillance Court learned that the NSA was using similar methods to collect and analyze data streams — on a much smaller scale — from cables on U.S. territory, Judge John D. Bates ruled that the program was illegal under the Foreign Intelligence Surveillance Act and inconsistent with the requirements of the Fourth Amendment.

Soltani is an independent security researcher and consultant.

Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Oct 30, 2013 3:12 pm

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say
Image
In this slide from a National Security Agency presentation on “Google Cloud Exploitation,” a sketch shows where the “Public Internet” meets the internal “Google Cloud” where user data resides. Two engineers with close ties to Google exploded in profanity when they saw the drawing.

By Barton Gellman and Ashkan Soltani, Wednesday, October 30, 11:19 AM E-mail the writer
The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.

By tapping those links, the agency has positioned itself to collect at will from among hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.

Graphic
How the NSA is hacking private networks, such as Google’s Click Here to View Full Graphic Story
How the NSA is hacking private networks, such as Google’s
Image
11:21 AM ET
This NSA document describes a common problem of collecting too much information – and how the agency is attempting to control it.
Why the NSA wanted more access

Andrea Peterson 11:51 AM ET
The NSA already legally compelled tech companies to give it data via PRISM. So why did it hack into data links?

According to a top secret accounting dated Jan. 9, 2013, NSA’s acquisitions directorate sends millions of records every day from Yahoo and Google internal networks to data warehouses at the agency’s Fort Meade headquarters. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — ranging from “metadata,” which would indicate who sent or received e-mails and when, to content such as text, audio and video.

The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, GCHQ. From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.

The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.

The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.

White House officials and the Office of the Director of National Intelligence, which oversees the NSA, declined to confirm, deny or explain why the agency infiltrates Google and Yahoo networks overseas.

In a statement, Google said it was “troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity.”

“We have long been concerned about the possibility of this kind of snooping, which is why we continue to extend encryption across more and more Google services and links,” the company said.

At Yahoo, a spokeswoman said: “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

Under PRISM, the NSA already gathers huge volumes of online communications records by legally compelling U.S. technology companies, including Yahoo and Google, to turn over any data matching court-approved search terms. That program, which was first disclosed by The Washington Post and the Guardian newspaper, is authorized under Section 702 of the Foreign Intelligence Surveillance Act and overseen by the Foreign Intelligence Surveillance Court.

Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to “full take,” “bulk access” and “high volume” operations on Yahoo and Google networks. Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.

Outside U.S. territory, statutory restrictions on surveillance seldom apply and the Foreign Intelligence Surveillance Court has no jurisdiction. Senate Intelligence Committee Chairwoman Dianne Feinstein has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333 , which defines the basic powers and responsibilities of the intelligence agencies.

John Schindler, a former NSA chief analyst and frequent defender who teaches at the Naval War College, said it was obvious why the agency would prefer to avoid restrictions where it can.

“Look, NSA has platoons of lawyers and their entire job is figuring out how to stay within the law and maximize collection by exploiting every loophole,” he said. “It’s fair to say the rules are less restrictive under Executive Order 12333 than they are under FISA.”

The operation to infiltrate data links exploits a fundamental weakness in systems architecture. To guard against data loss and system slowdowns, Google and Yahoo maintain fortress-like data centers across four continents and connect them with thousands of miles of fiber-optic cable. These globe-spanning networks, representing billions of dollars of investment, are known as “clouds” because data moves seamlessly around them.

In order for the data centers to operate effectively, they synchronize high volumes of information about account holders. Yahoo’s internal network, for example, sometimes transmits entire e-mail archives — years of messages and attachments — from one data center to another.

Tapping the Google and Yahoo clouds allows the NSA to intercept communications in real time and to take “a retrospective look at target activity,” according to one internal NSA document.

In order to obtain free access to data center traffic, the NSA had to circumvent gold standard security measures. Google “goes to great lengths to protect the data and intellectual property in these centers,” according to one of the company’s blog posts, with tightly audited access controls, heat sensitive cameras, round-the-clock guards and biometric verification of identities.

Google and Yahoo also pay for premium data links, designed to be faster, more reliable and more secure. In recent years, each of them is said to have bought or leased thousands of miles of fiber optic cables for their own exclusive use. They had reason to think, insiders said, that their private, internal networks were safe from prying eyes.

