The NSA Wants a Skeleton Key to Everyone’s Encrypted Data
Posted: April 18, 2018 Filed under: Mediasphere, Self Defense, Think Tank | Tags: Data, Ecryption, NSA, Privacy Leave a commentEncryption can protect personal data from government intrusion, which means the government wants the key to break it.
Gavin Hanson reports: Like it or not, you are your data. In this day and age, your receipts, social media activity, public records, GPS data, and internet search history are the proof of who you are. And while you may have thought you had secrets, the Federal Government would like the rest of them.
The seemingly innocuous pieces of information we trade away every day create a detailed mosaic of our lives used to target advertising and create personality profiles that are exploited by the FBI, political operatives like Cambridge Analytica, and Russian propagandists.
And those are just the legal shenanigans! Instances of malicious hacking that jeopardize social security numbers and other important data are on the rise as well.
But all hope is not lost! There is but one meaningful defense against such intrusions, one used by whistleblowers, banks, the government (often poorly), and college students: encryption.
Encryption, to oversimplify, is the process of putting your data in a combination locked safe, and it’s becoming more popular. Like all passcodes, these combinations are best stored non-electronically.
Automatically encrypted search engines and internet services simplify the process for users. They protect individuals’ data from hacking, theft, and even the government, but they also retain a repository for all the combinations they use to lock data up.
This is the Trojan horse the NSA means to use to gain access to your private data even when it is encrypted.
But that may soon change.
If the executive agencies have their way, the NSA will have a record of every lock combination in use by every company—a skeleton key, if you will, to gain access to your digital home, papers, effects, and aspects of your person without warrant or probable cause—effectively mandating that companies hand over skeleton keys to the locks that they provide to their users, at any time: what they call “exceptional access.” Read the rest of this entry »
NSA Deleted Surveillance Data it Pledged to Preserve
Posted: January 21, 2018 Filed under: Censorship, Crime & Corruption, Law & Justice, Politics | Tags: NSA, Presidential Surveillance Program 1 CommentThe agency tells a federal judge that it is investigating and ‘sincerely regrets its failure.’
The National Security Agency destroyed surveillance data it pledged to preserve in connection with pending lawsuits and apparently never took some of the steps it told a federal court it had taken to make sure the information wasn’t destroyed, according to recent court filings.
Word of the NSA’s foul-up is emerging just as Congress has extended for six years the legal authority the agency uses for much of its surveillance work conducted through U.S. internet providers and tech firms. President Donald Trump signed that measure into law Friday.
Since 2007, the NSA has been under court orders to preserve data about certain of its surveillance efforts that came under legal attack following disclosures that President George W. Bush ordered warrantless wiretapping of international communications after the 2001 terrorist attacks on the U.S. In addition, the agency has made a series of representations in court over the years about how it is complying with its duties.
However, the NSA told U.S. District Court Judge Jeffrey White in a filing on Thursday night and another little-noticed submission last year that the agency did not preserve the content of internet communications intercepted between 2001 and 2007 under the program Bush ordered. To make matters worse, backup tapes that might have mitigated the failure were erased in 2009, 2011 and 2016, the NSA said.
“The NSA sincerely regrets its failure to prevent the deletion of this data,” NSA’s deputy director of capabilities, identified publicly as “Elizabeth B.,” wrote in a declaration filed in October. “NSA senior management is fully aware of this failure, and the Agency is committed to taking swift action to respond to the loss of this data.”
In the update Thursday, another NSA official said the data were deleted during a broad, housecleaning effort aimed at making space for incoming information. Read the rest of this entry »
[VIDEO] Full Measure with Sharyl Attkisson: Surveillance State, July 2, 2017
Posted: July 9, 2017 Filed under: Censorship, Crime & Corruption, Global, Mediasphere, Science & Technology, Terrorism, U.S. News, War Room | Tags: Full Measure with Sharyl Attkisson, news, NSA, Surveillance, video Leave a comment
[VIDEO] New Evidence Obama’s NSA Conducted Illegal Searches; Fallout From NSA Revelations; Hemingway, Krauthammer
Posted: May 24, 2017 Filed under: Crime & Corruption, History, Law & Justice, Mediasphere, Politics, U.S. News, White House | Tags: Charles Krauthammer, Illegal Searches, M.Z. Hemingway, media, news, NSA, Obama, video Leave a comment
Powerful NSA Hacking Tools Have Been Revealed Online: ‘Keys to the Kingdom’
Posted: August 16, 2016 Filed under: Breaking News, Crime & Corruption, Science & Technology, Self Defense, War Room | Tags: Apple Inc, Asunción, Berkeley, California, Cloud computing, Hack, Hacker, Internet, Internet service provider, NSA, The Washington Post, University of California 1 CommentStrings of code were released to the Internet by a group calling themselves ‘the Shadow Brokers’. They claim the code is a tool that can be used to hack into any computer.
