NSA secretly accessed Yahoo, Google data centers to collect information
RT | October 30, 2013
Despite having front-door access to communications transmitted across the biggest Internet companies on Earth, the National Security Agency has been secretly tapping into the two largest online entities in the world, new leaked documents reveal.
Those documents, supplied by former NSA contractor Edward Snowden and obtained by the Washington Post, suggest that the US intelligence agency and its British counterpart have compromised data passed through the computers of Google and Yahoo, the two biggest companies in the world with regards to overall Internet traffic, and in turn allowed those country’s governments and likely their allies access to hundreds of millions of user accounts from individuals around the world.
“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” the Post’s Barton Gellman and Ashkan Soltani reported on Wednesday.
The document providing evidence of such was among the trove of files supplied by Mr. Snowden and is dated January 9, 2013, making it among the most recent top-secret files attributed to the 30-year-old whistleblower.
Both Google and Yahoo responded to the report, with the former’s response being the most forceful.
Google’s chief legal officer, David Drummond, said the company was “outraged” by the allegations.
“We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide,” said Drummond, implying the web giant had been caught by surprise by the revelations..
“We do not provide any government, including the US government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform.”
Yahoo likewise implied it was not actively cooperating with the NSA in granting the agency access to its data infrastructure.
“We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency,” the company said via statement.
Gen. Keith Alexander, the head of the NSA, told reporters Wednesday afternoon, “I don’t know what the report is,” according to Politico, and said his agency is “not authorized” to tap into Silicon Valley companies. When asked if the NSA tapped into the data centers, Alexander said, “Not to my knowledge.”
Earlier this year, separate documentation supplied by Mr. Snowden disclosed evidence of PRISM, an NSA-operated program that the intelligence company conducted to target the users of Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL and Apple services. When that program was disclosed by the Guardian newspaper in June, reporters there said it allowed the NSA to “collect material including search history, the content of emails, file transfers and live chats” while having direct access to the companies’ servers, at times with the “assistance of communication providers in the US.”
According to the latest leak, the NSA and Britain’s Government Communications Headquarters are conducting similar operations targeting the users of at least two of these companies, although this time under utmost secrecy.
“The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process,” the Post noted.
And while top-brass in the US intelligence community defended PRISM and said it did not target American Internet users, the newest program — codenamed MUSCULAR — sweeps up data pertaining to the accounts of many Americans, the Post acknowledged.
The MUSCULAR program, according to Wednesday’s leak, involves a process in which the NSA and GCHQ intercept communications overseas, where lax restrictions and oversight allow the agencies access to intelligence with ease.
“NSA documents about the effort refer directly to ‘full take,’ ‘bulk access’ and ‘high volume’ operations on Yahoo and Google networks,” the Post reported. “Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.”
To do as much, the NSA and GCHQ rely on capturing information being sent between company data centers around the globe, intercepting those bits and bytes in transit by tapping in as information is moved from the “Public Internet” to the private “clouds” operated by the likes of Google and Yahoo. Those cloud systems involve the linking of international data centers, each processing and containing huge troves of user information for potentially millions of customers. Intelligence officers who can sneak through the cracks when information is decrypted — or never encrypted in the first place — can then see the information sent in real time as take “a retrospective look at target activity,” according to documents seen by the Post.
“Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previously unknown scale from US citizens and residents” Barton and Soltani reported.
“Data are an essentially global commodity, and the backup processes of companies often mean that data is replicated many places across the world,” The Post’s Andrea Peterson added in a separate report. “So just because you sent an e-mail in the US, doesn’t mean it will always stay within the nation’s borders for its entire life in the cloud.”
As data goes into those facilities outside of the US, the NSA and GCHQ have more tactics to deploy in order to obtain private communications. Additionally, Yahoo has not nor do they now have any plans to deploy encryption technology to secure communications, suggesting the data of their millions of users was passed in-the-clear through international data centers, ripe to be intercepted by the intelligence community.
“Google and Yahoo generally connect their data centers over privately owned or leased fiber-optic cables, which do not share traffic with other Internet users and companies, to enable the tasted connections and keep information secure,” Gellman added in a separate article authored alongside the Post’s Todd Linderman. “Until recently, these internal data networks were not encrypted. Google announced in September, however, that it is moving quickly to encrypt those connections. Yahoo’s data center links are not encrypted.”