In an NSA presentation slide on “Google Cloud Exploitation,” however, a sketch shows where the “Public Internet” meets the internal “Google Cloud” where their data resides. In hand-printed letters, the drawing notes that encryption is “added and removed here!” The artist adds a smiley face, a cheeky celebration of victory over Google security.

Two engineers with close ties to Google exploded in profanity when they saw the drawing. “I hope you publish this,” one of them said.

For the MUSCULAR project, the GCHQ directs all intake into a “buffer” that can hold three to five days of traffic before recycling storage space. From the buffer, custom-built NSA tools unpack and decode the special data formats that the two companies use inside their clouds. Then the data is sent through a series of filters to “select” information the NSA wants and “defeat” what it does not.

PowerPoint slides about the Google cloud, for example, show that the NSA tries to filter out all data from the company’s “Web crawler,” which indexes Internet pages.

According to the briefing documents, prepared by participants in the MUSCULAR project, collection from inside Yahoo and Google has produced important intelligence leads against hostile foreign governments that are specified in the documents.

Last month, long before The Post approached Google to discuss the penetration of its cloud, vice president for security engineering Eric Grosse announced that the company is racing to encrypt the links between its data centers. “It’s an arms race,” he said then. “We see these government agencies as among the most skilled players in this game.”

Yahoo has not announced plans to encrypt its data center links.

Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previously unknown scale from U.S. citizens and residents. Those operations have gone undebated in public or on the floor of Congress because their existence was classified.

The Google and Yahoo operations call attention to an asymmetry in U.S. surveillance law: While Congress has lifted some restrictions on NSA domestic surveillance on the grounds that purely foreign communications sometimes pass over U.S. switches and cables, it has not added restrictions overseas, where American communications or data stores now cross over foreign switches.

“Thirty five years ago, different countries had their own telecommunications infrastructure, so the division between foreign and domestic collection was clear,” Sen. Ron Wyden, a member of the intelligence committee, said in an interview. “Today there’s a global communications infrastructure, so there’s a greater risk of collecting on Americans when the NSA collects overseas.”

It is not clear how much data from Americans is collected, and how much of that is retained. One weekly report on MUSCULAR says the British operators of the site allow the NSA to contribute 100,000 “selectors,” or search terms. That is more than twice the number in use in the PRISM program, but even 100,000 cannot easily account for the millions of records that are said to be sent back to Fort Meade each day.

In 2011, when the Foreign Intelligence Surveillance Court learned that the NSA was using similar methods to collect and analyze data streams — on a much smaller scale — from cables on U.S. territory, Judge John D. Bates ruled that the program was illegal under the Foreign Intelligence Surveillance Act and inconsistent with the requirements of the Fourth Amendment.

Soltani is an independent security researcher and consultant.

Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Nov 04, 2013 10:19 am

Google chief: NSA spying ‘outrageous’ and potentially illegal

By Agence France-Presse
Monday, November 4, 2013 7:06 EST
Google chief executive Eric Schmidt speaks at a press conference in Seoul, September 27, 2012 (AFP:File, Jung Yeon-Je)

Google executive chairman Eric Schmidt said reports that the U.S. government spied on the Internet giant’s data centers were “outrageous” and potentially illegal if proved true, in an interview Monday.

Speaking to the Wall Street Journal during a visit to Hong Kong, the technology guru said that Google had filed complaints with the National Security Agency, President Barack Obama, as well as members of Congress.

“It’s really outrageous that the National Security Agency was looking between the Google data centres if that’s true. The steps that the organisation was willing to do without good judgement to pursue its mission and potentially violate people’s privacy, it’s not OK,” Schmidt said.


“The NSA allegedly collected the phone records of 320 million people in order to identify roughly 300 people who might be at risk. It’s just bad public policy … and perhaps illegal,” he said in the interview conducted in the southern Chinese city.

“The Snowden revelations have assisted us in understanding that it’s perfectly possible that there are more revelations to come.”

A recent news report said the NSA had tapped into key communications links from Yahoo and Google data centres around the world.

The Washington Post, citing documents obtained from former NSA contractor Edward Snowden and interviews with officials, said the program could collect data from hundreds of millions of user accounts “at will”.

The report said the program, called MUSCULAR, operated jointly with the NSA’s British counterpart GCHQ, indicated that the agencies could intercept data flows from fiber-optic cables used by the US Internet giants.