The cache mysteriously surfaced over the weekend and appears to be legitimate.
Ellen Nakashima reports: Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff. Much of this code should never leave the NSA.”
— Nicholas Weaver, a computer security researcher at the University of California at Berkeley
A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.
The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).
[Read the full story here, at The Washington Post]
“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Said a second former TAO hacker who saw the file: “From what I saw, there was no doubt in my mind that it was legitimate.”

“Without a doubt, they’re the keys to the kingdom. The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Strings of code were released to the Internet by a group calling themselves “the Shadow Brokers”. They claim the code is a tool that can be used to hack into any computer.
The file contained 300 megabytes of information, including several “exploits,” or tools for taking control of firewalls in order to control a network, and a number of implants that might, for instance, exfiltrate or modify information.
The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said Blake Darche, another former TAO operator and now head of security research at Area 1 Security.
The software apparently dates back to 2013 and appears to have been taken then, experts said, citing file creation dates, among other things.
“The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox.”
“What’s clear is that these are highly sophisticated and authentic hacking tools,” said Oren Falkowitz, chief executive of Area 1 Security and another former TAO employee.
Several of the exploits were pieces of computer code that took advantage of “zero-day” or previously unknown flaws or vulnerabilities in firewalls, which appear to be unfixed to this day, said one of the former hackers.
The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.
“The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.”
The NSA did not respond to requests for comment.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview. “Much of this code should never leave the NSA.”
The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox. Read the rest of this entry »
Andrew C. McCarthy: What Americans Need to Know About the Encryption Debate
Posted: December 1, 2015 Filed under: France, Law & Justice, Politics, Terrorism, Think Tank | Tags: Al-Nusra Front, Andrew C. McCarthy, Apple Inc, Data Collection, Hebron, Israel, Israel Defense Forces, National security, NSA, Palestinian people, Paris terrorist attacks, Pentagon, Surveillance, West Bank 1 CommentIn the surveillance area, I believe the public is mostly wrong.
Andrew C. McCarthy writes: Should private companies that provide users with encryption technology be required to assist law-enforcement and intelligence services to defeat that technology? This question is a more pressing one in the wake of November’s Paris terrorist attacks. But it is a very tough question that has vexed both the government and providers of communications services for years.
“The problem is that encryption technology has gotten very tough to crack and very widely available. Consequently, if terrorists or other high-level criminals are using it to carry out schemes that endanger the public, government agents cannot penetrate the communications in real time.”
Part of what makes it so difficult is the new facts of life. As I noted during the debate over the NSA’s bulk-collection of telephone metadata, we are operating in a political environment that is night-and-day different from the aftermath of 9/11. Back then, a frightened public was demanding that the government do a better job of collecting intelligence and thwarting terrorist plots. Of course that sentiment was driven by the mass-murder of nearly 3,000 Americans, coupled with the destruction of the World Trade Center and a strike against the Pentagon. But it also owed in no small measure to the fact that government had done such an incompetent job gathering and “connecting the dots” prior to the attacks. There was a strong public sense that intelligence agencies needed an injection of muscle.
“That they have a legal basis to conduct surveillance is beside the point; all the probable cause in the world won’t help an agent who lacks the know-how to access what he’s been authorized to search.”
Today, the public’s sense tends in the other direction. There have been spectacular abuses of government power (e.g., IRS scandal), and intrusive security precautions infused by political correctness (e.g., airport searches). Americans understandably suspect that government cannot be trusted with enhanced authorities and that many of its tactics are more about the appearance of security than real security.
[Read the full story here, at PJ Media]
It is, moreover, no longer sufficient for the national-security right to posit that security measures pass legal muster. The public wants proof that these measures actually and meaningfully improve our security, regardless of whether they are justifiable as a matter of law.
