Aletho News

ΑΛΗΘΩΣ

Worse than SOPA? CISPA to censor Web in name of cybersecurity

RT | April 4, 2012

As congressmen in Washington consider how to handle the ongoing issue of cyberattacks, some legislators have lent their support to a new act that, if passed, would let the government pry into the personal correspondence of anyone of their choosing.

H.R. 3523, a piece of legislation dubbed the Cyber Intelligence Sharing and Protection Act (or CISPA for short), has been created under the guise of being a necessary implement in America’s war against cyberattacks. But the vague verbiage contained within the pages of the paper could allow Congress to circumvent existing exemptions to online privacy laws and essentially monitor, censor and stop any online communication that it considers disruptive to the government or private parties. Critics have already come after CISPA for the capabilities that it will give to seemingly any federal entity that claims it is threatened by online interactions, but unlike the Stop Online Privacy Act and the Protect IP Acts that were discarded on the Capitol Building floor after incredibly successful online campaigns to crush them, widespread recognition of what the latest would-be law will do has yet to surface to the same degree.

Kendall Burman of the Center for Democracy and Technology tells RT that Congress is currently considering a number of cybersecurity bills that could eventually be voted into law, but for the group that largely advocates an open Internet, she warns that provisions within CISPA are reason to worry over what the realities could be if it ends up on the desk of President Barack Obama. So far CISPA has been introduced, referred and reported by the House Permanent Select Committee on Intelligence and expects to go before a vote in the first half of Congress within the coming weeks.

“We have a number of concerns with something like this bill that creates sort of a vast hole in the privacy law to allow government to receive these kinds of information,” explains Burman, who acknowledges that the bill, as written, allows the US government to involve itself into any online correspondence, current exemptions notwithstanding, if it believes there is reason to suspect cyber crime. As with other authoritarian attempts at censorship that have come through Congress in recent times, of course, the wording within the CISPA allows for the government to interpret the law in such a number of degrees that any online communication or interaction could be suspect and thus unknowingly monitored.

In a press release penned last month by the CDT, the group warned then that CISPA allows Internet Service Providers to “funnel private communications and related information back to the government without adequate privacy protections and controls.

The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient,” reads the warning.

The Electronic Frontier Foundation, another online advocacy group, has also sharply condemned CISPA for what it means for the future of the Internet. “It effectively creates a ‘cybersecurity’’ exemption to all existing laws,” explains the EFF, who add in a statement of their own that “There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by ‘cybersecurity purposes.’”

What does that mean? Both the EFF and CDT say an awfully lot. Some of the biggest corporations in the country, including service providers such as Google, Facebook, Twitter or AT&T, could copy confidential information and send them off to the Pentagon if pressured, as long as the government believes they have reason to suspect wrongdoing. In a summation of their own, the Congressional Research Service, a nonpartisan arm of the Library of Congress, explains that “efforts to degrade, disrupt or destroy” either “a system or network of a government or private entity” is reason enough for Washington to reach in and read any online communiqué of their choice.

The authors of CISPA say the bill has been made “To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities,” but not before noting that the legislation could be used “and for other purposes,” as well — which, of course, are not defined.

April 4, 2012 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Video | , , , | 4 Comments

NSA Chief Appears to Deny Ability to Warrantlessly Wiretap Despite Evidence

By Trevor Timm | EFF | March 21, 2012

The former NSA official held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says. — Wired Magazine, April 2012

Last week, in Wired Magazine, noted author James Bamford reported on an expansive $2 billion “data center” being built by the NSA in Utah that will house an almost unimaginable amount of data on its servers, along with the world’s fastest supercomputers. Part of the purpose of this new center, according to Bamford, is to store “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter.’”

In the Wired article, Bamford interviewed former NSA official William Binney, a “crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network.” Binney further shed light on the NSA’s warrantless wiretapping program, first exposed by the New York Times in 2005 and the subject of EFF’s long running suit Jewel v. NSA, which challenges the constitutionality of the NSA’s program.

The NSA claims it only has access to emails and phone calls of non-U.S. citizens overseas, but Binney provides more detail to the many previous reports by the New York Times, USA Today, New Yorker, and many more that the program indeed targets US based email records. In the 11 years since 9/11, Binney estimates 15 to 20 trillion “transactions” have been collected and stored by the NSA. From the Wired article:

He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says. “That’s not just San Francisco; they have them in the middle of the country and also on the East Coast.”