“It’s an arms race,” Eric Grosse, Google’s vice president for security engineering, told the Post last month. “We see these government agencies as among the most skilled players in this game.”
After hearing ot the MUSCULAR program by the Post, Google said in a statement that they were “troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity.”
“We have long been concerned about the possibility of this kind of snooping, which is why we continue to extend encryption across more and more Google services and links,” the company said.
“We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency,” insisted Yahoo.
Only hours before the latest Snowden leak was made public, NSA Director Keith Alexander told a Congressional panel that the illegal, unconstitutional revelations helped terrorist intent on killing Americans. Answering a question from Rep. Michele Bachmann (R-Minnesota) about the effect of the leaks on national security, Alexander and Director of National Intelligence James Clapper both said the disclosure have and will continue to cause major damage to the US.
At that same hearing, Alexander admitted that the NSA “compels” telecommunication companies to provide the government with user intelligence.
“Nothing that has been released has shown that we’re trying to do something illegal or unprofessional,” Alexander added.
Brazil to press for local Internet data storage after NSA spying
RT | October 29, 2013
Brazil is urging a plan to introduce local data storage for Internet giants like Facebook and Google in order to keep the information they get from Brazilian users safe –as part of a complex of measures to oppose US spying.
The new law could impact Google, Facebook, Twitter and other Internet global companies that operate in Brazil, Latin America’s biggest country and one of the world’s largest telecommunications markets.
The country’s president, Dilma Rousseff, is urging lawmakers to vote as early as this week on the law, according to Reuters who have seen the draft of the legislation.
“The government can oblige Internet service companies … to install and use centers for the storage, management and dissemination of data within the national territory,” the draft of the document read.
Rousseff’s calls come after surveillance leaks by the US in Brazil that went as far as tracking the personal phone calls and e-mails of the President herself.
Last month, Brazilian President Dilma Rousseff canceled a scheduled meeting at the White House after leaked documents showed the NSA spied on her country’s state oil company.
“We are not regulating the way information flows, just requiring that data on Brazilians be stored in Brazil so it is subject to the jurisdiction of Brazilian courts,” Rousseff spokesman Thomas Traumann said. “This has nothing to do with global communications.”
However, the companies disagree saying that the legislation will increase costs of services, and damage the economic activity connected with information.
Last week a coalition of business groups representing dozens of Internet companies including Facebook, Google, Microsoft and eBay sent a letter to Brazilian lawmakers.
“In-country data storage requirements would detrimentally impact all economic activity that depends on data flows,” the letter read, Reuters reported.
Many also threatened the law will scare the companies, while others, nevertheless, were of the opinion that the companies would comply if faced with no other options.
This week, Brazil is expected to vote on a cyber-security bill to create a state system to protect the country’s citizens from spying.
When the news on the bill emerged two weeks ago, Brazilian President Dilma Rousseff tweeted the news, stressing the need for greater security “to prevent possible espionage.”
The latest legislation project comes against a backdrop of Brazil set to host a conference next April to debate ways to guard Internet privacy from espionage.
The meeting is to be held by ICAAN, the body that manages web domain names. It is thought to be neutral and includes governments, civil society and industry.
Meanwhile, BRICS companies are working to create a “new Internet”.
In particular, Brazil has been reported to be building a “BRICS cable” that will create an independent link between Brazil, South Africa, India, China and Russia, in order to bypass NSA cables and avoid spying.
The cable is set to go from the Brazilian town of Fortaleza to the Russian town of Vladivostok via Cape Town, Chennai and Shantou.
The length of the fiber-optic cable will be almost 35,000 kilometers, making it one of the most ambitious underwater telecom projects ever attempted.
Last week, most of the BRICS countries joined talks to hammer out a UN resolution that would condemn “indiscriminate” and “extra-territorial” surveillance, and ensure “independent oversight” of electronic monitoring.
Russian Foreign Minister Sergey Lavrov said that “contacts [between Moscow and Washington] never stop,” when asked if the latest publication of secret files leaked by the former National Security Agency (NSA) contractor would affect relations between Russia and the US.
Also, Lavrov made it clear that the situation surrounding Snowden is irrelevant to Russia.
“We have formulated our position on Snowden and have said everything,” he said.
Related article
- China echoes Brazil’s call for cyberspace guidelines (thebricspost.com)
Google-bye to privacy? Users’ faces, names and comments are going in ads
RT | October 12, 2013
Following in the footsteps of Facebook, anything you post, like, comment or review on Google or tied-in services can in future be used in product endorsement ads.