The NSA disputes key details of the report.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Mon Nov 04, 2013 10:51 am

'NSA is spying on everyone including Congressmen and Senators' - Anonymous
30 October 2013 The Voice of Russia

Although most of the world knows about the NSA and its massive spying operations, as many as 50% of Americans have no idea what their government is really doing or who the NSA is. On November 5th the Hacktivist group Anonymous, "the Knights of the Internet" is planning a gathering in Washington, DC called the Million Mask March, in protest not only at massive NSA surveillance but scores of encroachments on the rights of their fellow humans. A member of Anonymous spoke to the Voice of Russia and gave his/her views on Hacktivism, corrupt government and some of the ways people can protect themselves on-line. However he/she stated, the level of spying is so "ridiculous" that almost nothing can be trusted and the only way to return to freedom from monitoring is reigning in the NSA and those who are spying on us all.

The speaker is a member of Anonymous and is not speaking for the entire collective. He/she is merely exercising his/her right of freedom of speech. The individual's voice has been digitized to protect his/her identity.

Robles: Hello, this is John Robles. I am speaking with a member of the Hacktivist group, Anonymous.

Can you tell our listeners a little bit about the nature of Anonymous? Some people are calling it a group or an organization. What exactly is Anonymous?

Anon: Anonymous … it's an idea, anyone can be anonymous. You don't have to fill out any applications to join it. It’s the same thing as wanting to become an Activist. You just want to hide your face for various reasons, because everyone, everyone wants to be under the one idea. The same collective if you want to call it that.

Really the only groups in Anonymous would be actual operations that go on. And those are really the only groups that you can actually join. You don't actually have to join them you can still be part of them.

Read more: http://voiceofrussia.com/2013_10_30/NSA-is-spying-on-everyone-including-Congressmen-and-Senators-Anonymous-7791/
Part 2 : http://voiceofrussia.com/2013_11_03/NSA-spying-and-persecuting-hackers-does-not-prevent-terrorism-Anonymous-9407/
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby Project Willow » Mon Nov 04, 2013 1:56 pm

User avatar
Project Willow
 
Posts: 4793
Joined: Sat May 07, 2005 9:37 pm
Location: Seattle
Blog: View Blog (1)

MUSCULAR is a tool to exploit data links

Postby Allegro » Tue Nov 05, 2013 8:10 am

I searched for MUSCULAR just now, found this hit https://en.wikipedia.org/wiki/NSA_surve ... code_names with its snippet:
    MUSCULAR[edit]. MUSCULAR is a tool to exploit the data links from Google and Yahoo, operated jointly by the National Security ...,

and here’s the text on that page as of the time stamp of this post.

    This [MUSCULAR] page has been deleted. The deletion and move log for the page are provided below for reference.

    01:15, 4 November 2013 Mark Arsten (talk | contribs) deleted page USA surveillance tools (Wikipedia:Articles for deletion/USA surveillance tools)
    18:31, 31 October 2013 Pde (talk | contribs) moved page USA surveillance tools to NSA surveillance code names (This article is primarily about disentangling the code names for NSA programs)

Refer this page, too.
Wikipedia:Articles for deletion/USA surveillance tools
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

The NSA has harmed transatlantic relations

Postby Allegro » Tue Nov 05, 2013 8:18 am

The NSA has harmed transatlantic relations more than any al-Qaida operative could
theguardian.com, Josef Joffe | Friday 1 November 2013 14.24 EDT

    ”Every good spy story,” my friendly (former) CIA operative told me, “has a beginning, a middle and an end. And so, the snooping on the German chancellor and her European colleagues will surely stop.” He didn’t say: “It won’t resume.” Because it always does in a new guise, perhaps more elegantly and subtly.

    For states need to know what other states are up to – friends or foes. Even so-called friends are commercial and diplomatic rivals. Some of our friends deal with our enemies, selling them dual-use technology good for insecticides, but also for nerve gas. Or metallurgical machinery that can churns out tools as well as plutonium spheres.

    Let’s take an earlier story. Recall Echelon, the spy scandal that roiled Atlantic waters in the 90s. It was set up by the Five Eyes – the Anglo powers of the United States, Britain, Canada, Australia and New Zealand – to monitor signal traffic in the Warsaw Pact. After the cold war – spies always look for gainful employment – it was turned inward, on the Europeans, to scan satellite-transmitted communications, allegedly for industrial espionage, too.

    Was it stopped? Yes, the US handed over its listening station in the town of Bad Aibling to the Germans, but the game never ends. In the last 20 years, the importance of satellites has dwindled in favour of fibre optics, the new object of desire on the part of the Five Eyes and of France. Curiously, the British GCHQ and the French DGSE – which have broken into digital communications networks just as assiduously as has the NSA – have escaped much of the blame.

    To deflect the opprobrium piled on the US, the NSA director, Keith Alexander, told Congress on Tuesday that France had acted a subcontractor, supplying his agency with metadata from 70m phone calls collected in just a single month. The general did not finger GCHQ, but we should assume that the Brits – remember Bletchley Park – are much better at the game than the French. They also have a singular strategic advantage. Britain is the place where most of the transatlantic fibre-optic cables converge, so it is a nice place to dig. France has control over fibre-optic cables ending in Marseilles and Brittany.

    In Germany, whose BND is also busy tapping traffic in and out of the country, London and Paris are hardly mentioned. The hue and cry, indeed, an orgy of condemnation, is targeted on the United States. And for good reason: Angela Merkel’s mobile phone. The gist of the outrage is this: “How can you do this to your friends?” Hence: “We are friends no more”.

    There is a slight semantic problem here: states – soulless and bloodless institutions – are never friends. People are. States have good relations based on interest, ties and cultural affinities. Merkel has given the wrathmongers just enough fodder to keep them away from her government, by doing such things as calling in the US ambassador, as if he were the minion of a hostile power. The British envoy has escaped unscathed. Still, Merkel won’t appropriate hare-brained ideas such as stopping the talks on the transatlantic free-trade zone from which the EU may profit more than the US. Nor will she terminate the intimate relationship between the BND and the rest. Where would she get those NSA tips that led to the arrest of a home-grown terror gang in 2007?

    One moral of this tale is the difference between dredging up millions of metadata, which is the common inheritance of all western governments, so to speak, and grabbing hold of the chancellor’s mobile phone. This should – and will – end for a simple realpolitik reason: it’s not worth the revulsion engulfing Washington. Governments don’t need friendship but they do need good will that translates into consent and co-operation. So it is good to know that in Congress, even a diehard Republican like Jim Sensenbrenner, the chairman of the house intelligence committee, is finally moving in on the NSA.

    If Merkel’s cellphone did it, more power to her. Add now, the outrage of Google and Yahoo whose data networks were hacked by the NSA. An intelligence outfit unchecked is an outfit that runs amok. It is like a man with a hammer to whom everything is a nail. “We do it because we can,” is the unspoken motto – and we can do more every day thanks to Moore’s law about runaway processing power and speed.

    Meanwhile, outrage is accumulating where it counts for most – in the United States, the number one in all things digital and military. As former French foreign minister Bernard Kouchner put it: “Let’s be honest. We eavesdrop, too. Everyone is listening in to everyone else. But we don’t have the same means as the United States, which makes us jealous.” And resentful.

    Yet the battle will have to be fought and won in the United States. The country’s obsession with al-Qaida has turned into paranoia, then hubris and license unbound. In such a setting, the spooks always counter the sceptic’s question “Wow much is enough?” with “What if?” Then they go off to pile up ever more haystacks. If none of them contains a needle, so what? Let’s buy more harvesters! Like any obsession, paranoia knows no bounds.

    By now, “What if?” comes with a hefty political price. Off its leash, the NSA has done more damage to transatlantic relations than any al-Qaida operative could dream up. “We do because we can” needs to be encased by “We shouldn’t.” The intelligence services should be switched from autopilot to political guidance – with hands on throttle and wheel. This has nothing to do with friendship, and everything with prudence. States should follow their interests, not their obsessions.
Art will be the last bastion when all else fades away.
~ Timothy White (b 1952), American rock music journalist
_________________
User avatar
Allegro
 
Posts: 4456
Joined: Fri Jan 01, 2010 1:44 pm
Location: just right of Orion
Blog: View Blog (144)

Re: The Criminal N.S.A.

Postby MacCruiskeen » Tue Nov 05, 2013 9:00 am

^^So even the lifelong transatlantic toady Josef Joffe feels which way the wind is blowing. The times they are a-full of unpleasant exigencies.

