Aletho News

ΑΛΗΘΩΣ

NSA targeting users of Internet privacy tool

Press TV – October 5, 2013

New documents have shown that the US National Security Agency has targeted people using a popular service which protected the anonymity of Internet users.

Documents leaked by former intelligence contractor Edward Snowden have revealed the US spy agency has targeted users of The Onion Router (Tor) which helped web users keep business secrets and conduct research anonymously.

According to the documents, the agency has been collecting identities and locations of millions of users of Tor.

Tor aims to help people “defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.”

However, the NSA has followed Tor’s users, while the software is primarily funded and promoted by the US State Department and the Department of Defense.

The agency has been using ad networks like Google’s and Tor’s own entry and exit nodes on the Internet in order to track the users.

In addition, the surveillance agency has been able to block access to the anonymous network, diverting Tor users to insecure channels.

The NSA has repeatedly uncloaked users through circumventing Tor’s protections, although it cannot directly access Tor’s anonymous network.

One of the documents showed that an NSA technique code-named EGOTISTICALGIRAFFE had managed to unmask 24 Tor users over a single weekend.

Court documents have shown that the NSA violated privacy rules for years with improper surveillance practices.

The documents released over the past few months show a troubling picture of the super spy agency that has sought and won far-reaching surveillance powers to run complex domestic data collection without anyone having full technical understanding of the efforts.

The privacy violations were first revealed by Snowden in June. He leaked confidential information that showed the NSA collects data of phone records and Internet communications of American citizens.

October 5, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

EXPOSED: The iPhone and The Government Biometric Database

RINF Alternative News | October 2, 2013

A recent video released by hacktivist group Anonymous presents compelling evidence which claims that Apple’s TouchID technology is linked to the FBI and NSA and is involved in the provision of information on users for a large-scale biometric database under construction by the US Government for use “both domestically and on the battlefield”.

This biometric database is due to be populated by any personal information retrieved by government agencies, leading to fears that Big Brother’s eye is following us wherever we go and whatever we do, even in the privacy of our own homes.

Anonymous alleges that they have uncovered proof of a corrupt alliance of Department of Defense contractors, NSA and CIA-related venture capital which led to the development of technologies subsequently purchased by Apple.

These findings were the result of investigation by Barrett Brown, the jailed and gagged journalist and links to further enlightening material have been posted on the Pastebin website and were largely based on documents obtained by the US defense contractor ManTech in 2010.

So what exactly are these revelations? Firstly, Anonymous claim that there are links between AuthenTec (the company bought by Apple to enable them to develop the TouchID technology) and the “most powerful and corrupt” Defense Department and intelligence community contractors and officials. Anonymous concentrate largely on one individual – Robert E Grady, a prominent figure and political speechwriter under both Bush administrations – when delineating and highlighting the opaque relationships between big business and the US government.

During his time sitting on the board of AuthenTec, Grady was a formerly leading partner in The Carlyle Group, an investment firm which previously owned not only Authentec, but also was the main shareholder of Booz Allen Hamilton, the NSA contractor and erstwhile employer of whistleblower Edward Snowden.

Anonymous presents further claims that the Authentec board of directors ensured that the company would be sold exclusively to Apple, due to the company’s position as market-leader, as this in turn would encourage rival companies to adopt the same technology in order to compete. They state that the launch of the Apple iPhone 5S has meant that secret surveillance and biometric collection has heightened into a full-scale assault on personal data and privacy.

However, other commentators suggest that Apple’s fingerprint security feature may be the thin end of the wedge in terms of biometric collection and consumer devices. Internationally, increasing numbers of countries are deploying biometric technology within organs of the state and rumours abound that biometrics – such as fingerprinting and facial recognition – will soon be a standard feature on game consoles and other electronic leisure products and household gadgets.

Apple’s lack of transparency regarding their usage of data obtained secretly from their customers is not restricted to their newest innovations, either. As far back as 2011 technological researchers were warning that the company could face law suits for breaches of privacy in relation to the storing of users’ locations and other personal information in secret files, which stores location coordinates with a timestamp to effectively map and record the precise movements of individuals.

The implication of this would be the danger this data could fall into the wrong hands if someone was able to hack the system. It is unclear why Apple is storing this data, but it is clearly intentional as such information on the database is being restored across backups and even device migrations. In 2010 Apple was once again the target of claims of privacy violation when a class-action suit was filed against them in a US Federal Court. The claim was that earlier models of the iPhone and iPad contained unique identifying elements, known as Unique Device Identifiers, which allowed advertising agencies track which applications were being downloaded by users, how frequently they were being used and for what period of time.

Users are unable to block the transmission of the UDID, a 40-character string that uniquely identifies each device. The lawsuit alleged: “Some apps are also selling additional information to ad networks, including users’ location, age, gender, income, ethnicity, sexual orientation and political views.” Apple has continuously denied that it transmits user-data without consent, but this has done little to ease fears that the company’s actions constitute an intrusive tracking scheme which aids and abets serious invasions of privacy.

October 3, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

NSA chief admits govt collected cellphone location data

RT | October 02, 2013

The director of the National Security Agency admitted this week that the NSA tested a program that collected cellphone location data from American citizens starting in 2010, but suspended it shortly after.

Gen. Keith Alexander, the head of both the NSA and the United States Cyber Command, told lawmakers in Washington early Wednesday that the secretive pilot program was taken offline in 2011, but that the intelligence community may someday in the future make plans to routinely collect location data about US citizens.

Alexander briefly discussed the program during a Senate hearing on the Hill early Wednesday that focused on the data provided to the government through the Foreign Intelligence Surveillance Act, or FISA, including programs that were exposed earlier this year by unauthorized disclosures attributed to contractor-turned-leaker Edward Snowden.

Only days earlier, Sen. Ron Wyden (D-Oregon) asked Alexander during a Senate Intelligence Committee hearing if the NSA was collecting location data on American citizens.

“I’m asking, has the NSA ever collected, or ever made any plans to collect, American cell site information?”  Wyden asked last Thursday.

The NSA, Alexander responded at the time, “is not receiving cell-site location data and has no current plans to do so.”

During this Wednesday’s hearing, Alexander explained that, “In 2010 and 2011, NSA received samples in order to test the ability of its systems to handle the data format, but that data was not used for any other purpose and was never available for intelligence analysis purposes.”

According to a written copy of the statement obtained by The New York Times before Wednesday’s hearing, Alexander said that location information is not being collected by the NSA under Section 215 of the Patriot Act. Alexander did not discuss if any other laws are being implemented to otherwise allow for the collection and analysis of location data.

Moments after Alexander revealed the pilot program before the Senate committee, he said that the NSA may someday want to seek approval from Washington to revive that initiative as part of a fully functioning intelligence gathering operation.

“I would just say that this may be something that is a future requirement for the country, but it is not right now,” Alexander said.

Alexander’s statement regarding the new defunct program was expected, and obtained by The New York Times moments before Wednesday’s hearing was underway. Times reporter Charlie Savage wrote that morning that information about the pilot project was only recently declassified by Director of National Intelligence James Clapper, and that the draft answer obtained by the paper and later read aloud by Alexander was prepared in case he was asked about the topic.

Still unsatisfied by the intelligence community’s explanation about the collection of cellphone location data, Sen. Wyden supplied the Times with a response suggesting that the truth behind the NSA’s activities isn’t being fully acknowledged by the intelligence community.

“After years of stonewalling on whether the government has ever tracked or planned to track the location of law-abiding Americans through their cellphones, once again, the intelligence leadership has decided to leave most of the real story secret — even when the truth would not compromise national security,” Wyden said.

In March, Wyden asked Clapper to say if the NSA was collecting personal information on millions of Americans. The intelligence director dismissed that allegation, then later apologized to the Senate for offering a “clearly erroneous” response.

“Time and time again, the American people were told one thing about domestic surveillance in public forums, while government agencies did something else in private,” Wyden told the Senate Intelligence Committee panel of witnesses last week, which included Alexander, Clapper, and Deputy Attorney General James Cole.

During last week’s meeting, Wyden said he “will continue to explore that because I believe this is something the American people have a right to know whether the NSA has ever collected or made plans to collect cell-site information.”

October 3, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , , , , | Leave a comment

Former Qwest CEO says refusal to comply with NSA spying landed him in jail

RT | October 1, 2013

nacchioFormer Qwest CEO Joseph Nacchio, who spent over four years in prison for insider trading, now says his conviction was based on his company’s refusal to cooperate with NSA requests to spy on its customers.

Nacchio says he feels “vindicated” by ongoing revelations provided by former NSA contractor Edward Snowden that the NSA does, in fact, access massive amounts of metadata and communications information of both foreigners and Americans.

Nacchio told The Wall Street Journal that the NSA set up a meeting with him in February 2001 wherein he believed they would discuss potential government contracts. But he says the NSA instead asked him for permission to surveil Qwest customers.

He says he refused to cooperate based on advice from his lawyers that such an action would be illegal, as the NSA would not go through the normal process of asking the Foreign Intelligence Surveillance Court for a subpoena. About this time, he says the company’s ability to win unrelated government contracts – something it did not have trouble with before the NSA meeting – slowed significantly.

It took until 2007 before Nacchio was convicted of insider trading. Prosecutors claim he was guilty of selling off Qwest stock in early 2001, not long before the company went through financial ills. Nevertheless, he claimed in court documents that he was still confident in the firm’s ability to win government contracts.

Nacchio believes his conviction was in retaliation for his refusal to play ball with legally dubious NSA spying requests.

“I never broke the law, and I never will,” Nacchio told the WSJ.

His version of events matches reporting by USA Today in 2006, in which the paper noted that Qwest was the lone holdout from the government’s warrantless surveillance operations and that defiance “might affect its ability to get future classified work with the government.”

Yet despite his efforts, Nacchio was barred from using any evidence of potential retaliation in his defense, given that the material was considered classified, and his judge refused requests to allow the evidence in trial. Reports from The Washington Post on evidence that has been made public on his case since that time seem consistent with the CEO’s claims.

As a result of his likely hobbled defense, Nacchio was indicted by federal prosecutors and served four-and-a half years in federal prisons before being released in late September.

The NSA has declined to comment on Nacchio, according to the WSJ and The Washington Post.

While spying operations disclosed by Snowden have had some level of legal backing, President George W. Bush’s wiretapping program did not. Thus, telecom companies that cooperated with the program were eventually given immunity for their compliance in 2008.

October 1, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Subjugation - Torture | , , , , , | Leave a comment

No Surprise: NSA Stores All Metadata It Collects For At Least A Year, Even If It Has Nothing To Do With Anything

By Mike Masnick | Techdirt | September 30, 2013

The latest revelation from the Snowden docs published by The Guardian is that the NSA’s MARINA metadata system for internet data stores the information it gets for up to a year.

“The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of target,” the analysts’ guide explains. “This tool offers the ability to export the data in a variety of formats, as well as create various charts to assist in pattern-of-life development.”

The guide goes on to explain Marina’s unique capability: “Of the more distinguishing features, Marina has the ability to look back on the last 365 days’ worth of DNI metadata seen by the Sigint collection system, regardless whether or not it was tasked for collection.” [Emphasis in original.]

Note that this is different than the phone metadata that people have been talking about. This is “internet” metadata — so browser history, contacts, etc. In other words, the kind of stuff that Dianne Feinstein accidentally admitted the US is scooping up by the boatloads by tapping the internet’s backbone with help from US telcos.

The fact that they can look through it even if it hasn’t been “tasked for collection” is pretty big. It again shows how the NSA keeps saying one thing (such as claiming they only keep data on people they’re “targeting”) is simply false. The NSA continues to redefine things. Information isn’t “collected” until it’s searched. And it’s apparently not “stored” until it’s moved into a different database than this one.

How does anyone take these guys seriously?

September 30, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Feinstein’s Senate Committee Defends NSA Phone Surveillance, Pushes Bill to Retain It

By Noel Brinkerhoff | AllGov | September 28, 2013
Senator Dianne Feinstein

Members of the Senate Intelligence Committee made it clear this week that they see no reason to halt the National Security Agency’s controversial program that collects records of Americans’ phone calls.

Led by the panel’s chair, Senator Dianne Feinstein (D-California), a majority of the committee indicated during a hearing on Thursday that they want the NSA to keep using the once-secret program, but under certain conditions.

Feinstein and the committee’s top Republican, Senator Saxby Chambliss of Georgia, plan to draft new legislation by next week that would require the NSA to file public reports on the calling log database.

The bill would also mandate that the agency reduce the number of years that it stores the database’s contents. Currently, the NSA says that it stores the records for five years.

In addition, Feinstein wants the Senate to have confirmation authority over new NSA directors.

At the same time, the Democratic lawmaker is willing to broaden the agency’s power to wiretap without court approval a foreigner’s cellphone for at least one week when that person travels to the United States.

Another provision would demand that the NSA send lists of the phone numbers it searches, along with explanations for doing so, to the Foreign Intelligence Surveillance Court for review.

Critics of the NSA’s domestic surveillance have called for ending the phone-records program altogether. These advocates include two members of the Senate Intelligence Committee, Democrats Ron Wyden of Oregon and Mark Udall of Colorado, who have introduced a tougher reform bill.

But it appears unlikely Wyden’s bill will get past Feinstein’s committee, since Feinstein says the call log program is legal and “necessary for our nation’s security,” according to The New York Times.

To Learn More:

Senators Push to Preserve N.S.A. Phone Surveillance (by Charlie Savage, New York Times)

Feinstein Outlines NSA Changes (by Brendan Sasso and Kate Tummarello, The Hill)

“Independent Experts” Reviewing NSA Spying Have Ties to Intelligence Community (by Noel Brinkerhoff and Danny Biederman, AllGov)

Left and Right Unite to Sue NSA over Telephone Records Surveillance (by Matt Bewig, AllGov)

September 29, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , | Leave a comment

Political Moves: How Dianne Feinstein Cut Off One Of The Few Attempts At Actual Oversight By Senate Intelligence Committee

By Mike Masnick | Techdirt | September 27, 2013

We’ve already covered how Dianne Feinstein used the Senate Intelligence Committee hearing to play games with the English language, while Senator Dan Coats used it to rant against all you stupid Americans for not trusting the NSA, but there have been some actual attempts to have the Senate Intelligence Committee perform its actual duty of oversight. Both Senators Ron Wyden and Mark Udall — who have been trying to raise these questions for years — actually had specific questions for the assembled panel, but the panel (mainly Keith Alexander) did its best to completely avoid answering the questions, then used political gamesmanship to block Wyden from asking followups.

Wyden used his question to highlight what he’s been hinting at for years, that it’s almost certain that the NSA has collected bulk data on the locations of Americans (something not yet officially revealed, and which they’ve sort of tried to deny for a while). Wyden has been asking versions of this question for a few years (and trying to pass legislation blocking this kind of thing for nearly as long). But watch how Keith Alexander never actually answers the question:

Wyden: Now with respect to questions, let me start with you Director Alexander, and, as you all know, I will notify you in advance so that there won’t be any surprise about the types of issues we are going to get into. And Director Alexander, Senators Udall, Heinrich and I and about two dozen other senators have asked in the past whether the NSA has ever collected or made any plans to collect Americans’ cell-site information in bulk. What would be your response to that?

Gen. Keith Alexander: Senator, on July 25, Director Clapper provided a non-classified written response to this question amongst others, as well as a classified supplement with additional detail. Allow me to reaffirm what was stated in that unclassified response. Under section 215, NSA is not receiving cell-site location data and has no current plans to do so. As you know, I indicated to this committee on October 20, 2011, that I would notify Congress of NSA’s intent to obtain cell-site location data prior to any such plans being put in place. As you may also be aware….

Note the word games: “under Section 215.” He does not say whether they’ve used some other authority to do so. And then he’s just repeating talking points so Wyden flat out cuts him off:

Wyden: General, if I might. I think we’re all familiar with it. That’s not the question I’m asking. Respectfully, I’m asking, has the NSA ever collected or ever made any plans to collect Americans’ cell-site information. That was the question and we, respectfully General, have still not gotten an answer to it. Could you give me an answer to that?

Alexander: We did. We sent that — as you’re also aware I expressly reaffirmed this commitment to the committee on June 25, 2013. Finally, in the most recent and now declassified opinion renewing this program, the FISA court made clear in footnote number five that notice to the court in a briefing would be required if the government were to seek production of cell-site location information as part of the bulk production of call detail records. Additional details were also provided in the classified supplement to Director Clapper’s July 25th response to this question. So what I don’t want to do, Senator, is put out in an unclassified forum anything that’s classified there so I’m reading to you exactly. So we sent both of these to you. I saw what Director Clapper sent and I agree with it.

Wyden: General, if you’re responding to my question by not answering it because you think that’s a classified matter that is certainly your right. We will continue to explore that because I believe this is something the American people have a right to know whether the NSA has ever collected or made plans to collect cell-site information. I understand your answer. I’ll have additional questions on the next round. Thank you, Madam Chair.

First off, Alexander’s answer shows that, contrary to the assertions of some staunch NSA defenders, it is entirely possible to answer a question by saying “there is more information in classified documents that shouldn’t be shared in an open setting.” Some have tried to excuse James Clapper’s lies to Congress by suggesting he couldn’t have said more or less what Alexander said here.

Second, note the doublespeak that Alexander is engaged in here. Even asked, again, to answer the basic question, Alexander pulls an “under this program” type of answer, suggesting (again) that American location data either has been, or is planned, to be collected in bulk. That is worrisome, and should not be classified information. Rather it should be open to public debate as to whether or not it’s appropriate.

But here’s where the political gamesmanship came in. Committee chair Dianne Feinstein gave Senators only five minutes each for their questions. It seemed like a majority of this “oversight” committee didn’t actually ask any questions, but rather, like Coats, simply filibustered angrily at the American public or press for not trusting the NSA. But when actual questions were asked, not enough time was given to get a straight answer. At the very end of the hearing, after most of the other Senators had left, Senator Wyden made a perfectly normal request: could he ask his followup questions. He noted that he just had two questions and both could be asked within an additional five-minute window. Senator Susan Collins, who had similarly filibustered during her own five minutes (focusing mainly on knocking down a complete strawman: falsely insisting that people were upset that the NSA was using Section 215 of the Patriot Act to record all phone calls, when everyone knows that it’s just about call records, not call contents), objected to Wyden’s request because she thought everything would go in order. It was pure political gamesmanship.

So instead of getting to conduct more actual oversight by having the committee ask important questions of the surveillance bosses, the panel, instead, moved on to the “second part” of the hearing, which involved two staunch non-governmental NSA defenders who basically sat down to talk about the awesomeness of being able to spy on everyone. Ben Wittes opened with a “joke” about how the NSA’s director of compliance John DeLong, mocked the level of scrutiny the NSA was under by pointing out that if he had typos in a document he’d have to reveal that to some oversight authority. Har har. This was useless. There was no reason to have them testify, and they were given a hell of a lot more time than the Senators actually asking questions.

That time could have been used to actually conduct oversight. Instead, we got nothing. Throughout the panel Senators pointed out that the American public doesn’t trust the NSA right now (though, they often blamed the public and the press for this, rather than the direct actions and statements of the NSA). If they wanted a lesson in how not to build up that trust, holding a completely toothless “oversight” hearing was a pretty good start.

After Wyden, Udall also asked some specific questions, in which the deputy Attorney General basically just repeated the FISA Court ruling saying that “relevant” has been redefined by the intelligence community to mean basically anything that the intelligence community feels is “necessary” to its investigations, and seems to think that it’s a good thing that this is a “low bar.” He completely ignores the basics of the 4th Amendment, as well as recent Supreme Court decisions on the topic.

I’ve included the video of both Wyden and Udall’s questions below, so you can see the less than 20 minutes of the two-hour session where actual serious questions were asked.

September 28, 2013 Posted by | Deception, Full Spectrum Dominance | , , , , , , , | Leave a comment

Tone Deaf Dianne Feinstein Thinks Now Is A Good Time To Revive CISPA

By Mike Masnick | Techdirt | September 25, 2013

We had believed, along with a number of others, that the Snowden leaks showing how the NSA was spying on pretty much everyone would likely kill CISPA dead. After all, the key component to CISPA was basically a method for encouraging companies to have total immunity from sharing information with the NSA. And while CISPA supporters pretended this was to help protect those companies and others from online attacks, the Snowden leaks have reinforced the idea (that many of us had been pointing out from the beginning) that it was really about making it easier for the NSA to rope in companies to help them spy on people.

Also, if you don’t remember, while CISPA had passed the House, the Senate had shown little appetite for it. Last year, the Senate had approved a very different cybersecurity bill, and had expressed very little interest in taking up that fight again this year. Except now, in an unexpected move, Senate Intelligence Committee boss, and chief NSA defender because of reasons that are top secret, has now announced that she’s been writing a Senate counterpart to CISPA and is prepared to “move it forward.”

Yes, it seems that even though the NSA gleefully hid the evidence of widespread abuses from Feinstein’s oversight committee, she’s playing the co-dependent role yet again. Yes, there’s a chance that this new version of the bill will actually take into account privacy and civil liberties, but I doubt many people would take a bet on that being likely.

Right now what the public is concerned about are not “cyberattacks” from foreigners — they’re concerned about our own government undermining the security and privacy of Americans themselves. Giving those responsible for that destruction of privacy and trust more power to abuse the privacy of Americans is not what people are looking for. Quite the opposite.

September 25, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , | Leave a comment

Surveillance at the United Nations

By Danny O’Brien and Katitza Rodriguez | EFF | September 17, 2013

The surveillance scandal has now reached the United Nation’s Human Rights Council, which opened its 24th session last week to a volley of questions about privacy and spying, many of them targeted at the United States and United Kingdom. (That’s perhaps not surprising, since U.N. representatives were among those listed as being monitored by the NSA and GCHQ).

The opening statement by the eminent South African human rights lawyer Navi Pillay (now the U.N.’s High Commissioner for Human Rights) warned of the “broad scope of national security surveillance in countries, including the United States and United Kingdom,” and urged all countries to “ensure that adequate safeguards are in place to prevent security agency overreach and to protect the right to privacy and other human rights.” On September 13, the German Ambassador Schumacher delivered a joint statement on behalf of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary expressing their concern about the consequences of “surveillance, decryption and mass data collection.”

One part of the potential solution to those concerns will be officially launched this Friday in a Human Rights Council side-meeting on digital privacy hosted by these same concerned countries: the International Principles on the Application of Human Rights to Communications Surveillance.

For over a year, EFF has been working with other civil liberties groups to develop these principles that spell out how existing human rights law applies to modern digital surveillance. The 13 Principles — which have been signed by 258 organizations across the world— also provide a benchmark that people around the world can use to evaluate and push for changes in their own surveillance laws. For this 24th session, EFF has joined RSF and APC in a joint written submission to the HRC, advocating for these checks and balances.

The Human Rights Council isn’t the only diplomatic venue at the United Nations where complaints about the United States’ surveillance practices are being heard. The Human Rights Committee is also set to scrutinize the United States on its compliance with Article 17 (right to privacy) of the International Coventant on Civil and Political Rights. The United States’ written response to Human Rights Committee has already laid out its diplomatic response in favor of the Patriot and FISA provisions. It notably dodges the key question that is emerging from other countries regarding these programs: if the U.S. government cannot rein in its domestic surveillance program, riven as it is with constitutional and statutory problems, just how much worse are the controls on the surveillance of non-US persons?

More directly relevant to the diplomatic community is a connected question: how can the United States accuse, with a straight face, other countries of undermining “Internet Freedom” through the use of malware and mass spying, when it seems that there are precious few internal limits to what its own security services are permitted to do in the same arena?

This is not just a matter of the United States’ international reputation. The greatest risk to the Internet in the international arena right now lies in the  formation of an unholy alliance between countries who are already seeking excuses to spy and censor the net and those, like the United States, who have previously argued against such practices, but are now having to defend their own surveillance excesses with similar language.

Without promising substantive reform at home, the U.S. and the U.K. risk alienating their own allies at the United Nations, while granting a carte blanche for other countries to pursue a repressive Internet agenda abroad. The Western countries implicated in the NSA scandal should grab onto the full set of principles as a liferaft: a way that they can show a commitment to transparency and proportionality in a way that obliges other countries to follow the same standards. Otherwise, the U.S. and the U.K. will be seen as having started a race to the bottom of privacy standards: a race too many other countries will be happy to join.

September 18, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , , , , | Leave a comment

Brazil to bypass US-centric internet amid spy revelations

Press TV – September 17, 2013

Brazil has announced plans to bypass the US-centric internet amid revelations that Washington conducts spy operations on web communications.

amin20130917172800197Brazilian President Dilma Rousseff announced the country’s measures to boost the Brazil’s independence and security on the World Wide Web, including storing data locally and bypassing internet traffic that goes through the United States.

Rousseff said plans are in the works to lay underwater fiber optic cable directly to Europe and all the South American nations in order to create a network free of US eavesdropping. This is while most of Brazil’s global internet traffic passes through the US.

The president also announced that she will push for new international rules of privacy and security in hardware and software during the UN General Assembly meeting later this month.

The country’s postal service also plans to create an encrypted e-mail service that would serve as an alternative to Gmail and Yahoo, two companies being monitored by the NSA.

Experts said the move may herald the first step toward a global network free from US monopoly and its illegal surveillance of global communications.

The development comes following the publication of documents leaked by whistleblower and former NSA contractor Edward Snowden in July, exposing US spying on Brazilian companies and individuals for a decade.

Snowden, a former CIA employee, leaked two top secret US government spying programs under which the NSA and the Federal Bureau of Investigation (FBI) are eavesdropping on millions of American and European phone records and the Internet data from major Internet companies such as Face book, Yahoo, Google, Apple, and Microsoft.

The NSA scandal took even broader dimensions when Snowden revealed information about its espionage activities targeting friendly countries.

September 17, 2013 Posted by | Corruption, Deception, Economics | , , , , , , , | Leave a comment

Brazilian president postpones visit to Washington over US spying

RT | September 17, 2013

Brazilian President Dilma Rousseff has postponed a state visit to Washington in response to the US spying on her communications with top aides. Rousseff is demanding a full public apology from President Obama.

Barack Obama spoke with Rousseff on Monday in an attempt to persuade her into following through with the trip, the Brazilian president’s office said, according to AP.

Brazil’s TV Globo reported that the call between the two presidents lasted for about 20 minutes. Obama and Rousseff discussed revelations that the National Security Agency (NSA) spied on the Brazilian leader’s phone calls and emails. The two presidents then “jointly” agreed to cancel the meeting, Globo reported, citing the presidential office.

The Brazilian government said in a statement that “the conditions are not suitable to undertake this visit on the agreed date.” It expressed hope that the conflict will be resolved “properly” and the trip will happen “as soon as possible.”

The state visit was initially scheduled for October 23. The Obama administration has confirmed that the visit was canceled.

“The president has said that he understands and regrets the concerns disclosures of alleged US intelligence activities have generated in Brazil and made clear that he is committed to working together with President Rousseff and her government in diplomatic channels to move beyond this issue as a source of tension in our bilateral relationship,” said White House spokesman Jay Carney.

Earlier this month, TV Globo revealed in a report that the NSA monitored the content of phone calls, emails, and mobile phone messages belonging to President Rousseff and undefined “key advisers” of the Brazilian government. The NSA also spied on Mexican President Enrique Pena Nieto and nine members of his office.

The revelations were based on evidence provided by former CIA employee and NSA contractor Edward Snowden, which was passed to British journalist Glenn Greenwald.

A document dated June 2012 showed that the Mexican President’s emails were read through one month before he was elected. In his communications, the then-presidential candidate indicated who he would like to appoint to several government posts.

The Brazilian government denounced the NSA surveillance as “impermissible and unacceptable,” and a violation of Brazilian sovereignty.

In July, Greenwald co-wrote articles for O Globo, in which he claimed that some of the documents leaked by Snowden indicated that Brazil was the NSA’s largest target in Latin America.

Greenwald wrote that the NSA was collecting its data through an undefined association between US and Brazilian telecommunications companies, but he could not verify that Brazilian companies had been involved.

Following the revelations, the Brazilian government ordered an investigation into telecommunications companies to determine whether they illegally shared data with the NSA.

Defense ministers of Brazil and Argentina signed a broader military cooperation agreement on September 13. The two governments will work together to improve cyber defense capabilities following revelations of Washington’s spying on Latin American countries.

Brazil will be providing cyber warfare training to Argentine officers from 2014.

September 17, 2013 Posted by | Corruption, Deception, Economics, Progressive Hypocrite | , , , , , | Leave a comment

The NSA Is Also Grabbing Millions Of Credit Card Records

By Tim Cushing | Techdirt | September 16, 2013

In addition to everything else it’s collecting, the NSA also has millions of international credit card transactions stashed away in its databases, according to documents viewed by Spiegel.

The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called “Follow the Money” (FTM). The collected information then flows into the NSA’s own financial databank, called “Tracfin,” which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions.

On one hand, what the NSA is doing is exactly what the NSA should be doing: tracing the money flow of terrorist organizations.

Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to “collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions.”

This is part of the Terrorist Finance Tracking Program, which was set up shortly after the 9/11 attacks and gave the US government access to the SWIFT (Society for Worldwide Interbank Financial Telecommunication) database. This, in and of itself, is not news, having been exposed in 2006. Documents uncovered then showed the program had been in place since 2002, with permission extended to the CIA and the Treasury Dept. as part of Bush’s “Global War on Terror.”

What is new, however, is the fact that the NSA is targeting transactions from major credit card companies, like VISA. This has quite a bit more potential for misuse than SWIFT, which records only banking transactions. VISA responded to this new information with the same quasi-denial we’ve seen from several other companies whose links to the NSA have been exposed.

“We are not aware of any unauthorized access to our network. Visa takes data security seriously and, in response to any attempted intrusion, we would pursue all available remedies to the fullest extent of the law. Further, its Visa’s policy to only provide transaction information in response to a subpoena or other valid legal process.”

Of course, this isn’t “unauthorized” access, not when gathered with a court order or subpoena. But this isn’t as tightly controlled as the spokesperson makes it appear. If pursuing data for “counterterrorism” purposes, the NSA is allowed to skirt the protections of the Right to Financial Privacy Act, thanks to an amendment in the PATRIOT Act. But even with these legal options, it appears the NSA would still rather pursue this in an extralegal fashion in order to circumvent the warrant process.

NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company’s complex transaction network for tapping possibilities.

Whatever’s happening now appears to be the NSA grabbing more data simply because it can. It’s not as if it didn’t already have access copious amounts of financial data, thanks to the government’s fully legal (and fully public) collection of bulk financial records through SWIFT.

Remember: in addition to stealing the data, Treasury also gets it via a now-public agreement. The former CEO of SWIFT Leonard Schrank and former Homeland Security Czar, Juan Zarate actually boasted in July, in response to the earliest Edward Snowden revelations, about how laudable Treasury’s consensual access to the data was.

“The use of the data was legal, limited, targeted, overseen and audited. The program set a gold standard for how to protect the confidential data provided to the government. Treasury legally gained access to large amounts of Swift’s financial-messaging data (which is the banking equivalent of telephone metadata) and eventually explained it to the public at home and abroad.

It could remain a model for how to limit the government’s use of mass amounts of data in a world where access to information is necessary to ensure our security while also protecting privacy and civil liberties.”

Never mind that by the time they wrote this, an EU audit had showed the protections were illusory, in part because the details of actual queries were oral (and therefore the queries weren’t auditable), in part because Treasury was getting bulk data. But there was a legitimate way to get data pertaining to the claimed primary threat at hand, terrorism. And now we know NSA also stole data.

Even when the government has an advantageous agreement to collect bulk data with little oversight, its agencies can’t help but exploit this even further. The collection via “oral queries” is another indicator of these agencies’ (FBI, NSA, CIA) unwillingness to follow even the most minimal of rules. (See also the administration’s 2010 ruling that made the FBI’s warrantless wiretapping legal, which occurred after the agency’s process had slid from issuing tons of National Security Letters to simply calling up the telcos and requesting records.)

The untargeted collection of financial data has raised concerns from those on the “collection” side.

[E]ven intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK’s intelligence agency GCHQ concerning the legal perspectives on “financial data” and the agency’s own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved “bulk data” full of “rich personal information,” much of which “is not about our targets,” the document says.

When even the spies are concerned about about how much data their spy programs are netting, that’s a pretty good sign a bulk records collections effort has gone too far. And it has deeper implications than simply a massive amount of privacy violations. As Marcy Wheeler points out, even the then-Fed chairman Alan Greenspan expressed his concerns about the breadth of the SWIFT collections.

If the world’s financiers were to find out how their sensitive internal data was being used, he acknowledged, it could hurt the stability of the global banking systems.

That’s a scary thought, considering the “global banking system” isn’t all that stable to begin with. A lack of targeting will leave the NSA open to more accusations of economic espionage, something clearly not related to its supposed “national security” agenda.

September 16, 2013 Posted by | Corruption, Full Spectrum Dominance | , , , , | Leave a comment