This makes it a very uphill environment in which to suggest, as FBI Director Jim Comey has recently done, that communications providers should provide the government with keys to unlocking their encryption technology – encryption-key repositories or what is often called “backdoor” access.
The problem is that encryption technology has gotten very tough to crack and very widely available. Consequently, if terrorists or other high-level criminals are using it to carry out schemes that endanger the public, government agents cannot penetrate the communications in real time. That they have a legal basis to conduct surveillance is beside the point; all the probable cause in the world won’t help an agent who lacks the know-how to access what he’s been authorized to search. Read the rest of this entry »
Oh Yes We Can: NSA-Proof Wallpaper
Posted: October 23, 2015 Filed under: Science & Technology, Self Defense | Tags: Conductive Composite, Deutsche Grammophon, EMP, Faraday cages, Gardens of Vatican City, Miserere (Allegri), NSA, Rome, Sensitive Compartmented Information Facilities 1 CommentPatrick Tucker reports: Your next tinfoil hat will won’t be made of tinfoil. A small company called Conductive Composites out of Utah has developed a flexible material — thin and tough enough for wallpaper or woven fabric — that can keep electronic emissions in and electromagnetic pulses out.
“The material also holds promise for a scalable defense against an electromagnetic pulse weapon. EMPs are a rising concern for the national security community, but not a new one. Soviet research into electromagnetic pulse weapons goes back to 1949, and active experimentation back to the 1970s.”
There are a few ways to snoop on electronic communications. You can hack into a network or you can sniff out radio emissions. If you want to defend against the latter, you can enclose your electronic device or devices within a structure of electrically conductive, (probably metallic) material. The result is something like a force field. The conductive material distributes the electromagnetic energy away from the target in every direction — think of the *splat* you get when you hurl a tomato at a wall. These enclosures are sometimes called Faraday cages after the 18th-century British scientist who discovered electrolysis.
“EMPs entered the public eye via the 2005 James Bond movie GoldenEye, in which an EMP caused massive blackouts and widespread fried electronics.”
Today, Faraday cages are all over the place. In 2013, as the College of Cardinals convened to elect a new Pope, the Vatican’s Sistine Chapel was converted into a Faraday cage so that news of the election couldn’t leak out, no matter how hard the paparazzi tried, and how eager the cardinals were to tweet the proceedings. The military also uses Faraday cages for secure communications: Sensitive Compartmented Information Facilities or SCIFs are Faraday cages. You’ll need to be in one to access the Joint Worldwide Intelligence Communication System, or JWICS, the Defense Department’s top-secret internet.
Conductive Composites has created a method to layer nickel on carbon to form a material that’s light and moldable like plastic yet can disperse energy like a traditional metal cage. Read the rest of this entry »
Andrew C. McCarthy: Why National-Security Republicans Lost the Patriot Act Debate
Posted: May 23, 2015 Filed under: Breaking News, Law & Justice, Politics, Think Tank | Tags: Andrew C. McCarthy, Data Collection, GOP, media, National Review, National security, news, NRO, NSA, Patriot Act, Twitter Leave a commentRead it here, at National Review Online
[VIDEO] Senator Rand Paul Begins His Remarks on Patriot Act and NSA Surveillance
Posted: May 21, 2015 Filed under: Law & Justice, Mediasphere, Politics, U.S. News | Tags: Bulk Data Collection, CSPAN, Data Collection, Fourth Amendment, NSA, NSA Surveillance, Patriot Act, Privacy Rights, Rand Paul, Senate Leave a comment
The FBI and NSA Hate Apple’s Plan to Keep Your iPhone Data Secret
Posted: September 27, 2014 Filed under: Law & Justice, Mediasphere, U.S. News | Tags: Android, FBI, iPhone, NSA, Privacy Leave a commentPossible Snowden Plea Deal Developing
Posted: June 10, 2014 Filed under: Mediasphere | Tags: Bill Gertz, Edward Snowden, Hong Kong, Joint Worldwide Intelligence Communications System, National Security Agency, NSA, Plato Cacheris, Snowden 1 CommentFor Washington Free Beacon, Bill Gertz reports: Federal prosecutors recently held discussions with representatives of renegade National Security Agency (NSA) contractor Edward Snowden on a possible deal involving his return to the United States to face charges of stealing more than a million secret NSA documents, according to U.S. officials.
“It remains our position that Mr. Snowden should return to the United States and face the charges filed against him…”
Snowden is currently in Moscow under Russian government protection after fleeing Hawaii, where he worked in NSA’s Kunia facility, for Hong Kong in May 2013. U.S. officials have charged him with stealing an estimated 1.7 million documents from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS) and providing some materials to news outlets.
“…If he does, he will be accorded full due process and protections.”
— D.O.J. Spokesman Marc Raimondi
Discussions on Snowden’s return were held in the past several weeks between prosecutors in the Justice Department’s National Security Division and Plato Cacheris, a long-time Washington defense lawyer who in the past represented several U.S. spies, including some who reached plea bargains rather than go to trial. Read the rest of this entry »
NSA Public Service Reminder
Posted: June 3, 2014 Filed under: Humor, Mediasphere, U.S. News | Tags: NSA, Selfie, Tumblr 2 CommentsEx-CIA Agent Bitch-Slaps Snowden’s Spy Fantasies: ‘Computer Technician with a Walter Mitty Complex’…’Lacking Common Sense’
Posted: May 31, 2014 Filed under: Crime & Corruption, Diplomacy, Russia | Tags: Central Intelligence Agency, Edward Snowden, Geneva, National Security Agency, NBC, NSA, Robert Baer, United States 5 CommentsFormer CIA Agent: Snowden probably in contact with Russia Since 2007
For The Daily Caller, Giuseppe Macri writes: Distinguished former CIA officer and author Robert Baer said on the BBC’s “Today” radio program Thursday morning that ex-NSA contractor Edward Snowden has been in contact with the Russian government for the last seven years.
“He was a systems administrator. When he worked for the CIA in Geneva he was a communicator. That means he sits in an office and relays messages. That’s not a spy.”
“My suspicion is that the Russians were probably in touch with him in Geneva,” Baer said, speculating they first made contact in 2007 while Snowden was stationed in Switzerland with the CIA. “I can’t prove it. But this was such a brilliant operation. And his landing in Moscow just makes old Cold War warriors like me very suspicious.”
“Secondly, the NSA doesn’t have spies overseas. It’s got technicians who sit in American embassies. They are not even analysts.”
Baer also dismissed Snowden’s assertion on his first U.S. television network interview with NBC’s Brian Williams Wednesday that he “was trained as a spy,” and described him as little more than a computer technician with a “Walter Mitty complex” lacking “common sense.” Read the rest of this entry »
E-mail that Snowden Sent to NSA Lawyers
Posted: May 30, 2014 Filed under: Mediasphere, Politics, U.S. News | Tags: Edward Snowden, General counsel, National Security Agency, NBC, NBC News, NSA, Snowden, Washington Post 1 CommentU.S. releases e-mail that Snowden sent to NSA lawyers http://t.co/7QgMa7lKcA Read the email: http://t.co/1fdIGVcSue pic.twitter.com/FuyXqKQGed
— Washington Post (@washingtonpost) May 29, 2014

Number of Emails From Snowden to the NSA Raising Concerns: One
Posted: May 30, 2014 Filed under: Global, Russia, War Room | Tags: Brian Williams, Edward Snowden, Jay Carney, National Security Agency, NBC, NBC News, NSA, Snowden, Susan Rice 4 CommentsOn Thursday, NSA released the email they said Snowden appeared to be referring to, which the agency says is the only communication from Snowden it could find raising any concerns. It was dated April 8, 2013, three months after Snowden first reached out to journalists anonymously.
WASHINGTON (AP) — Edward Snowden says he repeatedly raised constitutional concerns about National Security Agency surveillance internally, but an NSA search turned up a single email in which Snowden gently asks for “clarification” on a technical legal question about training materials, agency officials said Thursday.
Snowden, a former NSA systems administrator whose leaks have exposed some of the agency’s most sensitive spying operations, called himself a patriot in an interview this week with NBC News‘ Brian Williams. He said he felt he had no choice but to expose what he considered illegal NSA surveillance by leaking secret details to journalists.
NSA officials have said he gained access to some 1.7 million classified documents, though it’s not clear how many he removed from the Hawaii facility where he worked as a contractor.
Asked by Williams whether he first raised his qualms with his bosses, he said, “I reported that there were real problems with the way the NSA was interpreting its legal authorities.” Read the rest of this entry »
[VIDEO] Glenn Greenwald on Meet The Press: Traitor Label ‘Badge of Honor’
Posted: May 18, 2014 Filed under: Censorship, Global, Law & Justice, Mediasphere | Tags: Daniel Ellsberg, David Gregory, Edward Snowden, Glenn Greenwald, Greenwald, HuffPost Live, Meet the Press, National Security Agency, NSA, Pentagon Papers 1 Comment“One of the most encouraging aspects of the story has been that there has been a complete breakdown in the traditional, standard divisions between left and right or conservative and liberal, Republican and Democrat…”
Glenn Greenwald appeared on Meet the Press, things ended poorly for David Gregory. On Sunday morning, Greenwald appeared on the show for the first time since the contretemps, though NBC put two layers between Greenwald and Gregory, having justice correspondent Pete Williams conduct the interview and fielding the questions from social media.
“…There has been this extremely inspiring bipartisan coalition that has emerged that has demanded that there be constraints imposed on the NSA.”
Greenwald told HuffPost Live he was disappointed Gregory wouldn’t be conducting the interview, as he was curious how the host’s approach may have changed since last summer. Alas.
[Glenn Greenwald‘s book: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State is available from Amazon.com]
The most pointed question asked how Greenweld reconciled his comparison of NSA leaker Edward Snowden to Pentagon Papers leaker Daniel Ellsberg, given that Ellsberg stayed to face trial while Snowden fled the U.S. and eventually defected to Russia. He quoted Ellsberg’s op-ed arguing that the justice system had become considerably harsher toward whistleblowers. “If Edward Snowden were to go on trial, he would be rendered incommunicado, he would not be released on bail, he couldn’t argue his case to the public,” Greenwald said. Read the rest of this entry »
‘We Should’ve Told You We Track Your Calls’
Posted: February 18, 2014 Filed under: Law & Justice, War Room | Tags: Daily Beast, Edward Snowden, James R. Clapper, National Security Agency, NSA, Ron Wyden 3 Comments
Photo by Alex Wong/Getty
Now the Director of National Intelligence admits it would have been better if Washington had acknowledged the surveillance in the first place…
“I probably shouldn’t say this, but I will. Had we been transparent about this from the outset, we wouldn’t have had the problem we had.”
The American public and most members of Congress were kept in the dark for years about a secret U.S. program to collect and store such records of American citizens on a massive scale.The government’s legal interpretation of section 215 of the Patriot Act that granted the authority for this dragnet collection was itself a state secret.
NSA Spying Undermines Separation of Powers
Posted: February 11, 2014 Filed under: Law & Justice, Politics, U.S. News | Tags: Congress, Executive (government), Facebook, James Madison, National Security Agency, NSA, United States, United States Congress 5 CommentsThe program makes it easy for the president to spy on and blackmail his enemies
Glenn Harlan Reynolds writes: Most of the worry about the National Security Agency’s bulk interception of telephone calls, e-mail and the like has centered around threats to privacy. And, in fact, the evidence suggests that if you’ve got a particularly steamy phone- or Skype-sex session going on, it just might wind up being shared by voyeuristic NSA analysts.
But most Americans figure, probably rightly, that the NSA isn’t likely to be interested in their stuff. (Anyone who hacks my e-mail is automatically punished, by having to read it.) There is, however, a class of people who can’t take that disinterest for granted: members of Congress and the judiciary. What they have to say is likely to be pretty interesting to anyone with a political ax to grind. And the ability of the executive branch to snoop on the phone calls of people in the other branches isn’t just a threat to privacy, but a threat to the separation of powers and the Constitution.
Metadata Stagecraft
Posted: January 17, 2014 Filed under: Breaking News, White House | Tags: Breaking news, media, NSA, White House 1 CommentI Spent Two Hours Talking With NSA Senior Officials. Here’s What Has Them Hoppin’ Mad
Posted: January 14, 2014 Filed under: Politics, Think Tank, U.S. News, War Room | Tags: A Few Good Men, Central Intelligence Agency, Clipper Chip, Edward Snowden, Jack Nicholson, National Cryptologic Museum, National Security Agency, NSA, Snowden 2 Comments
They Really Hate Snowden. Really. Hate Hate Hate Him. NSA headquarters. Image: Wikimedia Commons
Steven Levy writes: My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry. During the 1990s, I had been working on a book, Crypto, which dove deep into cryptography policy, and it took me years — years! — to get an interview with an employee crucial to my narrative. I couldn’t quote him, but he provided invaluable background on the Clipper Chip, an ill-fated NSA encryption runaround that purported to strike a balance between protecting personal privacy and maintaining national security.

“…my existence, while grotesque and incomprehensible to you, saves lives...I have neither the time nor the inclination to explain myself to a man who rises and sleeps under the blanket of the very freedom that I provide…”
Oh, and I was not permitted to interview my Crypto source at the agency’s headquarters in Fort Meade, Maryland. I was crushed; I had grown obsessed with the vaunted triple fence surrounding the restricted area and had climactic hopes that I’d get inside. Instead, the meet occurred just outside the headquarters’ heavily guarded perimeter, at the National Cryptologic Museum. (I did buy a cool NSA umbrella in the gift shop.)
This time around, the NSA’s initial comeback was discouraging. The public relations person suggested that perhaps some unidentified officials could provide written responses to a few questions I submitted. A bit later, an agency rep indicated there was the possibility of a phone conversation. But then, rather suddenly, I was asked if I would be interested in an actual visit to meet with a few key officials. And could I do it… later that week?
How the NSA Almost Killed the Internet
Posted: January 7, 2014 Filed under: Mediasphere, Politics, Reading Room | Tags: Edward Snowden, Facebook, Glenn Greenwald, Google, Microsoft, National Security Agency, NSA, Yahoo 3 CommentsGoogle, Facebook, Microsoft, and the other tech titans have had to fight for their lives against their own government. An exclusive look inside their year from hell—and why the Internet will never be the same.
Christoph Niemann writes: On June 6, 2013, Washington Post reporters called the communications departments of Apple, Facebook, Google, Yahoo, and other Internet companies. The day before, a report in the British newspaper The Guardian had shocked Americans with evidence that the telecommunications giant Verizon had voluntarily handed a database of every call made on its network to the National Security Agency. The piece was by reporter Glenn Greenwald, and the information came from Edward Snowden, a 29-year-old IT consultant who had left the US with hundreds of thousands of documents detailing the NSA’s secret procedures.
Greenwald was the first but not the only journalist that Snowden reached out to. The Post’s Barton Gellman had also connected with him. Now, collaborating with documentary filmmaker and Snowden confidante Laura Poitras, he was going to extend the story to Silicon Valley. Gellman wanted to be the first to expose a top-secret NSA program called Prism. Snowden’s files indicated that some of the biggest companies on the web had granted the NSA and FBI direct access to their servers, giving the agencies the ability to grab a person’s audio, video, photos, emails, and documents. The government urged Gellman not to identify the firms involved, but Gellman thought it was important. “Naming those companies is what would make it real to Americans,” he says. Now a team of Post reporters was reaching out to those companies for comment.
N.Y. Judge Rules NSA Phone Surveillance Legal
Posted: December 27, 2013 Filed under: Law & Justice, U.S. News | Tags: National Security Agency, NSA, September 11 attacks, United States, United States Constitution, United States district court, United States federal judge, William H. Pauley III 2 Comments
The judge says the government learned from its mistakes on 9/11. | AP Photo
NEW YORK — A federal judge on Friday found that the National Security Agency’s bulk collection of millions of Americans’ telephone records is legal and a valuable part of the nation’s arsenal to counter the threat of terrorism and “only works because it collects everything.”
U.S. District Judge William Pauley said in a written opinion that the program “represents the government’s counter-punch” to eliminate al-Qaida’s terror network by connecting fragmented and fleeting communications.
“This blunt tool only works because it collects everything,” Pauley said. “The collection is broad, but the scope of counterterrorism investigations is unprecedented.”
He said the mass collection of phone data “significantly increases the NSA’s capability to detect the faintest patterns left behind by individuals affiliated with foreign terrorist organizations. Armed with all the metadata, NSA can draw connections it might otherwise never be able to find.”
He added that such a program, if unchecked, “imperils the civil liberties of every citizen” and he noted the lively debate about the subject across the nation, in Congress and at the White House.
“The question for this court is whether the government’s bulk telephony metadata program is lawful. This court finds it is. But the question of whether that program should be conducted is for the other two coordinate branches of government to decide,” he said.
Gallup: More Americans Than Ever Name “Big Government” as the Biggest Threat to U.S.