1967 M.A. in International Studies at the School of Advanced International Studies at Johns Hopkins University...1975 Ph.D. in Political Science at Harvard University

... Stanford.... Deutsches Museum Munich,... Aspen Institute Berlin,...Jacobs-Universität Bremen, ... Atlantic Bridge .., the Hoover Institution and the American Academy in Berlin...

[Editor of the criminally boring rightwing journal Die Zeit, and weekly reactionary front-page pontificator ("Was macht die Welt?") at Der Tagesspiegel.]

Member of the editorial advisory committees to the following institutions: „International Security“ (Harvard/MIT),[5] „The American Interest“[6] (Washington), „Prospect“ (London)[7] and „Internationale Politik“ (Berlin). In 2006 he took part in the Bilderberg Conference [8]

http://de.wikipedia.org/wiki/Josef_Joffe


Why is The Guardian, too, now providing a platform for this omnipresent spook? The question is rhetorical.
"Ich kann gar nicht so viel fressen, wie ich kotzen möchte." - Max Liebermann,, Berlin, 1933

"Science is the belief in the ignorance of experts." - Richard Feynman, NYC, 1966

TESTDEMIC ➝ "CASE"DEMIC
User avatar
MacCruiskeen
 
Posts: 10558
Joined: Thu Nov 16, 2006 6:47 pm
Blog: View Blog (0)

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Nov 15, 2013 10:20 am

Americans’ personal data shared with CIA, IRS, others in security probe
BY MARISA TAYLOR
McClatchy Washington BureauNovember 14, 2013 Updated 23 hours ago

WASHINGTON — U.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.

Federal officials gathered the information from the customer records of two men who were under criminal investigation for purportedly teaching people how to pass lie detector tests. The officials then distributed a list of 4,904 people – along with many of their Social Security numbers, addresses and professions – to nearly 30 federal agencies, including the Internal Revenue Service, the CIA, the National Security Agency and the Food and Drug Administration.

Although the polygraph-beating techniques are unproven, authorities hoped to find government employees or applicants who might have tried to use them to lie during the tests required for security clearances. Officials with multiple agencies confirmed that they’d checked the names in their databases and planned to retain the list in case any of those named take polygraphs for federal jobs or criminal investigations.

It turned out, however, that many people on the list worked outside the federal government and lived across the country. Among the people whose personal details were collected were nurses, firefighters, police officers and private attorneys, McClatchy learned. Also included: a psychologist, a cancer researcher and employees of Rite Aid, Paramount Pictures, the American Red Cross and Georgetown University.

Moreover, many of them had only bought books or DVDs from one of the men being investigated and didn’t receive the one-on-one training that investigators had suspected. In one case, a Washington lawyer was listed even though he’d never contacted the instructors. Dozens of others had wanted to pass a polygraph not for a job, but for a personal reason: The test was demanded by spouses who suspected infidelity.

The unprecedented creation of such a list and decision to disseminate it widely demonstrate the ease with which the federal government can collect and share Americans’ personal information, even when there’s no clear reason for doing so.

The case comes to light amid revelations that the NSA, in an effort to track foreign terrorists, has for years been stockpiling the data of the daily telephone and Internet communications of tens of millions of ordinary Americans. Though nowhere near as massive as the NSA programs, the polygraph inquiry is another example of the federal government’s vast appetite for Americans’ personal information and the sweeping legal authority it wields in the name of national security.

“This is increasingly happening – data is being collected by the federal government for one use and then being entirely repurposed for other uses and shared,” said Fred Cate, an Indiana University-Bloomington law professor who specializes in information privacy and national security. “Yet there is no constitutional protection for sharing data within the government.”

Several people who were on the list not only were stunned to learn about it, but they also questioned how the government could legally collect and share their information when they have no direct link to the inquiry. All of them said they were too nervous to be identified because they feared further scrutiny from the federal government or they didn’t want their names published by the media.

“When it comes to national security, the government has a lot of leeway,” said one Washington lawyer whose husband landed on the list after the lawyer bought a book about how to pass lie detector tests. “But to me, this list raises First Amendment, due process and privacy issues.”

The lawyer doesn’t work for the federal government. The husband is a government employee but isn’t required to take a lie detector test for a security clearance. “I’m concerned this may harm his career even though there’s no reason that it should,” said the lawyer, who added that they planned to ask the government to take the husband’s name off the list. “It’s very alarming and McCarthy-esque in its zeal. To put a person on a secret list because they bought the ‘wrong book’ or are associated with someone who did is overly paranoid."