The Director of NSA, General Keith Alexander, testified at a House subcommittee hearing Tuesday and Rep. Hank Johnson (D-GA) grilled him on the details of the Wired story. He appeared to deny the main points of the article, including that the NSA was intercepting emails, phone calls, Google searches, and phone records of individuals in the United States—as well as the technical capabilities of the program’s software described by Binney. But perhaps more strangely, Alexander also seemed to claim the NSA did not have the technical ability to collect Americans’ emails and Internet traffic even if it weren’t required to get a warrant:

Gen. Alexander: In the United States we’d have to go through the FBI process, a warrant to get that and serve it to somebody to actually get it.

Rep. Johnson: But you do have the capability of doing it?

Gen. Alexander: Not in the United States.

Rep. Johnson: Not without a warrant?

Gen. Alexander: We don’t have the technical insights in the United States, in other words, you have to have something to intercept or some way of doing that. Either by going to a service provider with a warrant, or you have to be collecting in that area. We’re not authorized to collect, nor do we have the equipment in the United States to actually collect that kind of information. (emphasis ours)

In our lawsuits, EFF has provided evidence that the NSA operated a monitoring center out of AT&T’s switching facility in San Francisco that has the ability to do exactly what Gen. Alexander says the NSA can’t.  In light of all the evidence, it is hard to take comfort from Gen. Alexander’s apparent denial.  In previous discussions of the warrantless wiretapping program, the government has used crabbed and unusual definitions of words to make misleading statements that also seem like denials but turn out to be largely word games.

In one prominent example, then Principal Deputy Director of National Intelligence Michael Hayden said in a 2006 statement: “Let me talk for a few minutes also about what this program is not. It is not a driftnet over Dearborn or Lackawanna or Freemont grabbing conversations…”  Later, when confronted with evidence of a wider drift net program during his confirmation hearing, he explained “I pointedly and consciously downshifted the language I was using. When I was talking about a drift net over Lackawanna or Freemont or other cities, I switched from the word ‘communications’ to the much more specific and unarguably accurate ‘conversation.’”

Notably, the NSA’s interpretation of what it means to “collect” communications seems to be quite limited.  Under Department of Defense regulations, information is considered to be “collected” only after it has been “received for use by an employee of a DoD intelligence component,” and “[d]ata acquired by electronic means is ‘collected’ only when it has been processed into intelligible form[,]”  So, under this definition, if the communications of millions of ordinary Americans were gathered and stored indefinitely in Utah, it would not be “collected” until the NSA “officially accepts, in some manner, such information for use within that component.”

The illegality of warrantless wiretapping, however, does not depend on when the NSA officially accepts the information or processes it into intelligible form (whatever that means).  Americans’ privacy and constitutional protections do and should not hinge on word games.  We are looking forward to establishing, in the Jewel v. NSA case, a simpler proposition: that the government can’t spy on anyone, much less everyone, without a warrant.

~

on March 23, 2012

Recently a report by Wired magazine revealed the details of a spy center in Bluffdale, Utah. It says that the National Security Agency has turned its surveilance apparatus on the US and its citizens, including phone calls and emails. This week the NSA chief testified to Congress and took questions about his agency’s ability – both legally and physically – to spy on US citizens and denied that this is happening. Trevor Timm, an activist with the Electronic Frontier Foundation believes otherwise – he brings his take on the issue.

March 22, 2012 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , | 1 Comment

US builds world biggest spy center

Press TV – March 19, 2012

The United States National Security Agency (NSA) is building the biggest spy center for intercepting and storing electronic communications collected from all over the world and American citizens.

A new report published by the monthly magazine Wired, said that the centre located in Bluffdale, a remote valley in the state of Utah, can process yottabytes (a million billions of gigabytes) of data.

The facility of USD 2 billion is designed to “intercept, decipher, analyze, and store vast swaths of the world’s communications including the contents of telephone calls, private e-mails, mobile phone text messages and Internet searches.

According to the report, the facility is “the most covert and potentially most intrusive intelligence agency ever,” and it will use 65 megawatts of electricity a year, with an annual bill of USD 40 million.

The spy center intercepts commutation signals as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

Using what will likely be the world’s fastest super computer, the NSA can gather data through ‘dumb’ home appliances such as refrigerators, ovens and lighting systems which are connected to the Internet.

The facility is to provide technical assistance to the Department of Homeland Security (DHS), collect intelligence on cyber threats and carry out cyber-security objectives, reported Reuters.

March 19, 2012 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment