• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Israeli TV Says US Has Stopped Sharing Intelligence About Iranian Nuclear Program With Israel

    Report: Obama Administration Has Stopped Sharing Intelligence With Israel on Iran’s Nuclear Program

    The Obama administration has “unilaterally” and “completely” stopped sharing intelligence with Israel over Iran’s nuclear development program due to its anger over Israeli Prime Minister Benjamin Netanyahu’s Tuesday address to Congress, Israel’s Channel 10 reported, a charge the White House flatly denied.

    “The U.S. unilaterally stopped all of its joint activity with Israel regarding the nuclearization of Iran,” the news show reported Monday night. This freeze in intelligence sharing was attributed to the “American anger” at Netanyahu.

    White House national security spokeswoman Bernadette Meehan told TheBlaze in an email, “the report is completely false.”

    In this Oct. 26, 2010 file photo, a worker rides a bicycle in front of the reactor building of the Bushehr nuclear power plant, just outside the southern city of Bushehr, Iran. (AP Photo/Mehr News Agency, Majid Asgaripour, File)

    On Sunday, one day before the Channel 10 report, Secretary of State John Kerry touted the close security relationship with Israel in an interview with ABC’s “This Week.”

    “We have a closer relationship with Israel right now, in terms of security, than at anytime in history,” Kerry said.

    To make up for the gap, Israel is cooperating with other countries, not the U.S., to collect intelligence on Iran’s nuclear program. Past joint efforts by American and Israeli intelligence have helped the International Atomic Energy Agency monitor Iran’s nuclear progress, which is suspected of ultimately being aimed at the development of weapons.

    Those IAEA reports raising suspicions about the objectives of Iran’s nuclear program have been the cornerstone of the case to convince the international community to impose sanctions on the Islamic Republic.

    Netanyahu was in Washington to warn lawmakers of the dangers of the emerging deal currently being negotiated between Iran and six world powers, including the U.S. Media reports have said the framework being worked out would monitor Iranian nuclear progress for only 10 years.

    An unnamed senior aide to Netanyahu told reporters traveling on Netanyahu’s plane Sunday that the Obama administration was not fully sharing details with Congress about the negotiations.

    The State Department on Monday warned Netanyahu against disclosing those details to Congress.

    “We’ve continuously provided detailed classified briefings to Israeli officials to keep them updated and to provide context for how we are approaching getting to a good deal, because we’ve been very clear we will not accept a bad deal,” State Department spokeswoman Marie Harf said. “So any release of any kind of information like that would, of course, betray that trust.”

    Channel 10 also reported that in addition to refusing to meet the Israeli leader, Obama had no plans to phone him while he’s in town either.

    The Jerusalem Post reported that the prime minister’s office would not comment on the Channel 10 report.

    Sharona Schwartz
    The Blaze
    March 3, 2015

    Find this story at 3 March 2015

    Copyright http://www.matthewaid.com/

    Israel’s N.S.A. Scandal

    WASHINGTON — IN Moscow this summer, while reporting a story for Wired magazine, I had the rare opportunity to hang out for three days with Edward J. Snowden. It gave me a chance to get a deeper understanding of who he is and why, as a National Security Agency contractor, he took the momentous step of leaking hundreds of thousands of classified documents.

    Among his most shocking discoveries, he told me, was the fact that the N.S.A. was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.

    Typically, when such sensitive information is transferred to another country, it would first be “minimized,” meaning that names and other personally identifiable information would be removed. But when sharing with Israel, the N.S.A. evidently did not ensure that the data was modified in this way.

    Mr. Snowden stressed that the transfer of intercepts to Israel contained the communications — email as well as phone calls — of countless Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the communications. “I think that’s amazing,” he told me. “It’s one of the biggest abuses we’ve seen.”

    It appears that Mr. Snowden’s fears were warranted. Last week, 43 veterans of Unit 8200 — many still serving in the reserves — accused the organization of startling abuses. In a letter to their commanders, to Prime Minister Benjamin Netanyahu and to the head of the Israeli army, they charged that Israel used information collected against innocent Palestinians for “political persecution.” In testimonies and interviews given to the media, they specified that data were gathered on Palestinians’ sexual orientations, infidelities, money problems, family medical conditions and other private matters that could be used to coerce Palestinians into becoming collaborators or create divisions in their society.

    The veterans of Unit 8200 declared that they had a “moral duty” to no longer “take part in the state’s actions against Palestinians.” An Israeli military spokesman disputed the letter’s overall drift but said the charges would be examined.

    It should trouble the American public that some or much of the information in question — intended not for national security purposes but simply to pursue political agendas — may have come directly from the N.S.A.’s domestic dragnet. According to documents leaked by Mr. Snowden and reported by the British newspaper The Guardian, the N.S.A. has been sending intelligence to Israel since at least March 2009.

    The memorandum of agreement between the N.S.A. and its Israeli counterpart covers virtually all forms of communication, including but not limited to “unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.” The memo also indicates that the N.S.A. does not filter out American communications before delivery to Israel; indeed, the agency “routinely sends” unminimized data.

    Although the memo emphasizes that Israel should make use of the intercepts in accordance with United States law, it also notes that the agreement is legally unenforceable. “This agreement,” it reads, “is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law.”

    Continue reading the main story
    RECENT COMMENTS

    pak September 17, 2014
    What type of information could be used against a palestinian to force him/her to collaborate? Homosexuality? Adultery? Premarital sex?…
    kagni September 17, 2014
    Very romantic to ignore that ugly breeds ugly, especially from a journalist of Mr Bamford’s age and experience. If anything, only…
    Guy September 17, 2014
    Clearly, there are thousands of ways to abuse private information collected on people. This is one of many, and this is why folks like…
    SEE ALL COMMENTS
    It should also trouble Americans that the N.S.A. could head down a similar path in this country. Indeed, there is some indication, from a top-secret 2012 document from Mr. Snowden’s leaked files that I saw last year, that it already is. The document, from Gen. Keith B. Alexander, then the director of the N.S.A., notes that the agency had been compiling records of visits to pornographic websites and proposes using that information to damage the reputations of people whom the agency considers “radicalizers” — not necessarily terrorists, but those attempting, through the use of incendiary speech, to radicalize others. (The Huffington Post has published a redacted version of the document.)

    In Moscow, Mr. Snowden told me that the document reminded him of the F.B.I.’s overreach during the days of J. Edgar Hoover, when the bureau abused its powers to monitor and harass political activists. “It’s much like how the F.B.I. tried to use Martin Luther King’s infidelity to talk him into killing himself,” he said. “We said those kinds of things were inappropriate back in the ’60s. Why are we doing that now? Why are we getting involved in this again?”

    It’s a question that American and Israeli citizens should be asking themselves.

    James Bamford is the author of three books on the National Security Agency, including “The Shadow Factory: The Ultra-Secret N.S.A. from 9/11 to the Eavesdropping on America.”

    By JAMES BAMFORDSEPT. 16, 2014

    Find this story at 16 September 2014

    © 2015 The New York Times Company

    Israel Eavesdropped on John Kerry in Mideast Talks

    New information indicates that Israeli intelligence eavesdropped on telephone conversations by US Secretary of State John Kerry. Sources told SPIEGEL the government then used the information obtained from the calls during negotiations in the Mideast conflict.

    SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel.

    During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.

    In the current Gaza conflict, the Israelis have massively criticized Kerry, with a few ministers indirectly calling on him to withdraw from peace talks. Both the US State Department and the Israeli authorities declined to comment.

    Only one week ago, Kerry flew to Israel to mediate between the conflict parties, but the Israelis brusquely rejected a draft proposal for a cease-fire. The plan reportedly didn’t include any language demanding that Hamas abandon its rocket arsenal and destroy its tunnel system. Last year, Kerry undertook intensive diplomatic efforts to seek a solution in the conflict between the Israelis and the Palestinians, but they ultimately failed. Since those talks, relations between Kerry and Israeli Prime Minister Benjamin Netanyahu have been tense.

    Still, there are no doubts about fundamental support for Israel on the part of the United States. On Friday, the US Congress voted to help fund Israel’s “Iron Dome” missile defense system to the tune of $225 million (around €168 million).

    Find this story at 3 August 2014

    © SPIEGEL ONLINE 2014

    (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel

    (U) Introduction
    (TS//N F) NSA maintains a far-reaching technical and analytic relationship with the
    Israeli SIGINT National Unit (ISNU) sharing information on access, intercept, targeting,
    language, analysis and reporting. This SIGINT relationship has increasingly been the
    catalyst for a broader intelligence relationship between the United States and Israel.
    Significant changes in the way NSA and ISNU have traditionally approached SIGINT
    have prompted an expansion to include other Israeli and U.s. intelligence organizations
    such as CIA, Mossad, and Special Operation Division (SOD).
    (U) Key Issues
    (TS//SI//N F) The single largest exchange between N SA and ISN U is on targets in the
    Middle East which constitute strategic threats to U.s. and Israeli interests. Building
    upon a robust analytic exchange, NSA and ISNU also have explored and executed
    unique opportunities to gain access to high priority targets. The mutually agreed upon
    geographic targets include the countries of North Africa, the Middle East, the Persian
    Gulf, South Asia, and the Islamic republics of the former Soviet Union. Within that set of
    countries, cooperation covers the exploitation of internal governmental, military, civil,
    and diplomatic communications; and external security/intelligence organizations.
    Regional Weapons of Mass Destruction Proliferation and “Stateless”/lnternational
    Terrorism comprise the exchanged transnational target set. A dedicated
    communications line between NSA and ISN U supports the exchange of raw material, as
    well as daily analytic and technical correspondence. Both N SA and ISN U have liaison
    officers, who conduct foreign relations functions, stationed at their respective
    embassies.
    (TS//REL TO USA, ISR) What NSA Provides to ISNU
    (TS//SI//REL TO USA, ISR) The Israeli side enjoys the benefits of expanded geographic
    access to world-class NSA cryptanalytic and SIGINT engineering expertise, and also
    gains controlled access to advanced U.s. technology and equipment via
    accommodation buys and foreign military sales.
    (TS//REL TO USA, ISR) What ISNU Provides to NSA
    (TS//SI//RE L TO USA, ISR) Benefits to the U.s. include expanded geographic access to
    high priority SIGINT targets, access to world-class Israeli cryptanalytic and SIGINT
    engineering expertise, and access to a large pool of highly qualified analysts.
    Derived From: NSA/CSSM 1-52
    Dated: 20070108
    Declassify On: 20371101
    TOP SECRET//SI//NOFORN
    TOP SECRET//SII/NOFORN
    (U) Success Stories _
    (TS//SI//REL TO USA, ISR) A key priority for ISN U is the Iranian nuclear development
    program, followed by Syrian nuclear efforts, Lebanese Hizballah plans and intentions,
    Palestinian terrorism, and Global Jihad. Several recent and successful joint operations
    between N SA and IS N U have broadened both organizations’ ability to target and exploit
    Iranian nuclear efforts. In addition, a robust and dynamic cryptanalytic relationship has
    enabled breakthroughs on high priority Iranian targets.
    (TS//REL TO USA, ISR) NSA and ISNU continue to initiate joint targeting of Syrian and
    Iranian leadership and nuclear development programs with CIA, ISNU, SOD and
    Massad. This exchange has been particularly important as unrest in Syria continues,
    and both sides work together to identify threats to regional stability. N SA’s cyber
    partnerships expanded beyond IS N U to include Israeli Defense Intelligence’s soD and
    Massad, resulting in unprecedented access and collection breakthroughs that all sides
    acknowledge would not have been possible to achieve without the others.
    (TS//SI//N F) In July 2012, the Office of the Director of N ationallntelligence (ODN I)
    provided guidance for expanded sharing with the GOI (Government of Israel) on Egypt.
    This approval has allowed N SA to task for ISN U on select strategic issues, specifically
    terrorist elements in the Sinai.
    (S//N F) Beyond the traditional SIGI NT relationship, N SA and ISN U signed a M 0 U in
    September 2011 providing for Information Assurance/Computer Network Defense
    collaboration. N SA’s Information Assurance Deputy Director anended an lAIC N D
    conference in Tel Aviv in January 2012 during which N SA and ISN U established
    objectives for the relationship. NSA intends to focus the collaboration on cyber threats
    from Iran, H izballah and other regional actors and may provide limited, focused support
    on specific Russian and Chinese cyber threats. Conferences to further develop this
    partnership were held in May 2012 and December 2012.
    (TS//SI//REL TO USA, ISR) NSA and ISNU led their communities in the establishment
    of U.s. – Israeli Intelligence Community VTC connectivity that allows both sides to
    broaden and accelerate the pace of collaboration against targets’ use of advanced
    telecommunications. Target sets include, but are not limited to Iran Nuclear, Syrian
    Foreign Fighter movements, Lebanese Hizballah and Iranian Revolutionary Guard
    Corps activities. Dialogue is ongoing, with each potential new intelligence or technology
    initiative considered for approval individually.
    (U) Problems/Challenges
    (TS//N F) The three most common concerns raised by ISN U regarding the partnership
    with NSA is NSA’s reluctance to share on technology that is not directly related to a
    specific target, ISN U’s perceived reduction in the amount and degree of cooperation in
    certain areas, and the length of time NSA takes to decide on ISN U proposals. Efforts in
    these three areas have been addressed with the partner and NSA continues to work to
    TOP SECRET//SI//NOFORN 2
    TOP SECRET//SII/NOFORN
    increase cooperation with IS N U, where appropriate and mindful of U.s. policy and
    equity concerns.
    (U//FOUO) Updated by:
    Country Desk Officer
    Fo n Affairs Directorate

    view the file at

    NSA shares raw intelligence including Americans’ data with Israel

    • Secret deal places no legal limits on use of data by Israelis
    • Only official US government communications protected
    • Agency insists it complies with rules governing privacy
    • Read the NSA and Israel’s ‘memorandum of understanding’

    The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

    Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

    The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.

    The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.

    The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.

    But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”

    According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.

    Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.

    “This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.

    In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.

    “Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.

    The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.

    The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.

    Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.

    It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.

    The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.

    Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.

    The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.

    Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.

    Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.

    The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.

    While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.

    “Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”

    newtear3

    In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”

    Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”

    newtear1

    The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.

    It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.

    However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”

    newtear2

    The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.

    In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.

    “NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”

    Glenn Greenwald, Laura Poitras and Ewen MacAskill
    The Guardian, Wednesday 11 September 2013 15.40 BST

    Find this story at 11 September 2013

    Memorandum of understanding

    © 2015 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Verräterische Wetter-App auf dem PC des BND-Spions

    Im Spionageskandal beim BND kritisieren Geheimdienstexperten das Vorgehen der deutschen Behörden scharf. Zugleich wird der Fall immer mysteriöser. Die “Welt” gibt den Überblick über die Faktenlage.

    Was für ein Fall! Und bekannt wird er ausgerechnet zu diesem Zeitpunkt, wo der Untersuchungsausschuss zur Aufarbeitung der US-Datenspionage in Deutschland seine Arbeit aufnimmt: Der Generalbundesanwalt ermittelt gegen einen 31 Jahre alten Mitarbeiter des Bundesnachrichtendienstes (BND), der Informationen an die Amerikaner weitergegeben haben soll.

    Die Aufregung darüber ist groß. Führende Politiker der Koalition verlangen von den USA dringend Aufklärung. Kanzlerin Angela Merkel (CDU) wurde von dem neuen Spionagefall am Freitag genauso überrascht wie das restliche politische Berlin. Sie verbrachte den Samstag im Flugzeug nach China; offiziell kommentierte sie die Affäre dabei mit keinem Wort. Im Gespräch mit deutschen Wirtschaftsführern soll sich Merkel aber entsetzt über die neuen Vorwürfe gegen die Amerikaner gezeigt haben (Link: http://www.welt.de/129842322) .

    Bundesinnenminister Thomas de Maizière (CDU) nannte die Vorwürfe “sehr schwerwiegend”. Außenminister Frank-Walter Steinmeier (SPD) forderte, es dürfe nun nichts mehr unter den Teppich gekehrt werden. Und Bundespräsident Joachim Gauck warnte (Link: http://www.welt.de/129834596) gar vor einer Belastung der deutsch-amerikanischen Beziehungen.

    Es ist ein Fall, der in der Tat viele Fragen aufwirft. Und alles, was bislang darüber bekannt wurde, macht ihn nur noch mysteriöser. Die Darstellungen zeichnen nicht nur ein Bild dilettantischer deutscher und US-amerikanischer Nachrichtendienste, sondern sind in der Tat geeignet, das deutsch-amerikanische Verhältnis in einer durch die NSA-Spionage in Europa hoch aufgeladenen, besonders sensiblen Situation weiter zu destabilisieren. Wer könnte ein Interesse daran haben? Und was ist so merkwürdig an dem Fall?

    Wie kam es zu dem Spionagefall?

    Der BND-Mitarbeiter soll sich vor zwei Jahren per E-Mail an die US-Botschaft als Spion angeboten und seither für die USA spioniert haben. Bei einer Hausdurchsuchung fanden die Ermittler einen USB-Stick mit 218 geheimen BND-Dokumenten. Für seine Dienste habe er insgesamt 25.000 Euro erhalten, heißt es. Am 28. Mai dieses Jahres soll der Verdächtige dann von einem Google-Mail-Account aus an das russische Generalkonsulat in München geschrieben haben. Dieser Mail soll er sogar vertrauliche Unterlagen beigefügt haben. “Er könne bei Bedarf gern mehr liefern”, zitiert der “Spiegel” aus dem Inhalt der Mail.

    Wie glaubhaft ist diese Darstellung?

    Sie gehört zu den großen Mysterien dieses Falles. Fast alle Indizien und die Auswertung der Beweismittel weisen in Richtung CIA. In deutschen Geheimdienstkreisen herrscht jedoch Unverständnis darüber, dass die Amerikaner auf ein derartiges Angebot eines BND-Mannes eingegangen sein sollen. Erstens könnten diese Mail auch andere Geheimdienste abgefangen haben. Damit wäre er als Informant unbrauchbar. Zweitens sei die Art und Weise der Kontaktanbahnung alles andere als professionell. Noch größer ist die Verwunderung darüber, dass der Verdächtige sich am 28. Mai dieses Jahres unter Beifügung vertraulicher Dokumente von einem Google-Mail-Account aus an das russische Generalkonsulat in München gewandt hatte.

    Würde ein BND-Mitarbeiter ein Spionage-Angebot per Google-Mail schicken?

    Das ist kaum anzunehmen. Spätestens seit der NSA-Affäre gilt als sicher, dass die US-Geheimdienste Mail-Dienste wie Google-Mail intensiv ausspionieren. Als Mitarbeiter des BND musste der Mann wissen, wie leicht Mails abgefangen und mitgelesen werden können. Ein ernsthaftes Angebot hätte er somit vermutlich zumindest über einen verschlüsselten Mail-Account versandt oder aber eine ganz andere Art der Kontaktaufnahme gewählt, heißt es in Geheimdienstkreisen.

    Warum schaltete er später seine Google-Mail-Adresse ab?

    Tatsächlich las der Verfassungsschutz die Mail an das russische Konsulat mit. Unter einer gefälschten russischen Adresse soll der Dienst zum Schein auf das Angebot eingegangen sein und ein Treffen angeboten haben, schreibt der “Spiegel”. Aber der Verdächtige ging auf das Angebot nicht ein, sondern schaltete seine Google-Mail-Adresse ab, als der BND die US-Behörden fragte, ob die Adresse dort bekannt sei.

    Spricht das Abschalten des Google-Mail-Kontos für eine Beteiligung der USA?

    Nicht unbedingt, denn von der Anfrage bei den US-Behörden kann der Verdächtige auch im BND erfahren haben. Immerhin arbeitete er in der BND-Zentrale in Pullach in der Abteilung Auslandsbeziehungen. Er sei als Hilfskraft beschäftigt worden und habe kaum Zugang zu sicherheitsrelevanten Informationen haben können. Verwunderung gibt es im deutschen Geheimdienst darüber, dass die Amerikaner solch ein hohes Risiko eingegangen sein sollen, um Dokumente mit so wenig Brisanz zu erhalten. “Das hätten die doch auch auf anderen Wegen erfahren können”, heißt es.

    Wie passt die Version von der Google-Mail zu den Verschlüsselungsprogrammen, die auf dem heimischen Computer des Verdächtigen gefunden wurden?

    In der Wohnung des BND-Mitarbeiters fanden die Ermittler einen Computer, der ihrer Ansicht nach von einem Geheimdienst präpariert sein könnte. Anlass zu dieser Vermutung gibt eine spezielle Software-Konfiguration. Auf dem Rechner ist eine Wetter-App installiert. Wird damit nach dem Wetter in New York gefragt, öffnet sich ein Verschlüsselungsprogramm (Kryptogramm). Wer solche Dinge benutzt, weiß, wie er mit sensiblen Daten im Internet umgeht, und wird wohl kaum riskante Mails mit öffentlichen Mail-Anbietern wie Google-Mail versenden. Es sei denn, diese Mails sollen gesehen werden.

    Konnte der BND-Mann überhaupt Informationen liefern, die den USA noch nicht vorliegen?

    Für diese Behauptung spricht wenig. Es ist bekannt, dass der Informationsfluss eher in entgegengesetzter Richtung läuft. Nur durch frühzeitige Warnungen der US-Geheimdienste etwa gelang es bisher, die in Deutschland geplanten Attentate islamistischer Terroristen zu verhindern. Im Gegenzug lieferten die deutschen Dienste Informationen zu aus Deutschland nach Afghanistan, Syrien oder in den Irak ausgereisten Dschihadisten.

    Warum gestand der BND-Mann, er habe für die USA spioniert?

    Auch diese Aussage gehört zu den vielen Mysterien dieses Falles. Denn bis zur Festnahme des Verdächtigen gingen die deutschen Geheimdienste und Strafverfolgungsbehörden offenbar von einer geheimdienstlichen Tätigkeit für die Russen aus. Denn der Grund ihrer Ermittlungen war ja die Google-Mail an das russische Konsulat in München. Dass ein mutmaßlicher Spion Dinge gesteht, die gar nicht in Rede standen beziehungsweise ihm anscheinend gar nicht vorgeworfen wurden, erscheint zumindest merkwürdig.

    Wie brisant war das Material, das angeblich an die USA geliefert wurde?

    Nach Angaben des BND enthielten die angeblich an die USA gelieferten Dokumente keine “besonders sensiblen Informationen”. Entgegen ersten Berichten wurde der NSA-Untersuchungsausschuss des Bundestages nicht ausspioniert.

    Warum sollten die US-Dienste sich mit ihm in Österreich treffen?

    Angeblich will der BND-Mitarbeiter seine amerikanischen Auftraggeber regelmäßig in Österreich getroffen haben. Bei diesen Treffen sollen die Dokumente und das Geld übergeben worden sein. Auch diese Darstellung wird in Geheimdienstkreisen angezweifelt. In Österreich sei der russische Geheimdienst FSB viel stärker als in Deutschland, sprich hier wäre das Risiko des Informationsaustauschs demnach geringer gewesen.

    Wann schalten Geheimdienste in solchen Fällen die Staatsanwaltschaft ein?

    Bevor das geschieht, wird ein Fall in der Regel intensiv und lange geprüft. In den deutschen Nachrichtendiensten gibt es deshalb Unmut darüber, dass der Mann so schnell verhaftet wurde und der Fall so schnell an die Öffentlichkeit gelangt ist. “Es wäre aus geheimdienstlicher Sicht besser gewesen, den Verdächtigen weiter zu beobachten, um mehr über seine Kontaktleute zu erfahren. Für den 9. Juli war ja ein weiteres Treffen in Prag geplant. Logisch wäre doch gewesen, dieses Treffen zu observieren und auch den Gesprächspartner dort zu identifizieren”, sagte ein Nachrichtendienstler der “Welt”.

    Gingen die Geheimdienste dilettantisch vor?

    Wie der Fall von deutscher Seite bislang gehandhabt wurde, stößt auch beim früheren Geheimdienstkoordinator der Regierung Kohl, Bernd Schmidbauer (CDU), auf Kritik. “Das bisherige Vorgehen der deutschen Behörden ist höchst unprofessionell. Wegen eines solchen Leichtgewichts den Fall so hochzuspielen und die deutsch-amerikanischen Beziehungen weiter zu schwächen, finde ich bedenklich”, sagte er der “Welt”. “In meiner Zeit gab es auch solche Vorfälle. Doch die haben wir zuerst mit nachrichtendienstlichen Mitteln geprüft und dann auf diplomatischem Weg geklärt.”

    Wie gingen Geheimdienste früher in vergleichbaren Fällen vor?

    Im Jahr 1994 etwa wollte die CIA den damaligen Referatsleiter im Bundeswirtschaftsministerium, Klaus Dieter von Horn, anwerben. Die Treffen fanden auch statt, doch Horn hatte den deutschen Verfassungsschutz eingeweiht. “Wir hatten das jahrelang beobachtet und dann Maßnahmen auf diplomatischem Wege ergriffen. Ein CIA-Mitarbeiter wurde ausgewiesen”, sagte der frühere Geheimdienstkoordinator Bernd Schmidbauer. Es habe zudem weitere Vorkommnisse zwischen den deutschen und amerikanischen Geheimdiensten gegeben, die Anlass für Gespräche auf höchster Ebene über das Verhältnis “unter Freunden” gewesen seien.

    8. Jul. 2014, 17:53
    Von Günther Lachmann und Dirk Banse

    Find this story 8 July 2014

    © Axel Springer SE 2014. Alle Rechte vorbehalten

    Arrested agent’s lawyer: ‘He’s not much of a spy’

    The lawyer of a suspected double agent has said that his client, who reportedly sold documents to the Americans while working for German intelligence, did not strike him as being much of a spy.

    The 31-year-old from the Munich area was arrested last week near the Bavarian capital, suspected of selling files to the CIA.

    His lawyer Klaus Schroth told broadcaster SWRinfo on Monday his client was cooperating with authorities.

    He said he first met the man who worked for Germany’s foreign intelligence service, the BND, which is based south of Munich in Pullach, in Karlsruhe at the Attorney General’s office.

    The lawyer from Karlsruhe refused to go into any details about the allegations. “He still needs questioning, but there are things in the media which are true,” Schroth said.

    The man reportedly sold 218 documents over two years for €25,000 to US secret services. But his lawyer said: “I have worked on lots of espionage cases but my client doesn’t give me the impression that he is a professional spy.”

    On Monday night the US Embassy in Berlin said: “The United States is aware of the detention of a German citizen at the end of last week. We are aware also of published claims that he had been working with US intelligence.

    “As a matter of policy, we do not discuss the details of pending law enforcement matters or allegations of intelligence activity.

    “We are working with the German Government to ensure this issue is resolved appropriately.”

    Past cases taken on by Schroth include that of a TV weatherman accused of rape who was acquitted.

    Published: 08 Jul 2014 10:12 GMT+02:00
    Updated: 08 Jul 2014 10:12 GMT+02:00

    Find this story at 8 July 2014

    copyright The Local Europe GmbH

    Spionage-Affäre beim BND: Alle Spuren führen in die USA

    In der BND-Spionageaffäre hegen die Ermittler kaum noch Zweifel an der Aussage des Festgenommenen. Der 31-Jährige gab demnach BND-Interna gegen Geld an den US-Geheimdienst. Die Regierung wird schon bald in der heiklen Causa reagieren müssen.

    Berlin – Der mutmaßliche Doppelagent beim Bundesnachrichtendienst (BND) sagt offenbar die Wahrheit. Die Ermittler gehen immer stärker davon aus, dass der festgenommene Mitarbeiter des Auslandsgeheimdienstes tatsächlich interne Informationen des BND an den US-Geheimdienst verraten hat und dafür Geld erhielt.

    Mehrere Regierungsbeamte sagten SPIEGEL ONLINE, dass fast alle Indizien dafür sprächen, dass sich der BND-Mann auf eigene Initiative den Amerikanern angedient habe. Rund zwei Jahre lang habe er dann geheime BND-Dokumente weitergegeben – teilweise nach konkreten Anfragen eines Verbindungsmannes, der vermutlich für die CIA arbeitete. “Es gibt nur noch einen sehr geringen Restzweifel”, so ein Insider.

    Der BND-Mann arbeitete für den Stab der “Abteilung EA” (Einsatzgebiete / Auslandsbeziehungen) und hatte damit Zugang zu vielen internen Unterlagen und zur Kommunikation der Zentrale mit den Auslands-Residenten. Nach seiner Festnahme am vergangenen Mittwoch legte er ein Geständnis mit vielen Details zu seiner Zusammenarbeit mit den Amerikanern ab. Die Ermittler hegten zunächst Zweifel an seinem Bericht. Seitdem schweigt er auf Anraten seines Anwalts.

    Inzwischen glauben die Ermittler dem Mann. Ein erstes Indiz für die Richtigkeit seiner Angaben barg nach Informationen des SPIEGEL ein in seiner Wohnung gefundener Computer: Er war im Stil von Geheimdiensten präpariert. Auf dem Rechner befindet sich eine Wetter-App, die bei der Suche nach dem Wetter in New York automatisch ein Krypto-Programm zur Kommunikation öffnet. Die Machart des Programms sei so professionell, dass die App nur von einem Geheimdienst stammen könne, sagen Insider. Zudem stellten die Fahnder in seiner Wohnung unter anderem einen USB-Stick mit geheimen BND-Dokumenten sicher.

    Geheime Treffen in Österreich

    Daneben gab der BND-Mann Hinweise auf ein geheimes System, mit dem der US-Geheimdienst Informationen abschöpft. Nach seiner ersten Kontaktaufnahme Ende 2012, so der geständige Deutsche, habe er seinen Agentenführer stets im nahen Österreich getroffen, eine solche Sicherheitsmaßnahme ist bei Diensten üblich. Ebenso nannte er den Fahndern eine Telefonnummer in New York, die er bei Notfällen anrufen sollte. Nach einem ersten Check ist man sich mittlerweile recht sicher, dass diese zum US-Geheimdienstapparat gehört und ähnlich funktionierte wie in früheren Zeiten tote Briefkästen.

    Die vielen Details, das hört man aus dem BND-Apparat, sprächen für die Plausibilität der Aussage des Doppelagenten. “So etwas kann man sich kaum ausdenken”, sagte ein Beamter am Sonntag. Auch die Wahrscheinlichkeit, dass es sich bei der Geschichte des 31-Jährigen um eine Legende handelt, mit der er eine Tätigkeit für einen anderen Nachrichtendienst tarnen wollte, sei “sehr, sehr unwahrscheinlich”. Im Geheimdienst-Milieu sind solche kruden Legenden durchaus üblich, um in Notfällen den Schaden für den eigentlichen Auftraggeber zu begrenzen.

    Die anfänglichen Zweifel entstammten vor allem dem Hergang der Aufdeckung. (Die ganze Geschichte lesen Sie hier im aktuellen SPIEGEL.) So war der BND-Mann dem Verfassungsschutz Ende Mai zunächst aufgefallen, weil er von einem Google-Account eine E-Mail mit drei geheimen BND-Dokumenten an das russische Generalkonsulat in München sandte und dort gegen Geld seine Dienste als Informant anbot. Auf der Suche nach dem Verräter in den eigenen Reihen zeigte sich die deutsche Spionageabwehr durchaus kreativ. Zunächst schlug man dem BND-Mann nach SPIEGEL-Informationen mit einer gefälschten russischen Adresse ein Treffen vor – das dieser jedoch ablehnte.

    Ein weiteres Detail zeigt, wie wenig die Deutschen damit rechneten, dass die USA einen Maulwurf mitten im BND führten. Sie sandten, ganz im Vertrauen auf den Partner in Übersee, die aufgefallene E-Mail-Adresse in die USA. Da es sich um eine Google-Mail-Adresse handelte, so das Ersuchen, könnten die Kollegen von CIA oder NSA doch vielleicht mehr herausfinden. Eine Antwort blieb aus, stattdessen meldete der BND-Mann kurz darauf seinen Mail-Account ab. Erst über umfangreiche Recherchen stieß man auf den 31-Jährigen. Die Ermittler mussten herausfinden, wer zu den versandten BND-Dokumenten Zugang hatte und zum Zeitpunkt der Mail an das Konsulat in München nicht im Dienst war.

    Der entstandene Schaden lässt sich derzeit noch gar nicht ermessen. Bisher hält sich die Regierung mit Anklagen in Richtung USA zurück und verweist auf die laufenden Ermittlungen. Gleichzeitig gab das Kanzleramt für die Geheimdienste die Linie aus, vorerst alle Kontakte mit den Partnerdiensten auf der anderen Seite des Atlantiks auf das Nötigste zu begrenzen. Spätestens aber, wenn die Bundesanwaltschaft einen weiteren Ermittlungsbericht zur Causa des Doppelagenten vorlegt, wird die Berliner Regierung reagieren müssen. Mit Wünschen nach Aufklärung wird es dann nicht mehr getan sein.

    06. Juli 2014, 16:00 Uhr
    Von Matthias Gebauer

    Find this story at 6 July 2014

    © SPIEGEL ONLINE 2014

    Germany arrests BND member on suspicion of spying for US

    Media says alleged double agent may have been tasked with spying on committee investigating NSA’s activities in Germany

    Reports allege the BND member was originally arrested under suspicion of passing on information to Russian intelligence services. Photograph: Soeren Stache/AFP/Getty Images
    A new surveillance scandal is threatening to unsettle US-German relations after it emerged that an employee of Germany’s intelligence agency has been arrested under suspicion of acting as a double agent for the US.

    According to several reports in the German media, a 31-year-old member of the Bundesnachrichtendienst (BND) administration department in Pullach was on Wednesday arrested by the country’s federal prosecutor, originally under suspicion of passing on information to Russian intelligence services.

    However, under questioning by the federal prosecutor the suspect said he had received money in exchange for passing on secret information to a US contact. If his claims turn out to be true, German papers say it would constitute the biggest scandal involving a US-German double agent in the post-war era.

    Some newspapers are speculating whether the BND employee may have been specifically tasked with spying on the activities of the special Bundestag inquiry committee currently investigating the NSA’s activities in Germany.

    According to Süddeutsche Zeitung newspaper, the employee had been approached several times by the NSA, at least once with a specific request for information on the Bundestag’s investigation into NSA surveillance.According to Der Spiegel, the BND staffer had collected between 200 and 300 secret documents from internal servers and saved them onto a USB stick.

    They were sold on to the US intelligence services between 2012 and 2014, for price of several tens of thousands of euros, said the magazine. The employee had managed to establish contact with the NSA by the most obvious way imaginable – by sending an email to the US embassy.On Friday, the investigative committee gathered for an emergency meeting in response to the arrest. Martina Renner, a Left party politician on the parliamentary committee, told Associated Press that the case indicated that anyone who examined Snowden’s revelations in detail was subject to scrutiny by US intelligence agencies.

    A spokesperson for Angela Merkel said that the chancellor had been informed of the arrest, and that allegations of espionage “weren’t something that was taken lightly”.

    News of the double-spying allegations come less than a day after two former NSA employees spoke as witnesses to the Bundestag inquiry. William Binney, a former technical head, said the NSA had a “totalitarian mentality”, claiming that it represented the “greatest threat” to American society since the civil war.

    Thomas Drake, another former NSA staffer who worked at the agency between 2001 and 2008, accused Germany’s BND of collaborating close with their American counterparts. The German intelligence agency’s claims that they had been unaware of NSA surveillance activity in Germany were, he said, “beyond credibility”.

    Philip Oltermann in Berlin
    theguardian.com, Friday 4 July 2014 16.50 BST

    Find this story at 4 July 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    BND-Spion bekam Befehle aus US-Botschaft in Berlin

    Die Anhörung vor dem NSA-Untersuchungsausschuss im Deutschen Bundestag. Ein BND-Mann soll als Spitzel für die USA fungiert haben
    Die Anhörung vor dem NSA-Untersuchungsausschuss im Deutschen Bundestag. Ein BND-Mann soll in Berlin als Spitzel für die USA fungiert haben

    Ein Mitarbeiter des Bundesnachrichtendienstes (BND) soll mindestens zwei Jahre lang als Doppelagent für US-Geheimdienste gearbeitet haben. Nach BILD-Informationen hat er seine Anweisungen offenbar direkt aus der amerikanischen Botschaft in Berlin erhalten.
    Der BND-Mitarbeiter soll die US-Botschaft bereits im Jahr 2012 per E-Mail kontaktiert und dabei „interessante BND-Dokumente angeboten“ haben. Danach habe sich die US-Botschaft mit dem 31-Jährigen in Verbindung gesetzt und sich grundsätzlich zu einer Kooperation bereiterklärt. Dabei sollen dem BND-Mitarbeiter für entsprechende Geheimdokumente auch Informationshonorare in Aussicht gestellt worden sein.
    Nach BILD-Informationen aus Sicherheitskreisen gehen die Ermittler von Staatsanwaltschaft und Polizei deswegen inzwischen auch von möglichen „finanziellen Vorteilen“ als Hauptmotiv für die Doppelagenten-Tätigkeit des BND-Mannes aus.
    Die Bundesanwaltschaft hatte den 31 Jahre alten Deutschen am Mittwoch wegen des dringenden Verdachts der geheimdienstlichen Agententätigkeit festnehmen lassen.
    Der Botschafter der USA, John B. Emerson, wurde am Freitagnachmittag ins Auswärtige Amt gebeten. Staatssekretär Stephan Steinlein habe ihn bei dem Gespräch gebeten, „an einer zügigen Aufklärung mitzuwirken“, teilte das Auswärtige Amt mit.
    So spionierte der BND-Mann für die USA
    Zwischen 2012 und 2014 soll der Mitarbeiter der BND-Einsatzstelle Ausland insgesamt 218 BND-Geheimdokumente gestohlen und auf einem USB-Stick gespeichert haben, wie BILD erfuhr.
    Bei drei konspirativen Treffen mit US-Geheimdienst-Mitarbeitern soll der BND-Mann, der im mittleren Dienst des deutschen Auslandsgeheimdienstes in der technischen Unterstützung tätig war, seinen Kontaktpersonen Hunderte Geheimdokumente für insgesamt 25 000 Euro verkauft haben.
    Unter den Dokumenten befinden sich nach BILD-Informationen auch drei mit Bezug zum NSA-Untersuchungsausschuss des Bundestages.
    Die SPD beantragte am Freitagnachmittag eine Sondersitzung des Parlamentarischen Kontrollgremiums und forderte eine Unterrichtung durch die Bundesregierung zum Sachstand des öffentlich gewordenen Spionagefalls im BND.
    NSA-AFFÄRE
    56
    Gab der BND mehr Informationen an die NSA weiter als bisher bekannt?
    MEDIENBERICHT
    BND leitete Abhör-Daten an NSA weiter
    Der Bundesnachrichtendienst soll dem US-Dienst NSA jahrelang Zugriff auf deutsche Kommunikationsdaten gewährt haben.
    mehr…
    30
    PREMIUM BILDPLUS INHALT
    BLACKBERRY Q10 So funktioniert Merkels Krypto-Handy
    69
    ANHÖRUNG IN STRASSBURG Snowden wundert sich über die Deutschen
    77
    NSA-DOKUMENTE BEWEISEN Deutsche Daten halfen bei Tötungen
    27
    PREMIUM BILDPLUS INHALT
    NSA-ERMITTLUNGEN Darf unser Chefankläger nicht mehr in die USA?
    Der deutsche Agent traf seine Kontakte in Österreich
    Das erste Treffen des BND-Mitarbeiters mit Vertretern der US-Geheimdienste fand in Salzburg, die beiden weiteren Treffen ebenfalls in Österreich statt.
    Bei dem ersten und dem dritten Treffen soll der BND-Mitarbeiter jeweils 10 000 Euro und beim zweiten Treffen 5000 Euro als Informationshonorar kassiert haben. Ein viertes Treffen mit US-Geheimdienstmitarbeitern soll nach BILD-Informationen für den 9. Juli in Prag verabredet gewesen sein.
    USB-Stick bei Wohnungsdurchsuchung entdeckt
    Bei einer Durchsuchung seiner Wohnung und der Wohnung seiner Lebensgefährtin stellten die Ermittler der Staatsanwaltschaft und der Polizei nach BILD-Informationen sowohl den fraglichen USB-Stick als auch weitere Dokumente sowie den Privatrechner des Mannes sicher. Noch unklar ist, ob der Verdächtige weitere BND-Dokumente besessen hat.
    DER EHEMALIGE NSA-AGENT THOMAS DRAKE
    83
    Der ehemalige NSA-Agent Thomas Drake – er droht mit weiteren Enthüllungen
    ABHÖR-AFFÄRE
    Ex-NSA-Agent droht BND mit Enthüllungen
    Ex-NSA-Agent Thomas Drake sagt Donnerstag im NSA-Untersuchungsausschuss aus. Doch er schon vorab brisante Details.
    mehr…
    Bundeskanzlerin Angela Merkel (CDU) ist bereits seit gestern über den Fall informiert. Dies teilte Regierungssprecher Steffen Seibert mit.
    Er sprach von einem „sehr ernsthaften Vorgang”. Die Bundesregierung werde nun abwarten, was die polizeilichen Ermittlungen ergäben und dann handeln. Spionage für ausländische Dienste sei nichts, „was wir auf die leichte Schulter nehmen”, hob Seibert hervor.
    Seibert wollte sich nicht dazu äußern, ob der Fall auch bei einem Telefonat der Kanzlerin am Donnerstagabend mit US-Präsident Barack Obama eine Rolle spielte.
    Die USA schweigen: Eine Sprecherin des Nationalen Sicherheitsrats in Washington wollte die Angelegenheit nicht kommentieren.
    Kurios: Der 31-Jährige war ursprünglich unter dem Verdacht festgenommen worden, Kontakt zum russischen Geheimdienst gesucht zu haben.
    Unabhängig vom aktuellen Verdachtsfall haben die deutschen Sicherheitsbehörden schon seit Längerem befürchtet, dass der Ausschuss von ausländischen Nachrichtendiensten ausspioniert werden könnte.
    An die Obleute des Untersuchungsausschusses wurden bereits Kryptohandys zur verschlüsselten Kommunikation ausgegeben. Zudem wurden die Sicherheitsvorkehrungen in der Geheimschutzstelle des Bundestages verstärkt. Dort können Abgeordnete als geheim klassifizierte Unterlagen einsehen.

    04.07.2014 – 18:24 Uhr
    Von FRANZ SOLMS-LAUBACH

    Find this story at 4 July 2014

    Copyright http://www.bild.de

    31-Jähriger festgenommen BND-Mitarbeiter ein US-Spion?

    Ein BND-Mitarbeiter steht im Verdacht, den NSA-Untersuchungsausschuss des Bundestages im Auftrag eines US-Geheimdienstes ausspioniert zu haben. Die Bundesanwaltschaft hatte den 31-jährigen Deutschen gestern wegen des dringenden Verdachts der geheimdienstlichen Agententätigkeit festnehmen lassen, aber keine Details des Falls mitgeteilt. Das erfuhren NDR, WDR und “Süddeutsche Zeitung” aus Regierungskreisen.

    Der Ausschuss soll die Hintergründe der von dem ehemaligen US-Geheimdienstler Edward Snowden enthüllten Spähaffäre aufklären. Unter anderem will er die Rolle des BND beleuchten. Die Affäre um die Aktivitäten der National Security Agency (NSA) hatte vergangenes Jahr zwischen Berlin und Washington für eine schwere Verstimmung gesorgt.

    BND-Mitarbeiter soll NSA-Ausschuss für USA ausspioniert haben
    tagesschau 02:06 Uhr, 05.07.2014, Robin Lautenbach, ARD Berlin/Georg Mascolo, NDR
    Download der Videodatei
    Über den Untersuchungsausschuss berichtet

    Der BND-Mitarbeiter soll mehrfach von dem US-Geheimdienst befragt worden sein und diesem mindestens einmal über die Aktivitäten des NSA-Untersuchungsausschusses berichtet haben. Der 31-Jährige war unter dem Verdacht festgenommen worden, Kontakt zum russischen Geheimdienst gesucht zu haben. In Vernehmungen soll der BND-Mitarbeiter dann aber gestanden haben, Informationen an einen US-Dienst geliefert zu haben.

    Stefan Wels vom NDR sagte in der tagesschau, die Ermittler hätten das Haus der Verdächtigen durchsucht und dabei einen USB-Stick sichergestellt. Dieser werde ausgewertet.

    Mehr zum Thema
    NSA-Ausschuss: Ermüdender Auftritt des Zeugen Drake
    NSA-Veteran erhebt schwere Vorwürfe gegen Geheimdienst
    Deutsche im NSA-Visier: Als Extremist gebrandmarkt
    Die Ermittler überprüfen derzeit die Angaben des Verdächtigen. Sicherheitsbehörden schließen nicht aus, dass der Mann in der Vernehmung falsche Angaben gemacht hat.

    US-Botschafter ins Auswärtige Amt gebeten

    Sollte sich der Verdacht einer Agententätigkeit für die USA bestätigen, wäre dies der bisher größte Skandal um einen deutsch-amerikanischen Doppelagenten in der Nachkriegszeit – und Deutschland und die USA stünden vor einem neuen Geheimdienstskandal. Regierungssprecher Steffen Seibert bezeichnete den Fall als “ernsthaft”. Von SPD, Grünen und Linkspartei wurde der Ruf nach diplomatischen Konsequenzen laut, sollte sich der Spionage-Verdacht bestätigen.

    Das Auswärtige Amt in Berlin bat US-Botschafter John Emerson zu einem Gespräch. Er sei gebeten worden, “an einer zügigen Aufklärung mitzuwirken”, erklärte das Ministerium. Die US-Regierung blieb dagegen wortkarg: “Kein Kommentar.”

    Selbst den Amerikanern angeboten?

    “Spiegel Online” berichtete, der Mann sei beim BND im Mittleren Dienst beschäftigt gewesen. Er habe sich dem US-Dienst selbst als Spion angeboten und dafür Geld verlangt. Laut Nachrichtenagentur Reuters arbeitete der 31-Jährige in der BND-Poststelle.

    Nach Informationen der “Bild”-Zeitung war der Mann zwei Jahre lang ein Doppelagent. Das Blatt berichtete unter Berufung auf Sicherheitskreise, dass er seit 2012 insgesamt 218 BND-Geheimpapiere gestohlen und auf einem USB-Stick gespeichert habe. Bei drei konspirativen Treffen mit US-Geheimdienstlern in Österreich habe er Dokumente für insgesamt 25.000 Euro verkauft. Darunter seien auch mindestens drei Dokumente mit Bezug zum NSA-Ausschuss gewesen.

    Stand: 04.07.2014 19:09 Uhr

    Find this story at 4 July 2014

    © ARD-aktuell / tagesschau.de

    Geheimdienst-Kooperation; BND versorgte NSA mit Telefondaten

    Der Bundesnachrichtendienst soll mehr als drei Jahre lang Telefondaten in Frankfurt abgefangen und direkt an den US-Geheimdienst NSA weitergeleitet haben. Die Aktion sei beendet worden, weil sie als „politisch viel zu heikel“ galt, berichten Medien unter Berufung auf einen Insider.
    Der Bundesnachrichtendienst (BND) soll laut Recherchen von „Süddeutscher Zeitung“ sowie den Sendern NDR und WDR jahrelang Telefondaten direkt an die NSA weitergeleitet haben. Noch im vergangenen Jahr hatten hochrangige Behördenvertreter gegenüber dem zuständigen Parlamentarischen Kontrollgremium zwar zugegeben, dass sie einen Datenknotenpunkt in Frankfurt am Main anzapfen würden – aber laut der “Süddeutschen Zeitung” nicht erwähnt, dass sie einen Teil dieser Rohdaten an die NSA weitergeleitet hatten.

    Gerüchte gab es schon lange
    Gerüchte, dass die NSA den Frankfurter Datenknotenpunkt angezapft hätte, gab es spätestens seit den Enthüllungen durch Edward Snowden. Schließlich ist Frankfurt der wichtigste Telekommunikationsstandort Europas. Deshalb soll die NSA laut „Süddeutscher Zeitung“ darauf gedrängt haben, einen direkten Zugriff auf den Datenknoten zu erhalten. Der damalige Bundeskanzler Gerhard Schröder (SPD) habe dies jedoch verweigert. Dass der BND von da an einen Teil der Daten an die Amerikaner weitergeleitet hätte, sei demnach ein Kompromiss gewesen. Außerdem soll es eine Vereinbarung zwischen NSA und BND gegeben haben, dass keine Daten deutscher Staatsbürger übermittelt werden.
    Frank-Walter Steinmeier, Gerhard Schröder, Edward snowden, Geheimdienste, Frankfurt am Main, Telefondaten, BND, Bundesnachrichtendienst, NSA

    Operation wurde erst 2007 beendet
    Die Operation soll von 2004 bis 2007 gedauert haben. Zu Beginn der Zusammenarbeit regierte im Bund Rot-Grün, verantwortlich war zunächst der damalige Kanzleramtschef und heutige Außenminister Frank-Walter Steinmeier (SPD). Die Einstellung der Kooperation begründete ein „mit den Abläufen vertrauter Beteiligter“ gegenüber der “Süddeutschen” damit, dass sie „politisch viel zu heikel“ gewesen sei. Die NSA habe die Operation fortführen wollen.

    BND fasst weiterhin „interessante Ergebnisse“ zusammen
    Seitdem haben angeblich nur noch die deutschen Nachrichtendienste Zugriff auf den Knotenpunkt in Frankfurt – zumindest stellten es Regierungskreise gegenüber dem Recherche-Team von Süddeutschen Zeitung, NRD und WDR so dar. Doch auch wenn die NSA keine Rohdaten mehr erhalte, so liefere der BND den US-Kollegen nach wie vor Zusammenfassungen interessanter Ergebnisse.

    Donnerstag, 26.06.2014, 19:24

    Find this story at 26 June 2014

    Copyright http://www.focus.de/

    Datenknoten Frankfurt BND gab jahrelang Telefondaten an die NSA

    Wie eng BND und NSA zusammenarbeiten, hat der SPIEGEL kürzlich enthüllt. Jetzt berichten Medien, der deutsche Geheimdienst habe vor Jahren auch Daten aus einem Netzknoten in Frankfurt weitergegeben. Bis es “zu heikel” wurde.

    Über mehrere Jahre hinweg hat der BND offenbar Telefondaten aus seiner eigenen Sammlung an die NSA weitergegeben. Die “Süddeutsche Zeitung”, NDR und WDR berichten unter Berufung auf einen Insider, der BND habe von 2004 bis 2007 den amerikanischen Kollegen Daten weitergeleitet, die er an einem angezapften Datenknotenpunkt in Frankfurt abgefangen habe. Weil diese Form der Zusammenarbeit offenbar “zu heikel” war, wurde sie 2007 beendet.

    Dass sich der Bundesnachrichtendienst in Frankfurt Zugriff auf den Internetverkehr verschafft hat, war bereits bekannt. Nach dem Gesetz muss der deutsche Geheimdient streng filtern, denn deutsche Bürger darf er nicht überwachen. Erst kürzlich wurde im Rahmen des NSA-Untersuchungsausschusses nach den Snowden-Enthüllungen auch die Abhörpraxis des BND genauer beleuchtet und kritisiert.

    Nach den Enthüllungen Edward Snowdens wird generell auch vermehrt auf die Rolle der deutschen Dienste geschaut: Nachdem die Bundesregierung von den Machenschaften der NSA nichts gewusst haben will, enthüllten der SPIEGEL und SPIEGEL ONLINE vor einigen Tagen ein ganzes Dossier von Dokumenten aus dem Snowden-Fundus. Die als geheim eingestuften Schriftstücke geben nicht nur Auskunft über die Niederlassungen der NSA in Deutschland (unter anderem übrigens in Frankfurt), sondern auch einen Einblick in die enge Zusammenarbeit zwischen dem BND und seinen amerikanischen Kollegen.

    25. Juni 2014, 19:43 Uhr

    Find this story at 25 June 2014

    © SPIEGEL ONLINE 2014

    BND leitete Telefondaten an NSA weiter

    Als “politisch viel zu heikel” wurde diese Zusammenarbeit von NSA und BND 2007 eingestellt. Zuvor aber hatte der Bundesnachrichtendienst jahrelang einen Datenknoten in Frankfurt angezapft und Rohdaten an die Amerikaner weitergeleitet. Ursprünglich soll die NSA noch mehr gefordert haben.

    Der US-Geheimdienst NSA hatte mit Hilfe des Bundesnachrichtendienstes (BND) in Frankfurt jahrelang Zugriff auf große Mengen von Telekommunikationsdaten. Nach Recherchen von Süddeutscher Zeitung, NDR und WDR leitete der BND in der Zeit der rot-grünen Bundesregierung mindestens drei Jahre lang in Frankfurt abgefangene Rohdaten direkt an den US-Partnerdienst weiter. Als Kanzleramtschef verantwortlich war damals zunächst der heutige Außenminister Frank-Walter Steinmeier (SPD).

    Die Operation von BND und NSA, die von 2004 bis 2007 gedauert haben soll, wurde beendet, weil die Aktion “politisch viel zu heikel” gewesen sei, erinnert sich ein mit den Abläufen vertrauter Beteiligter. Die NSA habe gegen die Einstellung der Operation protestiert.

    Nach einer damals zwischen NSA und BND geschlossenen Vereinbarung seien Daten deutscher Staatsbürger dabei jedoch nicht übermittelt worden. Ein Sprecher der Bundesregierung erklärte auf Anfrage dazu: Die Arbeit des Auslandsnachrichtendienstes BND unterliege “der parlamentarischen Kontrolle. Grundsätzlich gilt daher, dass der BND zu Aspekten seiner operativen Arbeit ausschließlich der Bundesregierung und den zuständigen, geheim tagenden Gremien des Deutschen Bundestages berichtet”.

    Schröder verweigerte NSA direkten Zugang
    Wie mehrere Quellen erklären, sei der Fall Frankfurt im vergangenen Jahr von der Spitze des BND in dem zuständigen Parlamentarischen Kontrollgremium vorgetragen worden. Dabei sei aber lediglich erklärt worden, der BND zapfe an diesem Datenknotenpunkt Leitungen an. Es sei aber nicht erwähnt worden, dass der BND über Jahre einen Teil der Daten an die NSA weitergeleitet habe.

    Es soll sich bei der 2004 gestarteten deutsch-amerikanischen Zusammenarbeit um einen Kompromiss gehandelt haben. Zuvor sollen die Amerikaner darauf gedrungen haben, ihnen einen direkten Zugriff am Telekommunikationsstandort Frankfurt zu gewähren. Diesen Zugang soll die damalige Bundesregierung unter Kanzler Gerhard Schröder (SPD) verweigert haben, aber dafür im Gegenzug einer Weiterleitung von Teilen der abgefangenen Daten zugestimmt haben.

    Frankfurt ist Telekommunikationsstandort Nummer eins in Europa und Drehkreuz für den nationalen wie internationalen Internetverkehr. In der Vergangenheit hatte es im Zuge der Snowden-Debatte Gerüchte gegeben, dass die NSA in der Vergangenheit Zugriff auf Daten in Frankfurt gehabt habe. “Wenn ein ausländischer Dienst den Internetknoten in Frankfurt anzapfen würde, wäre das eine Verletzung unserer Souveränitätsrechte”, hatte im vergangenen Jahr der damalige Innenminister Hans-Peter Friedrich (CSU) erklärt.

    Nach Angaben aus Regierungskreisen lauschen heute am Knotenpunkt Frankfurt angeblich nur die deutschen Dienste. Statt Rohdaten erhalte die NSA lediglich Zusammenfassungen interessanter Erkenntnisse.

    25. Juni 2014 18:07 Geheimdienste
    Von Hans Leyendecker, Georg Mascolo und Frederik Obermaier

    Find this story at 25 June 2014

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    New NSA Revelations Inside Snowden’s Germany File

    An analysis of secret documents leaked by Edward Snowden demonstrates that the NSA is more active in Germany than anywhere else in Europe — and that data collected here may have helped kill suspected terrorists.

    Just before Christmas 2005, an unexpected event disrupted the work of American spies in the south-central German city of Wiesbaden. During the installation of a fiber-optic cable near the Rhine River, local workers encountered a suspicious metal object, possibly an undetonated World War II explosive. It was certainly possible: Adolf Hitler’s military had once maintained a tank repair yard in the Wiesbaden neighborhood of Mainz-Kastel.

    The Americans — who maintained what was officially known as a “Storage Station” on Ludwig Wolker Street — prepared an evacuation plan. And on Jan. 24, 2006, analysts with the National Security Agency (NSA) cleared out their offices, cutting off the intelligence agency’s access to important European data streams for an entire day, a painfully long time. The all-clear only came that night: The potential ordinance turned out to be nothing more than a pile of junk.

    Residents in Mainz-Kastel knew nothing of the incident.

    Of course, everybody living there knows of the 20-hectare (49-acre) US army compound. A beige wall topped with barbed wire protects the site from the outside world; a sign outside warns, “Beware, Firearms in Use!”

    Americans in uniform have been part of the cityscape in Wiesbaden for decades, and local businesses have learned to cater to their customers from abroad. Used-car dealerships post their prices in dollars and many Americans are regulars at the local brewery. “It is a peaceful coexistence,” says Christa Gabriel, head of the Mainz-Kastel district council.

    But until now, almost nobody in Wiesbaden knew that Building 4009 of the “Storage Station” houses one of the NSA’s most important European data collection centers. Its official name is the European Technical Center (ETC), and, as documents from the archive of whistleblower Edward Snowden show, it has been expanded in recent years. From an American perspective, the program to improve the center — which was known by the strange code name “GODLIKELESION” — was badly needed. In early 2010, for example, the NSA branch office lost power 150 times within the space just a few months — a serious handicap for a service that strives to monitor all of the world’s data traffic.

    On Sept. 19, 2011, the Americans celebrated the reopening of the refurbished ETC, and since then, the building has been the NSA’s “primary communications hub” in Europe. From here, a Snowden document outlines, huge amounts of data are intercepted and forwarded to “NSAers, warfighters and foreign partners in Europe, Africa and the Middle East.” The hub, the document notes, ensures the reliable transfer of data for “the foreseeable future.”

    Soon the NSA will have an even more powerful and modern facility at their disposal: Just five kilometers away, in the Clay Kaserne, a US military complex located in the Erbenheim district of Wiesbaden, the “Consolidated Intelligence Center” is under construction. It will house data-monitoring specialists from Mainz-Kastel. The project in southern Hesse comes with a price tag of $124 million (€91 million). When finished, the US government will be even better equipped to satisfy its vast hunger for data.

    One year after Edward Snowden made the breadth of the NSA’s global data monitoring public, much remains unknown about the full scope of the intelligence service’s activities in Germany. We know that the Americans monitored the mobile phone of German Chancellor Angela Merkel and we know that there are listening posts in the US Embassy in Berlin and in the Consulate General in Frankfurt.

    But much remains in the dark. The German government has sent lists of questions to the US government on several occasions, and a parliamentary investigative committee has begun looking into the subject in Berlin. Furthermore, Germany’s chief public prosecutor has initiated an investigation into the NSA — albeit one currently limited to its monitoring of the chancellor’s cell phone and not the broader allegation that it spied on the communications of the German public. Neither the government nor German lawmakers nor prosecutors believe they will receive answers from officials in the United States.

    German Left Party politician Jan Korte recently asked just how much the German government knows about American spying activities in Germany. The answer: Nothing. The NSA’s promise to send a package including all relevant documents to re-establish transparency between the two governments has been quietly forgotten by the Americans.

    In response, SPIEGEL has again reviewed the Snowden documents relating to Germany and compiled a Germany File of original documents pertaining to the NSA’s activities in the country that are now available for download here. SPIEGEL has reported on the contents of some of the documents over the course of the past year. The content of others is now being written about for the first time. Some passages of the documents have been redacted in order to remove sensitive information like the names of NSA employees or those of the German foreign intelligence service, the Bundesnachrichtendienst (BND). This week’s reports are also based on documents and information from other sources.

    An Omnipotent American Authority

    The German public has a right to know exactly what the NSA is doing in Germany, and should be given the ability to draw its own conclusions about the extent of the US intelligence agency’s activities in the country and the scope of its cooperation with German agencies when it comes to, for example, the monitoring of fiber-optic cables.

    The German archive provides the basis for a critical discussion on the necessity and limits of secret service work as well as on the protection of privacy in the age of digital communication. The documents complement the debate over a trans-Atlantic relationship that has been severely damaged by the NSA affair.

    They paint a picture of an all-powerful American intelligence agency that has developed an increasingly intimate relationship with Germany over the past 13 years while massively expanding its presence. No other country in Europe plays host to a secret NSA surveillance architecture comparable to the one in Germany. It is a web of sites defined as much by a thirst for total control as by the desire for security. In 2007, the NSA claimed to have at least a dozen active collection sites in Germany.

    The documents indicate that the NSA uses its German sites to search for a potential target by analyzing a “Pattern of Life,” in the words of one Snowden file. And one classified report suggests that information collected in Germany is used for the “capture or kill” of alleged terrorists.

    According to Paragraph 99 of Germany’s criminal code, spying is illegal on German territory, yet German officials would seem to know next to nothing about the NSA’s activity in their country. For quite some time, it appears, they didn’t even want to know. It wasn’t until Snowden went public with his knowledge that the German government became active.

    On June 11, August 26 and October 24 of last year, Berlin sent a catalogue of questions to the US government. During a visit to NSA headquarters at Fort Meade, Maryland at the beginning of November, German intelligence heads Gerhard Schindler (of the BND) and Hans-Georg Maassen (of the domestic intelligence agency, known as the Office for the Protection of the Constitution or BfV) asked the most important questions in person and, for good measure, handed over a written list. No answers have been forthcoming. This leaves the Snowden documents as the best source for describing how the NSA has turned Germany into its most important base in Europe in the wake of the terrorist attacks of Sept. 11, 2001.

    The NSA’s European Headquarters

    On March 10, 2004, two US generals — Richard J. Quirk III of the NSA and John Kimmons, who was the US Army’s deputy chief of staff for intelligence — finalized an agreement to establish an operations center in Germany, the European Security Center (ESC), to be located on US Army property in the town of Griesheim near Darmstadt, Germany. That center is now the NSA’s most important listening station in Europe.

    The NSA had already dispatched an initial team to southern Germany in early 2003. The agency stationed a half-dozen analysts at the its European headquarters in Stuttgart’s Vaihingen neighborhood, where their work focused largely on North Africa. The analysts’ aims, according to internal documents, included providing support to African governments in securing borders and ensuring that they didn’t offer safe havens to terrorist organizations or their accomplices.

    The work quickly bore fruit. It became increasingly easy to track the movements of suspicious persons in Mali, Mauritania and Algeria through the surveillance of satellite telephones. NSA workers passed information on to the US military’s European Command, with some also being shared with individual governments in Africa. A US government document states that the intelligence insights have “been responsible for the capture or kill of over 40 terrorists and has helped achieve GWOT (Global War on Terror) and regional policy successes in Africa.”

    Is Germany an NSA Beachhead?

    The documents in Snowden’s archive raise the question of whether Germany has become a beachhead for America’s deadly operations against suspected terrorists — and whether the CIA and the American military use data collected in Germany in the deployment of its combat drones. When asked about this by SPIEGEL, the NSA declined to respond.

    The operations of the NSA’s analysts in Stuttgart were so successful that the intelligence agency quickly moved to expand its presence. In 2004, the Americans obtained approximately 1,000 square meters (10,750 square feet) of office space in Griesheim to host 59 workers who monitored communications in an effort to “optimize support to Theater operations” of the US Armed Forces. Ten years later, the center, although largely used by the military, has become the NSA’s most important outpost in Europe — with a mandate that goes far beyond providing support for the US military.

    In 2011, around 240 intelligence service analysts were working at the Griesheim facility, known as the Dagger Complex. It was a “diverse mix of military service members, Department of the Army civilians, NSA civilians, and contractors,” an internal document states. They were responsible for both collecting and analyzing international communication streams. One member of the NSA pointed out proudly that they were responsible for every step in the process: collection, processing, analyzing and distribution.

    In May 2011, the installation was renamed the European Center for Cryptology (ECC) and the NSA integrated its Threat Operations Center, responsible for early danger identification, into the site. A total of 26 reconnaissance missions are managed from the Griesheim complex, which has since become the center of the “largest Analysis and Production activity in Europe,” with satellite stations in Mons, Belgium, and in Great Britain. Internal documents indicate that the ECC is the operative intelligence arm of the NSA’s European leadership in Stuttgart.

    Targets in Africa, Targets in Europe

    Much of what happens in Griesheim is classic intelligence work and threat identification, but a presentation dating from 2012 suggests that European data streams are also monitored on a broad scale. One internal document states there are targets in Africa as well as targets in Europe. The reason being that “most terrorists stop thru Europe.” For reconnaissance, the document mentions, the ECC relies on its own intelligence gathering as well as data and assistance from Britain’s Government Communications Headquarters (GCHQ) intelligence service.
    The latter is likely a reference to the Tempora program, located in the British town of Bude, which collects all Internet data passing through several major fiber-optic cables. GCHQ, working together with the NSA, saves the data that travels through these major European network connections for at least three days. The ECC claims to have access to at least part of the GCHQ data.

    NSA staff in Griesheim use the most modern equipment available for the analysis of the data streams, using programs like XKeyscore, which allows for the deep penetration of Internet traffic. Xkeyscore’s sheer power even awakened the interest of Germany’s BND foreign intelligence service as well as that of the Federal Office for the Protection of the Constitution, which is responsible for monitoring extremists and possible terrorists within Germany.

    An internal NSA report suggests that XKeyscore was being used at Griesheim not only to collect metadata — e.g. the who, what, where, with whom and at what time — but also the content of actual communications. “Raw content” is saved for a period of between “3 days to a couple of weeks,” an ECC slide states. The metadata are stored for more than 90 days. The document states that XKeyscore also makes “complex analytics like ‘Pattern of Life'” possible.

    The NSA said in a statement that XKeyscore is an element of its foreign intelligence gathering activities, but it was using the program lawfully and that it allows the agency to help “defend the nation and protect US and allied troops abroad.” The statement said it engages in “extensive, close consultations” with the German government. In a statement provided to SPIEGEL, NSA officials pointed to a policy directive Barack Obama issued in January in which the US president affirmed that all persons, regardless of nationality, have legitimate privacy interests, and that privacy and civil liberties “shall be integral considerations in the planning of US signals intelligence activities.”

    The statement reveals the significant gap between Germany’s understanding of what surveillance means and that of the Americans. In overseas operations, the NSA does not consider searching through emails to be surveillance as long as they are only stored temporarily. It is only considered to be a deeper encroachment on privacy when this data is transferred to the agency’s databases and saved for a longer period of time. The US doesn’t see it as a contradiction when Obama ensures that people won’t be spied upon, even as the NSA continues monitoring email traffic. The NSA did not respond to SPIEGEL’s more detailed questions about the agency’s outposts in Germany.

    ‘The Endangered Habitat of the NSA Spies’

    The bustling activity inside the Dagger Complex listening station at Griesheim stands in stark contrast to its outward appearance. Only a few buildings can be recognized above ground, secured by two fences and a gate made of steel girders and topped by barbed wire.

    Activist Daniel Bangart would love to see what is on the other side of that fence. He’s rattled the fence a number of times over the past year, but so far no one has let him in. Instead, he’s often been visited by police.

    When Bangert first began inviting people to take a “walk” at Griesheim to “explore together the endangered habitat of the NSA spies,” he intended it as a kind of subversive satirical act. But with each new revelation from the Snowden archive, the 29-year-old has taken the issue more seriously. These days, the heating engineer — who often wears a T-shirt emblazoned with “Team Edward” — and a small group of campaigners regularly attempt to provoke employees at the Dagger Complex. He has developed his own method of counter-espionage: He writes down the license plate numbers of suspected spies from Wiesbaden and Stuttgart.

    At one point, the anti-surveillance activist even tried to initiate a dialogue with a few of the Americans. At a street fair in Griesheim, he convinced one to join him for a beer, but the man only answered Bangert’s questions with queries of his own. Bangert says another American told him: “What is your problem? We are watching you!”

    Spying as They Please

    It’s possible Bangert has also attracted the attention of another NSA site, located in the US Consulate General in Frankfurt, not far from Griesheim. The “Special Collection Service” (SCS) is a listening station that German public prosecutors have taken a particular interest in since announcing earlier this month that it was launching an investigation into the spying on Angela Merkel’s mobile phone. The trail leads from the Chancellery in Berlin via the US Embassy next to the Brandenburg Gate and continues all the way to Laurel, Maryland, north of Washington DC.

    That’s where the SCS is headquartered. The service is operated together by the NSA and the CIA and has agents spread out across the globe. They are the eyes and ears of the US and, as one internal document notes, establish a “Home field advantage in adversary’s space.”

    The SCS is like a two-parent household, says Ron Moultrie, formerly the service’s vice president. “We must be mindful of both ‘parents’.” Every two years, leadership is swapped between the NSA and the CIA. The SCS, says Moultrie, is “truly a hybrid.” It is divided into four departments, including the “Mission Support Office” and the “Field Operations Office,” which is made up of a Special Operations unit and a center for signal development. In Laurel, according to internal documents, the NSA has established a relay station for communications intercepted overseas and a site for training.

    Employees are stationed in US embassies and consulates in crisis regions, but are also active in countries that are considered neutral, like Austria. The agents are protected by diplomatic accreditation, even though their job isn’t covered by the international agreements guaranteeing diplomatic immunity: They spy pretty much as they please. For many years, SCS agents claimed to be working for the ominous-sounding “Defense Communications Support Group.” Sometimes, they said they worked for something called the “Defense Information Systems Agency.”

    Spying Stations, from Athens the Zagreb

    According to an internal document from 2011, information related to the SCS and the sites it maintains was to be kept classified for at least 75 years. It argued that if the agency’s activities were ever revealed, it would hamper the “effectiveness of intelligence methods currently in use” and result in “serious harm” to relations between the US and foreign governments.

    In 1979, there were just over 40 such SCS branch offices. During the chilliest days of the Cold War, the number reached a high point of 88 only to drop significantly after the fall of the Berlin Wall and the collapse of communism in Eastern Europe. But following the Sept. 11, 2001 terror attacks, the government established additional sites, bringing the number of SCS spy stations around the world up to a total of around 80 today. The documents indicate that the SCS maintains two sites in Germany: in the US Consulate General in Frankfurt and the US Embassy in Berlin, just a few hundred meters away from the Chancellery.

    The German agencies responsible for defending against and pursuing espionage — the Office for the Protection of the Constitution and the office of the chief federal prosecutor — are particularly interested in the technology deployed by the SCS. The database entry relating to Merkel’s cell phone, which SPIEGEL first reported on in October 2013, shows that the SCS was responsible for its surveillance.

    According to an internal presentation about the work done by the SCS, equipment includes an antenna rotator known as “Einstein,” a database for analysis of microwaves called “Interquake” and a program called “Sciatica” that allows for the collection of signals transmitted in gigahertz frequencies. A program called “Birdwatcher,” which intercepts encrypted signals and prepares them for analysis, can be remotely controlled from the SCS headquarters in Maryland. The tool allows the NSA to identify protected “Virtual Private Networks” or VPNs that might be of interest. VPNs are used by many companies and embassies for internal communication.

    200 American Intelligence Workers in Germany

    Following the revelations that Merkel’s mobile phone had been monitored, Hans-Georg Maassen of the domestic intelligence agency BfV, turned to US Ambassador to Germany John Emerson to learn more about the technology and the people behind it. Maassen also wanted to know what private contractors the NSA was working with in Germany. When Emerson said during a visit to the Chancellery that he assumed the questions had been straightened out, Maassen countered, in writing, that they remained pertinent.

    Maassen says he received a “satisfactory” answer from Emerson about intelligence employees. But that could be because the US government has officially accredited a number of the intelligence workers it has stationed in Germany. SPIEGEL research indicates more than 200 Americans are registered as diplomats in Germany. There are also employees with private firms who are contracted by the NSA but are not officially accredited.

    The list of questions the German government sent to the US Embassy makes it clear that German intelligence badly needs help. “Are there Special Collection Services in Germany?” reads one question. “Do you conduct surveillance in Germany?” And: “Is this reconnaissance targeted against German interests? ” There are many questions, but no answers.

    Ultimately, Maassen will have to explain to the parliamentary investigative committee what he has learned about US spying in Germany and how he intends to fulfill his legally mandated task of preventing espionage. The explanation provided by the BfV thus far — that it is uncertain whether the chancellor was spied on from the US Embassy in Berlin or remotely from the headquarters in Maryland, making it unclear whether German anti-espionage officials should get involved — is certainly an odd one. Germany’s domestic intelligence agency is responsible for every act of espionage targeting the country, no matter where it originates. Cyber-attacks from China are also viewed by the BfV as espionage, even if they are launched from Shanghai.

    The order to monitor the chancellor was issued by the department S2C32, the NSA unit responsible for Europe. In 2009, Merkel was included in a list of 122 heads of state and government being spied on by the NSA. The NSA collects all citations relating to a specific person, including the different ways of referring to them, in a database called “Nymrod.”

    The NSA introduced Nymrod in January 2008 and the entries refer to a kind of register of “intelligence reports from NSA, CIA, and DoD (Department of Defense) databases.” In Merkel’s case, there are more than 300 reports from the year 2009 in which the chancellor is mentioned. The content of these reports is not included in the documents, but according to a Nymrod description from 2008, the database is a collection of “SIGINT-Targets.” SIGINT stands for signals intelligence.

    Collection Sites in Germany

    Is it possible that the German government really knew nothing about all of these NSA activities within Germany? Are they really — as they claimed in August 2013 in response to a query from the center-left Social Democratic Party (SPD) — “unaware of the surveillance stations used by the NSA in Germany”?
    That is difficult to believe, especially given that the NSA has been active in Germany for decades and has cooperated closely with the country’s foreign intelligence agency, the BND, which is overseen by the Chancellery. A top-secret NSA paper from January 2013 notes: “NSA established a relationship with its SIGINT counterpart in Germany, the BND-TA, in 1962, which includes extensive analytical, operational, and technical exchanges.”

    When the cooperation with its junior partner from West Germany began, the NSA was just 10 years old and maintained stations in Augsburg and West Berlin in addition to its European headquarters in Stuttgart-Vaihingen.

    American intelligence agencies, like those of the three other World War II victors, immediately began to monitor Germans within their zones of occupation, as confirmed by internal guidelines relating to the evaluation of reports stemming from the years 1946 to 1967.

    In 1955, the British and French reduced their surveillance of Germans and focused on operations further to the east. The Americans, however, did not and continued to monitor telephone and other transmissions both within Germany and between the country and others in Western Europe. By the mid 1950s, US spies may have been listening in on some 5 million telephone conversations per year in Germany.

    The easternmost NSA surveillance post in Europe during the Cold War was the Field Station Berlin, located on Teufelsberg (Devil’s Mountain) in West Berlin. The hill is made from the rubble left over from World War II — and the agents operating from its top were apparently extremely competent. They won the coveted Travis Trophy, awarded by the NSA each year to the best surveillance post worldwide, four times.

    ‘A Perpetual State of Domination’

    Josef Foschepoth, a German historian, refers to German-American relations as “a perpetual state of domination.” He speaks of a “common law developed over the course of 60 years” allowing for uncontrolled US surveillance in Germany. Just how comprehensive this surveillance was — and remains — can be seen from the so-called SIGAD lists, which are part of the Snowden archive. SIGAD stands for “Signal Intelligence Activity Designator” and refers to intelligence sources that intercept radio or telephone signals. Every US monitoring facility carries a code name made up of letters and numbers.

    Documents indicate that the Americans often opened new SIGAD facilities and closed old ones over the decades, with a total of around 150 prior to the fall of the Wall. The technology used for such surveillance operations has advanced tremendously since then, with modern fiber-optic cables largely supplanting satellite communications. Data has become digital, making the capture of large quantities of it far easier.

    The Snowden documents include a 2007 list that goes all the way back to 1917 and includes the names of many former and still active US military installations as well as other US facilities that are indicated as sites of data collection. It notes that a number of the codes listed are no longer in operation, and a deactivation date is included for at least a dozen. In other instances, the document states that the closing date is either unknown or that the SIGADs in question are still in operation. These latter codes include sites in Frankfurt, Berlin, Bad Aibling and Stuttgart — all places still known to have an active NSA presence.

    Because Americans tended to monitor their targets themselves, Germany’s BND long had little to offer, creating a largely one-sided relationship in which the Germans played the subservient role. Only at the beginning of the last decade did the nature of the cooperation begin to change, partially as a result of the BND’s successful effort to massively upgrade its technical abilities, as an internal NSA document notes approvingly. But the pecking order in the relationship has remained constant.

    The former East Germany appears to have been better informed about the NSA’s spying activities than Berlin currently claims to be. The NSA’s work was known to the Hauptverwaltung Aufklärung (HVA), East Germany’s foreign intelligence agency, a unit of the Ministry for State Security, the secret police more commonly known as the “Stasi.” One internal Stasi document noted of the NSA: “This secret intelligence service of the USA saves all radio signals, conversations, etc., around the globe from friends and foes.”

    At the beginning of 1990, right after the Berlin Wall fell, HVA officers delivered around 40 binders with copies of NSA documents — obtained by two spies — to the Stasi’s central archive. The HVA officers wanted to preserve the highly controversial material for historians and others who might be interested in it.

    Not Enough for the USA

    After US diplomats were informed by the German Federal Prosecutor of the documents’ existence, Washington began applying pressure on the German government to hand over the NSA files. Finally, in July 1992, employees of the German agency responsible for executing the Stasi archive handed “two sealed containers with US documents” over to the German Federal Border Guard, which in turn delivered them to the Interior Ministry. Once in possession of them, the Americans used the files as evidence in the trial against a former NSA employee who had spied for East Germany.

    Apparently the first haul of documents wasn’t enough for the NSA. In 2008, during Merkel’s first term in office, several NSA employees visited the Stasi archives to view all the remaining documents — from the Stasi’s Main Department III, which was responsible for signals intelligence — containing information about US facilities.

    The German Interior Ministry classified and blocked access to most of the material and they are no longer viewable by journalists or researchers. By the time Edward Snowden began publishing the NSA documents last year, only two files pertaining to the NSA remained available for viewing, and both were filled with harmless material. It is unlikely the remaining historical documents will be much help to the federal prosecutors now investigating the NSA.

    But one person who could potentially contribute to clarifying the NSA’s role in Germany was in Munich this week. General Keith Alexander, who recently left his position as NSA chief, spoke at a conference organized by Deutsche Telekom on Monday night. When officials at the Federal Prosecutor’s Office were asked days before his keynote speech whether they would try to question Alexander as a witness, they, responded by saying, “We do not conduct criminal investigative proceedings publicly.”

    It seems Germany’s chief federal investigator may ultimately follow the dictum given by Foschepoth: “The German government is more concerned about keeping the Americans happy than it is about our constitution.”

    By Sven Becker, Hubert Gude, Judith Horchert, Andy Müller-Maguhn, Laura Poitras, Ole Reißmann, Marcel Rosenbach, Jörg Schindler, Fidelius Schmid, Michael Sontheimer and Holger Stark

    Translated from the German by Charles Hawley and Daryl Lindsey

    06/18/2014 04:20 PM
    By SPIEGEL Staff

    Find this story at 18 June 2014

    © SPIEGEL ONLINE 2014

    New leaks show Germany’s collusion with NSA

    Several new Snowden-leaked documents show how closely Germany’s intelligence agencies work with the NSA. But did the German government deliberately soften laws protecting privacy to make life easier for them?

    This week German news magazine Der Spiegel published the largest single set of files leaked by whistleblower and former US National Security Agency contractor Edward Snowden. The roughly 50 documents show the depth of the German intelligence agencies’ collusion with the NSA.
    They suggest that the German Intelligence Agency (BND), the country’s foreign spy agency, and the Office for the Protection of the Constitution (BfV), the German domestic spy agency, worked more closely with the NSA than they have admitted – and more than many observers thought.
    NSA successes
    The documents as published by Der Spiegel offer glimpses, but not a comprehensive view of what is essentially a transatlantic spy alliance. An NSA document from January 2013 shows the spirit of cooperation that existed between the NSA and first the BND and then the BfV, as well as the German Federal Office for Information Security (BSI). The documents also show that the BND has been “eager” for closer ties with the NSA on an analytical and operational level since 1962.
    NSA-Untersuchungsausschuss 05.06.2014 Berlin
    Germany’s parliamentary committee wants to question Snowden
    Among its “success stories,” the documents praise how the German government was able to weaken the public’s protection from surveillance. “The German government has changed its interpretation of the G10 law, which protects German citizens’ communications, to allow the BND to be more flexible with the sharing of protected information with foreign partners.” Germany’s G10 law regulates in what circumstances its intelligence agencies are allowed to break Article 10 of the German constitution, which guarantees the privacy of letters and telecommunications.
    Malte Spitz, member of the German Green party and spokesman for the Federal Association of Media and Internet policy, is always concerned when the NSA celebrates such “successes” in Europe. “The important question is whether the chancellery helped the agencies to get the permissions that made far-reaching surveillance possible by offering an alternative interpretation of the G10 law,” he said.
    Secretive list
    Another document, entitled “JSA Restrictions,” raises further questions. JSA stands for Joint SigInt Activity – in other words, joint technical investigations of the NSA and the BND at a facility in Bad Aibling, Bavaria. Since the BND, as a foreign intelligence agency, is not allowed to spy on German citizens, the document guarantees that domains ending with the German “.de” can’t be investigated. Similarly excluded are all domain endings belonging to the so-called “Five Eyes” countries: Australia, New Zealand, Canada, Britain, and the US.
    But since many German citizens use email addresses with endings like “.net”, “.com” or “.org”, the document includes a list of other Internet addresses that can’t be kept under surveillance either. This list is surprisingly short – comprising just 50 names – and bizarrely random. Apart from domains that might be expected, like bundeswehr.org, mercedes-benz.com, deutsche-bank and siemens.com, the list also contains addresses that seem completely willful: like feuerwehr-ingolstadt.org, (Ingolstadt fire brigade), orgelbau.com (organ manufacturer), and seniorenheim.com (senior citizens’ home).
    “It would be funny if it wasn’t so serious,” says Andre Meister, editor of the Internet rights portal netzpolitik.org. “We don’t have a .de domain – netzpolitik.org – but unfortunately we’re not on the list either. So we have to assume we’re being kept under surveillance.” The same is true of German email services like gmx.net.
    Malte Spitz Bündnis 90/Die Grünen
    Spitz is concerned whenever the NSA boasts of success in Germany
    Spitz can’t make any sense of the list, and he wants answers. Why are some companies on the list and not others? Why are there no email addresses of politicians or journalists on there? Who drew up the list? Was the BND, or even the chancellor’s office, involved?
    Parliamentary committee
    The German parliamentary committee set up to investigate NSA activities in Germany could provide answers to all these questions. It wanted to ask Edward Snowden directly, but he has refused to answer questions in Moscow, where he was granted asylum after the US revoked his passport. The Green party and the socialist Left party want to question him in Berlin, but Chancellor Angela Merkel is unlikely to want to provoke a conflict with the US.
    At the start of June, parliamentarians from Germany’s governing parties, the Christian Democratic Union and the Social Democratic Party had wanted to organize an informal meeting with Snowden in Moscow in early July. His lawyer said on Friday (20.06.2014), however, that this would be impossible. Now the committee has to decide how much it wants Snowden to testify. The ball is in the court of the government parties.

    Date 21.06.2014
    Author Marcus Lütticke / bk
    Editor Nicole Goebel

    Find this story at 21 June 2014

    © 2014 Deutsche Welle

    Snowden-Dokumente; Hier sitzt die NSA in Deutschland

    Nirgendwo in Europa ist die NSA so aktiv wie in Deutschland. Dutzende Dokumente aus dem Archiv von Edward Snowden, die SPIEGEL ONLINE nun veröffentlicht, offenbaren Details der Spionage – und die Kooperation mit den Deutschen.

    Auf einer bayerischen Wiese, unter der hessischen Erde oder mitten in Berlin: Die Spione der NSA sitzen direkt in unserer Nachbarschaft. Das zeigt ein Satz von NSA-Dokumenten, die der SPIEGEL und SPIEGEL ONLINE jetzt veröffentlichen. Die Dokumente stammen aus dem Fundus des Whistleblowers Edward Snowden, sie sind quasi seine Deutschland-Akte.

    Aus diesem Dossier geht hervor: Deutschland ist für den Geheimdienst der wichtigste Standort in Europa. In mehreren Einrichtungen werden Daten zusammengetragen und ausgewertet. Von Deutschland aus abgefangene Daten dienen offenbar auch dazu, Terrorverdächtige zu töten.

    Die Veröffentlichung der Dokumente liegt auch im Interesse der Bundesregierung: Die hat bisher vergeblich bei den amerikanischen Partnern um Aufklärung gebeten – und weiß angeblich bis heute nicht genau, was die NSA in Deutschland treibt. Auch deshalb haben Sicherheitsbehörden und Politiker den SPIEGEL um Einsicht in die Snowden-Dokumente gebeten. Journalisten sind aber vor allem der Aufklärung der Öffentlichkeit verpflichtet – deshalb zeigen wir das Dossier öffentlich. Lediglich Namen, E-Mail-Adressen, Telefonnummern und – in begründeten Einzelfällen – konkrete Spionageziele haben wir in den Dokumenten zum Teil geschwärzt.

    Direkt zu den Dokumenten: Snowdens Deutschland-Akte

    Abkürzungen erklärt: So lesen Sie die NSA-Dokumente

    Hier finden Sie außerdem das Material nach Standorten in Deutschland geordnet. Klicken Sie auf die Flaggen auf der Karte, dahinter verbergen sich eine Beschreibung der jeweiligen NSA-Einrichtung, Fotos und die Originaldokumente.

    Einen Eindruck über die umfassende Überwachung geben auch die sogenannten Sigad-Listen aus dem Snowden-Archiv. Sigad steht für “Signal Intelligence Activity Designator”, bezeichnet also eine Stelle, an der oder von der aus technische Aufklärung betrieben werden kann – die Ergebnisse werden dann unter dieser Sigad an die NSA-Datenbanken weitergeleitet. Eine Liste mit historischen Sigads zeigt, dass es im Laufe der Jahrzehnte insgesamt rund 150 solcher Punkte in Deutschland gegeben hat. Viele sind mittlerweile außer Betrieb, für mindestens ein Dutzend wird kein Schließungsdatum genannt – laut Dokument ist es dann entweder nicht bekannt oder der jeweilige Standort ist noch aktiv. Zur besseren Lesbarkeit der Listen hat der SPIEGEL aus dem Material in diesem Fall ein eigenes Dokument erstellt:

    Der Dokumentenschatz enthält allerdings viel mehr als nur Informationen zu den einzelnen Standorten des amerikanischen Geheimdienstes auf deutschem Boden. Interne Berichte beschreiben etwa die Kooperation der NSA mit den deutschen Diensten und sogar mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI) – das die deutschen Nutzer eigentlich vor Cyber-Bedrohungen von außen schützen sollte.

    Vor allem aber belegt das Deutschland-Dossier die enge Zusammenarbeit zwischen NSA und BND. Nicht nur abgefangene Informationen werden geteilt: Die NSA veranstaltet Lehrgänge, man zeigt sich gegenseitig Spähfähigkeiten und tauscht untereinander Überwachungssoftware aus. So haben die Deutschen das mächtige XKeyscore bekommen, die Amerikaner durften MIRA4 und VERAS ausprobieren.

    Das Argument der Unwissenheit gilt nicht mehr

    Der Datensatz zeigt auch, wie wohlwollend die NSA die Anstrengungen des BND um eine verstärkte Kooperation zur Kenntnis nimmt. In einem Dokument heißt es, die Regierung hätte ihre Interpretation des G-10-Gesetzes angepasst, damit der BND einfacher Daten mit Partnerdiensten tauschen könne. Eigentlich stellt das Gesetz die Kommunikation von Bürgern unter besonderen Schutz. Auch der britische Geheimdienst GCHQ hatte sich damit gebrüstet, bei der Auslegung des restriktiven Gesetzes geholfen zu haben. Die Bundesregierung will davon nichts wissen.

    Ein Jahr nach den ersten Snowden-Enthüllungen steht fest: Die NSA-Affäre ist nicht beendet, die Vorwürfe sind nicht ausgeräumt, wie im August der damalige Kanzleramtsminister Ronald Pofalla und der damalige Innenminister Hans-Peter Friedrich behauptet hatten.

    Sollten Zweifel an der Echtheit der Dokumente bestehen, sollte es Fragen zu ihrer Einordnung geben, könnte Edward Snowden zur Hilfe geholt werden. Wenn die Bundesregierung den Whistleblower endlich nach Deutschland holen würde, damit er vor dem parlamentarischen Untersuchungsausschuss und beim Generalbundesanwalt aussagen kann.

    Lesen Sie mehr zur Aktivität der NSA in Deutschland in der Titelgeschichte des aktuellen SPIEGEL. Die englische Version finden Sie hier.

    18. Juni 2014, 16:18 Uhr
    Von Sven Becker, Hubert Gude, Judith Horchert, Andy Müller-Maguhn, Laura Poitras, Ole Reißmann, Marcel Rosenbach, Jörg Schindler, Fidelius Schmid, Michael Sontheimer und Holger Stark

    Find this story at 18 June 2014

    © SPIEGEL ONLINE 2014

    Spying Together Germany’s Deep Cooperation with the NSA

    Cooperation between Germany’s foreign intelligence service, the BND, and America’s NSA is deeper than previously believed. German agents appear to have crossed into constitutionally questionable territory.

    Three months before Edward Snowden shocked the world with his revelations, members of NSA’s “Special Source Operations department” sat down for a weekly meeting at their headquarters in the US state of Maryland. The group, considered internally to be particularly efficient, has several tasks, one of which is overseeing the intelligence agency’s delicate relationship with large telecommunications firms. It is the department that Snowden referred to as the “crown jewels” of the NSA.

    At this particular meeting, one significant slip-up was on the meeting agenda. On March 14, 2013, an SSO member had reported a potentially damaging incident. “Commercial consortium personnel” had apparently discovered the program “Wharpdrive,” for which SSO had tapped a fiber-optic cable. “Witting partner personnel have removed the evidence,” he explained further, “and a plausible cover story was provided.” According to an internal NSA document to which SPIEGEL has access, a team was quietly put together to to reinstall the program.

    The NSA, apparently, did not perform the highly sensitive operation on its own. All signs indicate that the agency had help from Germany’s Bundesnachrichtendienst (BND), the country’s foreign intelligence agency. The code name Wharpdrive appears in a paper drafted in preparation for a BND delegation’s visit to NSA headquarters in Fort Meade, and which instructs NSA leaders to “thank the BND for their assistance with the trilateral program.” It also makes clear that the German agency plays a leadership role in the Wharpdrive program, with the NSA providing only technical assistance.

    It isn’t clear from the document exactly where the BND and NSA accessed the fiber-optic cable nor is there any indication of the operation’s target. Neither agency responded to questions about Wharpdrive. What appears obvious, however, is that the BND cooperates closely with NSA in one of its most sensitive areas of operation.

    Germany’s collaboration with US intelligence, which Berlin officials agreed to in the wake of the Sept. 11, 2001 terror attacks, is opaque and convoluted: opaque because the German parliament and public are unable to review most of what is delivered to the United States; convoluted because there are questions about its legality.

    Constitutionally Unacceptable

    Leading constitutional law experts have their doubts. In testimony before the NSA investigation committee in the Bundestag, Germany’s parliament, heavyweight constitutional law experts Hans-Jürgen Papier, Wolfgang Hoffmann-Riem and Matthias Bäcker stated that the BND is potentially violating the German constitution by working with data received from the NSA. Furthermore, they argued that basic constitutional rights such as the privacy of correspondence, post and telecommunications apply to Germans abroad and to foreigners in Germany. That would mean that surveillance performed by the BND and NSA is constitutionally unacceptable.

    German intelligence agencies, for their part, consider their cooperation with the NSA to be indispensable — for counter-terrorism efforts, for the fight against the proliferation of weapons of mass destruction and for the battle against organized crime. According to a classified paper created by the government in response to a query from the opposition, the BND does not keep official statistics on the amount of telephone, email and text message metadata that is shuttled to American agencies. “All metadata” collected at the NSA site in Bad Aibling in Bavaria “is made available,” the response states. In 2012 and 2013, some 3 million items of content data, or intercepted conversations and messages, were sent to the United States each month.

    These facts and figures, until now available only to select parliamentarians, offer a window into German-American intelligence cooperation. Documents SPIEGEL has seen from the archive of whistleblower Edward Snowden, when combined with SPIEGEL’s own reporting, open up a much broader panorama.

    They show that the exchange of data, spying tools and know-how is much more intense than previously thought. Given this close partnership, BND statements claiming they knew little about the programs and methods used by the NSA are, at minimum, startling.

    One location in Germany is particularly illustrative of the trans-Atlantic pact. It is located in the Alpine foothills, in the beautiful valley of Mangfalltal. For decades, the NSA maintained its largest listening post in Germany in Bad Aibling, population 18,000. The agency once had up to 1,800 workers stationed here: They frequented Chicken Joe, a bar near the American base, and Johnny’s Bowling. And they cruised through town in American off-road vehicles sporting US license plates.

    The Americans’ affection for the town can be seen in “A Little Bad Aibling Nostalgia,” a document that NSA employees posted on the agency’s intranet. They reminisced wistfully about “free bier” emails and leberkäse, a bologna-like substance “made neither of liver nor cheese.” German locals were fond of the agents, in part because they were reliable tenants. “Two men who specialized in Arabic dialects lived at my place,” recalled jeweler Max Regensburger. “Nice people.” Everyone, from baker to butcher to carpenter, profited from the Americans. When they left the base in 2004, Bad Aibling residents waved American flags in farewell.

    The Tin Can

    But the NSA did not completely abandon Bad Aibling. The BND took over most of the facilities on site, including nine white Radomes, the oversized golf ball-like structures crucial to many surveillance operations. But one small NSA special unit remained active and joined BND agents in the Mangfall Kaserne. The Americans built a specially constructed windowless building with an exterior of black-painted metal.

    BND agents refer to the American complex, which houses the “Special US Liaison Activity Germany,” or SUSLAG, as the “Tin Can.” The unit’s very existence is classified information. But it is clear that the Germans and Americans who work there know each other and value one-another’s presence.