Posted: December 18, 2013 Filed under: Breaking News, Mediasphere, U.S. News | Tags: Big Government, Big Labor, Democratic, Gallup, National Security Agency, NSA, Patient Protection and Affordable Care Act 4 CommentsThat escalated quickly.
Seventy-two percent of Americans say big government is a greater threat to the U.S. in the future than is big business or big labor, a record high in the nearly 50-year history of this question. The prior high for big government was 65% in 1999 and 2000. Big government has always topped big business and big labor, including in the initial asking in 1965, but just 35% named it at that time.
It wasn’t so very long ago — as in, 2009, hem hem — when Americans’ primary concern for big government as a threat to the country’s future rested at around 55 percent, before hitting 64 percent near the end of 2011 and finally 72 percent today. Whatever do we suppose might have prompted such a thing, I wonder? Gigantic corporate bailouts, Scandalabra, NSA spying, ObamaCare… I don’t even know where to begin.
By cracking cellphone code, NSA has ability to decode private conversations
Posted: December 14, 2013 Filed under: Global, Law & Justice, Mediasphere, Science & Technology, U.S. News | Tags: Angela Merkel, Ashkan Soltani, EdwardSnowden, Encryption, Mobile phone, National Security Agency, NSA, United States 1 Comment
Francisco Seco/AP – In this October 2013 file photo, a man looks at his cellphone as he walks on the street in downtown Madrid. The NSA’s ability to crack cellphone encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.
Craig Timberg and Ashkan Soltani report: The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day.
While the military and law enforcement agencies long have been able to hack into individual cellphones, the NSA’s capability appears to be far more sweeping because of the agency’s global signals collection operation. The agency’s ability to crack encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.
U.S. law prohibits the NSA from collecting the content of conversations between Americans without a court order. But experts say that if the NSA has developed the capacity to easily decode encrypted cellphone conversations, then other nations likely can do the same through their own intelligence services, potentially to Americans’ calls, as well.
Surveillance Court Blasts National Security Agency in Newly Released Documents
Posted: November 20, 2013 Filed under: Law & Justice, War Room | Tags: Director of National Intelligence, National Security Agency, NSA, Pen Register, Trap and trace device 2 Comments
General Keith Alexander (L), director of the National Security Agency (NSA) testifies at a House Intelligence Committee hearing on Capitol Hill in Washington October 29, 2013. REUTERS/Jason Reed
Brendan Bordelon reports: A late-night document dump by the Director of National Intelligence revealed yet another harsh rebuke of the National Security Agency (NSA) by a federal judge, who claimed the spy agency “continuously” and “systematically” overcollected data on American citizens.
The release of thousands of previously classified — and heavily redacted — NSA slides and Foreign Intelligence Surveillance Court (FISC) opinions late Monday night includes the original, undated court order authorizing the sweeping surveillance of Americans’ email and internet data, known as the Pen Register and Trap and Trace provision.
But of particular interest is another FISC order — again undated — tasked with renewing that provision. The court denied a large part of that reauthorization request, charging that the NSA repeatedly and routinely collected more data on American citizens than the law empowered them to do.
Whose Side Are You On, Germany?
Posted: November 7, 2013 Filed under: Diplomacy, Global, U.S. News | Tags: Angela Merkel, Berlin, Edward Snowden, German, Germany, Hans-Christian Ströbele, National Security Agency, NSA, Snowden 4 CommentsBERLIN—The cover of this week’s Die Zeit, Germany’s leading newspaper, says it all: “Goodbye, Friends.”
Pacifism is part of Germany’s DNA. But so is confusion about its true friends and adversaries—like Snowden and the NSA.
James Kirchick writes: Illustrated by a broken heart half-painted with the German flag and the other with the American one, the image speaks to the widespread feelings of betrayal many Germans have expressed towards the United States in the wake of revelations made by former National Security Agency contractor Edward Snowden about American spying operations abroad.
Never mind that the claim causing so much outrage—that the United States was sweeping up the personal data of tens of millions of European citizens—proved false. In reality, the records analyzed by the NSA were supplied to them by European intelligence agencies, and were collected in war zones and other locales abroad, not in Europe.
Matt Gets his Freak On
Posted: October 25, 2013 Filed under: Mediasphere | Tags: design, Drudge, media, news, NSA, UN Leave a commentFamous for having the most successful, least illustrated, most minimally-designed news site in the universe, Matt Drudge occasionally indulges his talent for vivid image making.