It means that starting Nov. 11, when Google’s new terms of service go live, all content (video, brands or products) Google+ and YouTube users publicly endorse by clicking on the “+1” or “Like” button can appear in an ad with that person’s image.
Such “shared endorsements” ads will also appear on millions of other websites that are part of Google’s display advertising network.
Google+ users will have the ability to opt out by turn the setting to “off,” but at the same time it “doesn’t change whether your Profile name or photo may be used in other places such as Google Play.”
“For users under 18, their actions won’t appear in shared endorsements in ads and certain other contexts,” the announcement on Google’s website reads.
Another way to “opt out” is just stop “liking”, sharing and publicly checking-in.
Google’s move follows a similar change Facebook imposed in August. There it is called “sponsored stories.” It works almost exactly the same way – a recommendation made through the social network’s “like” button appears as advertising endorsement on a friend’s Facebook page.
While both companies say the service will be helpful for users, Google’s revised terms of service have again raised privacy concerns.
“It’s a huge privacy problem,” Reuters cited Marc Rotenberg, the director of online privacy group EPIC, as saying.
He has called on the US Federal Trade Commission to investigate whether the policy change violates a 2011 consent order that prohibits Google from retroactively changing users’ privacy settings.
The announcement also was harshly criticized on Google’s profile, with users expressing dismay and disappointment. Some users suggested they might pull down all their current pictures or change profile pictures.
ADL orders YouTube to disable Press TV account: Emadi
Press TV – August 18, 2013
Video-sharing site YouTube deactivated Press TV’s official page without explanation after the Israeli-American Anti-Defamation League (ADL) ordered it to terminate the Iranian channel’s live broadcast.
“We have not been able to upload new videos on our official YouTube page since July 25. Both YouTube and (its parent company) Google have declined to comment,” said Press TV Newsroom Director Hamid Reza Emadi.
He added that YouTube was “in fact responding to an ADL order to stop us from revealing Israeli crimes to the world.”
An article on ADL’s official website has accused Press TV of bypassing the West’s sanctions by broadcasting live via YouTube and other internet and mobile platforms.
“ADL has contacted YouTube regarding concerns about Press TV,” reads the article, further noting that the station’s “broadcast on YouTube comes at a time when the United States, the European Union and others in the international community are seeking to isolate Iran.”
Since January 2012, Press TV has come under mounting pressure from European governments and satellite companies, which have taken the alternative channel off the air across the European Union.
In a statement published on the official website of the American Jewish Committee (AJC), the pro-Israeli lobby has lauded Spain’s efforts to ban Press TV, saying Madrid has pulled the plug on the Iranian channel following months of negotiations with the AJC.
“In recent years has emerged a channel that not only challenges the Zionists’ long-time media dominance, but also has it questioned the West’s silence on their (the Zionists’) crimes against humanity. That’s Press TV and they’re determined to silence it,” Emadi added.
He said Press TV had to create an alternative YouTube account to upload its videos.
“Viewers can now watch our videos at http://www.youtube.com/user/PresstvNewsCast,” he said.
Press TV switches to new YouTube page after ban
Press TV – August 8, 2013
Press TV has created a new YouTube page weeks after Google disabled the alternative channel’s access to its official YouTube page without giving explanation.
“Press TV viewers can now watch our videos at www.youtube.com/user/PresstvNewsCast ,” said Press TV newsroom director, Hamid Reza Emadi, adding that tens of thousands of Press TV subscribers had been unable to watch the videos on the popular video sharing site since July 25.
YouTube’s parent company Google “disabled our official page’s account citing a violation of terms of services, but clarified neither the nature of the so-called violation nor did it mention the services in question,” Emadi added, stressing that Press TV will continue its efforts to get back on its official page on the popular video sharing site.
Last week, YouTube told Press TV that the channel’s account had become reactivated.
“The account appears to be active (now) and you should be able to access it,” wrote The YouTube Team in response to Press TV’s online queries. However, Press TV’s YouTube team was unable to access the channel’s official YouTube page, whose Google account remained “disabled”.
Meanwhile, an article on the official website of the Israeli-American Anti-Defamation League (ADL) has accused Press TV of bypassing the West’s sanctions by broadcasting live via Youtube and other internet and mobile platforms.