While the collection of the information likely passes constitutional muster, the federal agencies involved may have violated their own privacy policies by sharing the personal information of people who aren’t government employees, several legal experts agreed.

Some federal security officials also questioned how useful the list would be. Not only are the polygraph-beating techniques unproven, but confirming that they’ve been used is nearly impossible as well, scientists agree. In fact, the polygraph itself is deemed so unreliable that most courts don’t allow the results to be submitted as evidence against criminal suspects.

Federal agencies, however, are under increased pressure to detect security violators, also known as “insider threats,” ever since former NSA contractor Edward Snowden leaked documents earlier this year outlining the agency’s extensive collection of telephone and Internet data.

The Snowden case is only the latest in a series of what the government condemns as betrayals by “trusted insiders” who’ve harmed national security. As a result, the Obama administration has been pressing a government-wide crackdown on security threats that requires federal employees at agencies from the NSA to the CIA and the Peace Corps to the Department of Education to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report suspicious behavior.

Officials say that one of the reasons for retaining the list of nearly 5,000 names is to help federal agencies detect future security violators, such as the next Snowden. It’s unclear how helpful such a list would be in that regard, though. Snowden underwent two polygraphs for his NSA job but he wasn’t found to have used polygraph-beating techniques to pass them, officials familiar with his tests told McClatchy. The NSA refused to comment.

Customs and Border Protection, the Department of Homeland Security agency that’s leading the polygraph investigation, has described it as important in rooting out crooked customs officials at the U.S.-Mexico border. Customs’ internal affairs division launched the polygraph inquiry after identifying 10 applicants who’d received the lie detector training from one of the instructors. Customs then assembled the list of customers’ names earlier this year as a result of court-approved search warrants that remain under seal in the criminal investigation, known as Operation Lie Busters.

Federal authorities acknowledge that the mere teaching of such techniques is protected by the First Amendment. However, prosecutors have pursued a novel legal theory in order to seek criminal charges. They assert that instructors who help federal applicants or employees try to hide lies during government polygraph tests are guilty of obstruction.

One of the Customs and Border Protection internal affairs officials involved in the case has urged authorities across the country to keep track of people who learn the techniques. The methods, known as countermeasures, include controlled breathing, muscle tensing, tongue biting and mental arithmetic.

“You have access to all of this data – all of their financial records, all of their telephone records, all of their transactions . . . ,” Customs official John Schwartz said in a June speech to police polygraphers that McClatchy attended. “Then we can look at that list and determine for ourselves if we are good or not good at detecting these countermeasures.”

Schwartz didn’t return calls about the case. Customs spokesman Michael Friel said that “since the matter is under investigation it would be inappropriate to comment at this time.”

In an email disseminating one version of the list in a spreadsheet, Defense Department official Frank Maietta asked polygraph managers at each agency to check the list for any federal workers or job applicants who might have gotten training.

The agencies included federal law enforcement and intelligence agencies such as the FBI and the Defense Intelligence Agency and others such as the Department of Energy and the Transportation Security Administration. McClatchy contacted the federal agencies that received the list from Schwartz and Maietta but most refused to respond to questions, citing the criminal investigation. Several, however, defended their overall adherence to privacy laws.

In the email to the agencies, Maietta, a polygraph official with the Defense Intelligence Agency, described the information as “merely a mailing list obtained from this case.”

“There’s no indication that any of these individuals did anything wrong, actually received hands-on training, took a polygraph anywhere, utilized countermeasures or are with any federal agency," he wrote in the email in May.

Maietta said an earlier request for the same database check resulted in “very few” responses.

“Some of you indicated your agencies would not allow you to share information,” he wrote.

Nonetheless, the search eventually yielded dozens of federal applicants, several security officials with knowledge of the case told McClatchy. As fresh personnel information was gathered, officials updated the lists and circulated them across the government.

However, only a small percentage of the people on the list were employees with security clearances, said the officials, who asked to remain anonymous because of the sensitivity of the matter. They included one NSA contractor who feared revealing financial problems, a potentially career-ending admission.

Of the several hundred people who might have been linked to the Defense Department, however, a fraction underwent lie detector tests. Also, a portion of them hadn’t worked for the department since the 1980s.

“There was serious effort put into this list but it turned out to be a whole lot of nothing,” said one federal security official with knowledge of the overall effort who asked not to be named for fear of retaliation. “Only a handful of federal employees were directly involved.”

Sex offenders appeared on the list, including convicted child molesters who have to undergo post-conviction polygraph testing in some states, officials confirmed. But such offenders generally are monitored by state or local authorities, not the federal agencies that received the list. Federal prosecutors also don’t have the jurisdiction to seek charges related to those offenders.

Many, if not all, of the 4,904 names appear to be customers of an instructor who hasn’t been prosecuted and may never be. Federal agents collected the data in a search of Oklahoma instructor Doug Williams’ computers and business records. Williams, however, has said that he hasn’t committed a crime.

So far, one instructor has been prosecuted. Chad Dixon of Indiana began serving eight months in prison this month after pleading guilty earlier this year to obstruction charges, mainly as a result of an undercover sting. Dixon was recorded telling undercover agents that they shouldn’t tell federal officials about learning the techniques.

Despite Dixon’s criminal investigation, one of the numerous nurses on the list questioned why federal agencies would have a legitimate interest in her personal information.

“I’m not a federal employee. I’m a nurse,” she said. The 42-year-old woman declined to say why she’d sought the advice, but nurses are required to pass lie detector tests in some states for their licenses. “This does bother me,” she added about the effort. “My information was supposed to be confidential.”

The Supreme Court, however, has held that people who voluntarily turn over information to a “third party,” such as the polygraph instructors, would have no expectation of privacy under the Fourth Amendment.

“It doesn’t seem right to tar people and give them what is a scarlet letter of being likely liars just because they’ve been reading or thinking about beating lie detector tests,” said Lee Tien, a senior staff attorney with the Electronic Frontier Foundation, a civil liberties group. “But the fact is government agencies have an enormous free zone when collecting and sharing data.”

Even so, it’s not clear under what circumstances various government agencies should continue retaining and sharing information about people whose only connection to the case was a book purchase.

“I think it’s a fair question to ask,” said Stephanie Pell, a former federal prosecutor with the Justice Department’s National Security Division. “What is the government’s rationale for continuing to retain and share the information once it is established that all someone did was buy a book?”

Others assert that the government clearly overreached. Customs officials recently confronted leaders of the agency’s union about their purchase of Williams’ book on beating lie detectors. Joseph Martin, the president of the Arizona chapter of the National Treasury Employees Union, said his vice president bought the book so the union could urge members not to voluntarily undergo a polygraph, because of its unreliability.

“What business is it of the government’s if we bought this book?” he said. “We have a right to read about lie detectors and tell our members not to take them.”

A customs internal affairs policy allows for the collection and sharing of records on federal applicants and employees, but it doesn’t appear to permit it when it involves people who have no federal government ties.

The Pentagon, however, said disclosures of personnel records for authorized law enforcement purposes were permitted, although it didn’t specifically address the issue of book-buying.

The FBI echoed that reasoning.

“The FBI routinely receives names of individuals from various law enforcement and criminal justice agencies to check previous criminal-history data or any other derogatory information that exists in our records,” bureau spokesman Paul Bresson said, adding, “After processing the names, we supply our results back to the submitting agency.”

The Air Force’s Office of Special Investigations checked the list “to only positively identify Air Force personnel,” spokeswoman Linda Card said. Defense Department policy “requires polygraph technical reports be maintained for a minimum of 35 years,” she said, without elaborating on whether the list could be kept that long.

The Pentagon’s inspector general, which also was involved in the database check, allows for the sharing of personal information of people who aren’t Defense Department employees “when their activities have directly threatened the functions, property or personnel of the Department of Defense.”

Washington attorney Kel McClanahan called that interpretation “quite a reach” in this instance, because people who buy books on beating lie detectors aren’t necessarily a threat. Still, suing the government would be an uphill battle because the Privacy Act of 1974 leaves so much wiggle room for agencies to collect and share personal data for law enforcement purposes, said McClanahan, who handles lawsuits alleging privacy violations.

“Even the most extreme cases of overreach like this are virtually impossible to litigate because of a poorly written law from 1974,” McClanahan said. “This is merely a symptom of the problem.”



Read more here: http://www.mcclatchydc.com/2013/11/14/2 ... rylink=cpy
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 19 guests