“ADL has contacted Youtube regarding concerns about Press TV,” reads the article, further noting that the station’s “broadcast on Youtube comes at the a time when the United States, the European Union and others in the international community are seeking to isolate Iran.”
“Press TV has yet to find out whether there’s a link between the ADL statement and the blocking of its official YouTube page,” Emadi said.
Related article
Google yet to explain YouTube block: Press TV
Press TV – July 30, 2013
Almost a week after Google disabled Press TV’s YouTube account, the internet giant has yet to explain why it blocked the alternative TV channel’s access to the video sharing site.
“We have contacted Google several times since last Thursday, when Google prevented us from uploading new videos, but (we) have not received any concrete response as to why they did it,” said Hamid Reza Emadi, Press TV’s newsroom director.
Emadi said Press TV’s YouTube page is “up and running as we speak, but we do not have admin access to the page and cannot add or remove any material.”
He said many Press TV viewers and subscribers email the channel, asking for an explanation.
“We are telling them that we will be able to come up with an explanation once Google tells us what has happened,” he added.
AT&T joins Verizon, Facebook in selling customer data
RT | July 6, 2013
AT&T has announced that it will begin selling customers’ smart phone data to the highest bidder, putting the telecommunications giant in line with Verizon, Facebook and other competitors that quietly use a consumer’s history for marketing purposes.
The company claims its new privacy policy, to be updated within “the next few weeks,” exists to “deliver more relevant advertising” to users based on which apps they use and their location, which is provided by GPS-tracking. Apparently recognizing the natural privacy concerns a customer might have, AT&T assured the public that all data would be aggregated and made anonymous to prevent individual identification.
A letter to customers, for instance, described how someone identified as a movie fan will be sent personalized ads for a nearby cinema.
“People who live in a particular geographic area might appear to be very interested in movies, thanks to collective information that shows wireless devices from that area are often located in the vicinity of movie theaters,” the letter states. “We might create a ‘movie’ characteristic for that area, and deliver movie ads to the people who live there.”
A June 28 blog post from AT&T’s chief privacy officer Bob Quinn said the new policy will focus on “Providing You Service and Improving Our Network and Services,” but the online reaction has been overwhelmingly negative, with many customers looking for a way to avoid the new conditions.
“You require that we allow you to store a persistent cookie of your choosing in our web browsers to opt out,” one person wrote. “No mention of how other HTTP clients, such as email clients, can opt out. If you really did care about your customers, you would provide a way for us to opt out all traffic to/from our connection and mobile devices in one easy setting.”
One problem for any customer hoping for a new service is the lack of options, smartphone or otherwise. Facebook, Google, Twitter and Verizon each store consumer data for purposes that have not yet been made clear. And because of the profit potential that exists when a customer blindly trusts a company with their data, small Internet start-ups, including AirSage and many others, have developed a way to streamline information into dollars.
The nefarious aspect of AT&T’s announcement is underscored by the recent headlines around the National Security Agency, which has spent years has compelling wireless corporations to hand over data collected on millions of Americans. Unfortunately for the privacy of those concerned, AT&T’s new policy may only be a sign of things to come.
“Instead of merely offering customers a trusted conduit for communication, carriers are coming to see subscribers as sources of data that can be mined for profit, a practice more common among providers of free online services like Google and Facebook,” the Wall Street Journal wrote about the matter in May.
Turkey takes steps to monitor Twitter content, users
Al-Akhbar | June 27, 2013
Turkey said on Wednesday it had asked Twitter to set up a representative office inside the country, which could give it a tighter rein over the micro-blogging site it has accused of helping stir weeks of anti-government protests.
While mainstream Turkish media largely ignored the protests during the early days of the unrest, social networking sites such as Twitter and Facebook emerged as the main outlets for Turks opposed to the government.
Transport and Communications Minister Binali Yildirim told reporters on Wednesday that without a corporate presence in the country, the Turkish government could not quickly reach Twitter officials with orders to take down content or with requests for user data.
“When information is requested, we want to see someone in Turkey who can provide this … there needs to be an interlocutor we can put our grievance to and who can correct an error if there is one,” he said.
“We have told all social media that … if you operate in Turkey you must comply with Turkish law,” Yildirim said.
Twitter declined to respond to the government request on Wednesday, but a person familiar with the company’s thinking said it had no current plans to open an office in that country.
Turkey successfully pressured Google Inc into opening an office there last October after blocking YouTube, a Google subsidiary, from Turkish Internet users for two years.
While Ankara had no problems with Facebook, which had been working with Turkish authorities for a while and had representatives inside Turkey, Yildirim said it had not seen a “positive approach” from Twitter after Turkey issued the “necessary warnings” to the site.
“Twitter will probably comply, too. Otherwise this is a situation that cannot be sustained,” he said, without elaborating, but he stressed the aim was not to limit social media.
An official at the ministry, who asked not to be named, said the government had asked Twitter to reveal the identities of users who posted messages deemed insulting to the government or prime minister, or that flouted people’s personal rights.
It was not immediately clear whether Twitter had responded.
Facebook said in a statement that it had not provided user data to Turkish authorities in response to government requests over the protests and said it was concerned about proposals Internet companies may have to provide data more frequently.
In the midst of some of the country’s worst political upheaval in years, Turkish Prime Minister Tayyip Erdogan has described sites like Twitter as a “scourge,” although senior members of his party are regular users. He has said such websites were used to spread lies about the government with the aim of terrorizing society.
Police detained several dozen people suspected of inciting unrest on social media during the protests, according to local reports.
Speaking at the Brookings Institution in Washington, D. C., Twitter’s Chief Executive Dick Costolo said on Wednesday that he had been observing the developments in Turkey, but he emphasized that Twitter had played a hands-off role in the political debate.
“We don’t say, ‘Well, if you believe this, you can’t use our platform for that,'” Costolo said. “You can use our platform to say what you believe, and that’s what the people of Turkey … are using the platform for. The platform itself doesn’t have any perspective on these things.”
Turkey’s interior minister had previously said the government was working on new regulations that would target so-called “provocateurs” on social media but there have been few details on what the laws would entail.
One source with knowledge of the matter said the justice ministry had proposed a regulation whereby any Turk wishing to open a Twitter account would have to enter their national identification number, but this had been rejected by the transport ministry as being technically unfeasible.
Turkish users have increasingly turned to encryption software to thwart any ramp up in censorship of the Internet.
Last year, Twitter introduced a feature called “Country Withheld Content” that allows it to narrowly censor tweets considered illegal in a specific country, and it caused some concern among users.
Twitter implemented the feature for the first time in October in response to a request by German authorities, blocking messages in Germany by a right-wing group banned by police.
(Reuters, Al-Akhbar)
Related article
- Turkey announces plans ‘for gas’ and cyber security in face of Gezi protests (alethonews.wordpress.com)
NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System
By Lee Rogers | Blacklisted News | June 10, 2013
The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.
In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.
It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.
At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.
Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism then all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.
Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that, when completed, the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.
The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.
At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based on this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.
The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be … removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.
Related articles
- The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping
- Why Did Edward Snowden Go to Hong Kong?
- DOJ launches criminal probe of NSA leaker
- US security officials said NSA leaker, journalist should be ‘disappeared’ – report
- Government Spying: Should We Be Shocked?
- Boundless Informant: NSA’s complex tool for classifying global intelligence
- The NSA’s Favorite Weasel Word To Pretend It’s Claiming It Doesn’t Spy On Americans
- The “Congress knew” defense
- NSA memo pushed to ‘rethink’ 4th Amendment
Boundless Informant: NSA’s complex tool for classifying global intelligence
RT | June 9, 2013
A new batch of classified NSA docs leaked to the media reveals the details of a comprehensive piece of software used by NSA to analyze and evaluate intelligence gathered across the globe as well as data extraction methods.
The top-secret documents released by the Guardian shed light on the National Security Agency’s data-mining tool being used for counting and categorizing metadata gathered and stored in numerous databases around the world.
Known as Boundless Informant, the software provides its operator a graphical insight on how many records were collected for a specific “organizational unit” or country, what type of data was collected and what type of collection was used. The program also allows determining trends in data collection for both strategic and tactical decision making, according to the slides.
One of the slides contains a part of the Informant’s user interface showing a world map with countries color-coded ranging from green to red depending on the amount of records collected there. While Iran, Pakistan and some other states are predictably “hottest” according to the map, the agency collected almost 3 billion intelligence pieces in the US in March 2013 alone.
The map showing how much data is being collected in different countries across the globe (image from the Guardian)
The insight on the software being used by the NSA comes amid the agency spokesperson Judith Emmel’s claims that the NSA cannot at the moment determine how many Americans may be accidentally included in its surveillance.
“Current technology simply does not permit us to positively identify all of the persons or locations associated with a given communication,” Emmel said Saturday adding that “it is harder to know the ultimate source or destination, or more particularly the identity of the person represented by the TO:, FROM: or CC: field of an e-mail address or the abstraction of an IP address.”
NSA data sources
Another slide from the internal NSA presentation redacted by the Guardian editors details the data gathering methods used in the NSA global surveillance program.
The first method suggests interception of data from “fiber cables and infrastructure as data flows past” under the FISA Amendments Act (FAA) of 2008, Section 702.
The second distinguished method is data collection “directly from the servers of the US service providers.”
The slide detailing methods of data extraction under the FISA Amendment Act (image from the Guardian)
The presentation encourages analysts to use both methods for better results.
Google, Facebook negotiated ‘secure portals’ to share data with NSA?
Meanwhile, a report by the New York Times revealed that Internet giants, including Google and Facebook, have been in negotiations with the US security agency over ‘digital rooms’ for sharing the requested data. The companies still insist there is no “back door” for a direct access to user data on their servers.
The Internet companies seem more compliant with the spy agencies than they want to appear to their users, and are cooperating on “behind-the-scenes transactions” of the private information, according to a report that cites anonymous sources “briefed on the negotiations.”
According to the report, Google, Microsoft, Yahoo, Facebook, AOL, Apple and Paltalk have “opened discussions with national security officials about developing technical methods to more efficiently and securely share the personal data of foreign users in response to lawful government requests,” sometimes “changing” their computer systems for this purpose.
These methods included a creation of “separate, secure portals” online, through which the government would conveniently request and acquire data from the companies.
Twitter was the only major Internet company mentioned in the report that allegedly declined to facilitate the data transfer to the NSA in a described way. As opposed to a legitimate FISA request, such a move was considered as not “a legal requirement” by Twitter.
The sources claim the negotiations have been actively going in the recent months, referring to a Silicon Valley visit of the chairman of the Joint Chiefs of Staff Martin E. Dempsey. Dempsey is said to have met the executives of Facebook, Microsoft, Google and Intel to secretly discuss their collaboration on the government’s “intelligence-gathering efforts.”
NSA pressured to declassify more PRISM details
In response to the fury over US government’s counterterrorism techniques, Director of National Intelligence James Clapper for the second time in three days revealed some details of the PRISM data-scouring program.
Being one of the “most important tools for the protection of the nation’s security” the PRISM is an internal government computer system for collecting “foreign intelligence information from electronic communication service providers under court supervision,” Clapper said.
He also said that PRISM seeks foreign intelligence information concerning foreign targets located outside the US and cannot intentionally target any US citizen or any person known to be in the US. As for “incidentally intercepted” information about a US resident, the dissemination of such data is prohibited unless it is “evidence of a crime”, “indicates” a serious threat, or is needed to “understand foreign intelligence or assess its importance.”
Clapper also stressed that the agency operates with a court authority and that it does not unilaterally obtain information from the servers of US telecoms and Internet giants without their knowledge and a FISA Court judge approval.
Related articles
- The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping
- NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System
- DOJ launches criminal probe of NSA leaker
- US security officials said NSA leaker, journalist should be ‘disappeared’ – report
- Government Spying: Should We Be Shocked?
- The NSA’s Favorite Weasel Word To Pretend It’s Claiming It Doesn’t Spy On Americans
- The “Congress knew” defense
- NSA memo pushed to ‘rethink’ 4th Amendment
Oh, And One More Thing: NSA Directly Accessing Information From Google, Facebook, Skype, Apple And More
By Mike Masnick | TechDirt | June 6th 2013
Obviously, the Verizon/NSA situation was merely a small view into just how much spying the NSA is doing on everyone. And it seems to be spurring further leaks and disclosures. The latest, from the Washington Post, is that the NSA has direct data mining capabilities into the data held by nine of the biggest internet/tech companies:
The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.
Dropbox , the cloud storage and synchronization service, is described as “coming soon.”
This program, like the constant surveillance of phone records, began in 2007, though other programs predated it. They claim that they’re not collecting all data, but it’s not clear that makes a real difference:
The PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.
Analysts who use the system from a Web portal at Fort Meade key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, “but it’s nothing to worry about.”
Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content.
I expect we’ll be seeing more such revelations before long.