    The official nature of the cooperation between Germany and the US in Bad Aibling is documented in a contract, written two years prior to the NSA’s official departure, drafted under the auspices of then-Chancellery Chief of Staff Frank-Walter Steinmeier, now Germany’s foreign minister. The “Memorandum of Agreement,” signed on April 28, 2002, is six pages long and marked Top Secret. It is not from Snowden’s material.

    Much of the document consists of broad declarations of “good cooperation,” but the important points can be found in the 74-page appendix. There, the two sides agree on joint espionage areas and targets, such as counter-terrorism, and the battles against organized crime and proliferation of weapons of mass destruction.

    Surveillance as such isn’t mentioned, at least initially. The treaty signatories, instead, commit to respecting fundamental rights such as the privacy of correspondence, post and telecommunications and agree not to conduct surveillance on German or American citizens. The deal is valid both for “real” and “legal entities,” meaning it applies to companies and associations as well.

    But even in this memorandum, the crux is in the small print — the addenda and exceptions. In the case of “terrorist activity,” the taboos mentioned earlier no longer apply. Should it become clear that intercepted information originated from a German citizen, it can still be used as long as the partner agency is informed and agrees. The same is true in cases where the end point of monitored communications is located in a foreign country.

    ‘Exciting Joint Ventures’

    According to the German constitution, the BND is not allowed to perform surveillance on German citizens. But does the memorandum’s small print open up a back door? Does the NSA provide information about radicals that the German intelligence agency is not permitted to have access to?

    The BND denies the existence of such channels and says, “At no time has there been a deviation from the legal framework.”

    It seems doubtful that the Germans know exactly what their NSA colleagues are doing in Bad Aibling. According to the agreement, the NSA is allowed to carry out its own surveillance operations and only has to allow the German partners to look at its task assignments and operational details if asked.

    In any case, internal documents indicate that the NSA is pleased with the Bad Aibling facility. “Two exciting joint ventures” are carried out there. One involves teams for working on joint surveillance (referred to as “Joint SIGINT Activity”) and the other for the analysis of captured signals (Joint Analysis Center or JAC). Snowden’s documents hint at what precisely the trans-Atlantic allies were collaborating on. In 2005, for example, five NSA employees worked “side-by-side” with BND analysts on a BND operation called Orion. Its targets lay outside NATO’s eastern border.

    According to the documents, most of the targets monitored jointly by the BND and NSA are in Africa and Afghanistan. One document, though, reveals something else. Stemming from 2009, it includes a list of companies and organizations with domain endings such as .com, .net and .org that are explicitly to be removed from the surveillance efforts because they are German web addresses. Among them are basf.com and bundeswehr.org, but also such domains as orgelbau.com and feuerwehr-ingolstadt.org.

    German Aid for US Drone Attacks?

    The list includes addresses that appear to have fallen into the surveillance crosshairs and were only later revealed to be German. This indicates that the filtering system the BND reportedly uses does not reliably prevent German targets with .com and .org domain names from being monitored, and that those names must be removed retroactively.
    In response to questioning about the close cooperation in Bad Aibling, the BND said that the Joint SIGINT Activity and the Joint Analytical Center were discontinued “in 2012 and 2011, respectively.” In addition, the BND noted in a statement, no joint surveillance took place prior to the facility’s discontinuation: “Even before, signals intelligence was performed exclusively by the BND.”

    The NSA documents, though, tell a different tale, for example in a document pertaining to the one-year anniversary of the Tin Can. In reference to the JSA, the document notes that the cooperation is “unique as a jointly manned, jointly tasked DNI site,” with DNI referring to Digital Network Intelligence. An American document referring to levels of secrecy from 2005 notes that “the fact that NSA and BND … perform SIGINT collection at Mangfall Kaserne” must remain confidential.

    Bad Aibling also plays a central role in the question of whether the NSA is collecting data in Germany. A map from the spy program Boundless Informant, published by SPIEGEL in the summer of 2013, indicates that the NSA collects vast amounts of data in Germany and points to primary metadata collection points (or “SIGADS”), identified by the codes US-987LA and US-987LB.

    The document shows that these two SIGADS sent some 500 million points of metadata from Germany to NSA databases during a four-week period from the end of 2012 to the beginning of 2013. One document, which explains the program, says that data is collected “against” a target country.

    The NSA has never explicitly commented on the two collection sites, but according to the BND, there is an explanation that refutes the accusation that the US spied on Germany. The BND believes “that the SIGADs US 987-LA and US 987-LB refer to Bad Aibling and to a signals intelligence site in Afghanistan.” That would mean, the BND says, that the 500 million data points might have been collected by the BND outside of Germany and then transferred to the NSA. Still, the German intelligence agency noted that it couldn’t say for sure whether that would account for all of the data listed by the NSA.

    Should the BND’s explanation be correct, it would mean that the formulation used by “Boundless Informant” — and SPIEGEL’s own interpretation — were misleading. But it would also provide yet more evidence for the enormous exchange of information between Germany and the NSA.

    In the Wharpdrive program, BND specialists are taking the lead. According to one document from the Snowden archive, Germany’s cooperation with the NSA’s Special Source Operations is meant to provide “unconventional special access” to fiber-optic cables.

    ‘High Interest Target Areas’

    In that same document, the Americans express their respect, praising the Germans for operations undertaken “under risky conditions” and noted that the BND “offered NSA unique accesses in high interest target areas.”

    A 2006 document verifies that the BND and the NSA not only work closely together, but that they are also often on equal technological footing. At the time, US intelligence workers visited a BND office in the town of Schöningen, Lower Saxony. The office is just a few kilometers away from the city center’s half-timbered houses. The site’s location near the former border with East Germany used to help the BND eavesdrop on its communist neighbors.

    As Germany got consumed by hosting the World Cup in the summer of 2006, BND analysts gave presentations to their American colleagues about which electronic tools they used. The equipment, the Americans noted in meeting minutes, were sometimes more effective than the NSA’s own.

    As far back as 2006, the BND was working in Schöningen on algorithms that could detect patterns or anomalies and thus enable it to exploit social networks for intelligence purposes. With a subject line on meeting notes reading “Visitors impressed with software demos,” the Americans expressed high regard for their German colleagues. They also praised the intercepts from Afghanistan that the “BND shares on a daily basis.”

    Indeed, NSA staff seemed to be pleased with much of what the BND does in Afghanistan. There is no other issue in Snowden’s documents that is the subject of as much praise for the BND, the role it plays and what it shares. There are numerous instances in which the agency lauds the Germans for leadership and for the monitoring of additional civilian and military targets that they have taken on.

    A presentation on the cooperation among 14 intelligence services in Afghanistan shows that the partners have the ability to exchange intelligence in “near real time,” including the contents of encrypted mobile phone conversations and so-called “target packages” containing information on targets.

    Difficult Questions

    When SPIEGEL reported last summer on the sharing of target information, the BND did not deny this activity. But it did challenge the conjecture that the data might serve as the basis for American drone attacks. The situation remains a complicated one: It’s not possible to target a drone attack based on a mobile phone number’s having accessed a cell phone base station, but drones can be turned into flying mobile phone base stations by equipping them with what are known as IMSI catchers — phones then automatically connect to an IMSI catcher when the drone flies overhead. This also means that metadata supplied through BND surveillance could very well contribute to guiding the deadly drones to their targets. Indeed, the former head of NSA and CIA Michael Hayden recently confirmed, “We kill people based on metadata.”

    New documents also indicate the high significance of German surveillance to the US military in Afghanistan. Germany and 13 of its allies deliver intelligence to a unit on the American military base in Bagram. This is home to the NSA’s “Cryptologic Services Group,” a unit that feeds intelligence to controversial units like the secret Task Force 373, who had the mission of capturing or killing high-value Taliban or al-Qaida targets.

    These connections between the BND and NSA raise difficult questions about the German government and its foreign intelligence service, such as whether Germany participated indirectly in death squad operations, which can result in the deaths of civilians or police.

    The government has declined to comment on such questions. So far, there have merely been general statements, like the one made most recently by German Interior Minister Thomas de Maizière at an event in Berlin. He described the United States as Germany’s most important ally and said, “If it were up to us, we would continue it in absolute terms and even intensify it.”

    There is substantial evidence in Snowden’s documents that German authorities are trying to do just that. In April 2013, a BND delegation led by an official named Dietmar B. visited the NSA. The BND “is eager to present its SIGINT capabilities … with the goal of expanding the partnership,” an NSA document notes. The document says that officials welcome “the BND’s eagerness to strengthen and expand cooperation with NSA.”

    Smooth Sailing

    Other documents state that the BND offers “language assistance” in African languages. It is also clear that the BND shares the results of its monitoring of two foreign ministries as well as Internet telephony originating from a crisis-plagued country in the Middle East.

    These days, tensions between the upper echelons of government in Germany and the United States are at their highest in years, but these documents suggest a smooth relationship between the eager BND and the covetous NSA.

    There was only one point on which the United States expressed reserve: A request by the Germans to use information from NSA surveillance in “open court.” The document, from April 2013, said there were concerns that the disclosure of surveillance capabilities in a German court could have ramifications and that the “desired and planned level of cooperation” could not be maintained.

    In this instance, Germany’s adherence to its own constitution seems bothersome to the Americans.

    By Hubert Gude, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Jörg Schindler and Fidelius Schmid

    Translated from the German by Charles Hawley and Daryl Lindsey

    06/18/2014 04:20 PM
    By SPIEGEL Staff

    Find this story at 18 June 2014

    © SPIEGEL ONLINE 2014

    Verfassungsschutz weitet Zusammenarbeit mit US-Geheimdiensten aus

    Trotz der Snowden-Affäre intensiviert der deutsche Verfassungsschutz laut Recherchen von SZ, NDR und WDR die Zusammenarbeit mit US-Nachrichtendiensten wie CIA und NSA. Die Zahl der an die Amerikaner übermittelten Datensätze hat sich in den vergangenen Jahren demnach verfünffacht.

    Der Verfassungsschutz hat seine Zusammenarbeit mit amerikanischen Geheimdiensten in den vergangenen Jahren ausgebaut – und sich dabei offenbar auch von den Snowden-Enthüllungen nicht bremsen lassen. Wie aus geheimen Regierungsdokumenten hervorgeht, die SZ, WDR und NDR einsehen konnten, ist die Zahl der Datensätze, die der Verfassungsschutz an US-Dienste übermittelt hat, erheblich gestiegen. Im Jahr 2013 schickte der Verfassungsschutz 1163 Datensätze an die Amerikaner. Allein in den ersten drei Monaten dieses Jahres waren es bereits etwa 400. In den vergangenen vier Jahren hat sich die Zahl damit fast verfünffacht. Bei den übermittelten Daten soll es sich unter anderem um Handynummern, Reisebewegungen und Aufenthaltsorte verdächtiger Personen handeln.

    Das Pikante daran: Der Verfassungsschutz ist Deutschlands Inlandsgeheimdienst, er arbeitet also nur auf deutschem Boden. Es liegt also nahe, dass der Dienst in Deutschland erhobene Daten an die Amerikaner weitergibt. Das Ganze ist Teil eines großen Tauschgeschäfts unter “befreundeten Diensten”: Deutschlands In- und Auslandsgeheimdienste, also der Verfassungsschutz sowie der Bundesnachrichtendienst, leiten Daten an die Amerikaner weiter und bekommen im Gegenzug dann Informationen von CIA, NSA und Co. Der Verfassungsschutz erklärte auf Anfrage, mit US-Nachrichtendiensten zusammenzuarbeiten. Man halte sich dabei strikt an die gesetzlichen Aufgaben und Befugnisse.

    Nach Informationen von SZ, NDR und WDR übermittelte der Inlandsgeheimdienst zuletzt Informationen an die Nachrichtendienste des US-Heeres und der Luftwaffe sowie an die Bundespolizei FBI. Die meisten Daten gingen aber an die CIA und das Joint Issues Staff, womit die CIA-Dependencen im Ausland gemeint sind. Im Falle Deutschlands wären das vor allem die Stützpunkte in der Berliner Botschaft und dem Generalkonsulat in Frankfurt. Dort sitzt auch der Special Collection Service: jene Spezialeinheit von CIA und NSA, die das Handy von Angela Merkel ausgespäht haben soll.

    Fokus auf Spione aus China und Russland
    Mit den Ausspähungen der Amerikaner beschäftigt sich derzeit ein Untersuchungsausschuss, zudem ermittelt der Generalbundesanwalt. Diese ausländische Spionage in Deutschland zu verhindern, ist eigentlich Aufgabe des Verfassungsschutzes. Der blickt aber fast ausschließlich auf die Spione von Staaten wie China und Russland. Es existiert zwar ein Plan, künftig auch das Treiben der Briten und Amerikaner besser im Auge zu behalten, er wurde vor einigen Monaten auch im Bundeskanzleramt vorgestellt. Bislang ist dem Vernehmen nach aber noch keine Entscheidung gefallen.

    Es ist derzeit nicht zu erwarten, dass die Regierung dem Plan zustimmt. Er würde die Verfassungsschützer vor eine schwierige Aufgabe stellen: Sie müssten Dienste beobachten, auf deren Informationen sie angewiesen sind. Allein der Inlandsgeheimdienst bekommt jedes Jahr mehr als 1000 Datensätze von den Amerikanern, beim Bundesnachrichtendienst sind es sogar etwa 100 000 Datensätze. Außerdem nutzt der BND die NSA-Spionagesoftware XKeyscore. Der Verfassungsschutz besitzt eine Testversion des Programms.

    11. Juni 2014 18:21 Spionage
    Von John Goetz und Frederik Obermaier

    Find this story at 11 June 2014

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    BND übermittelt afghanische Funkzellendaten an NSA (2013)

    Die Daten können Experten zufolge Hinweise für gezielte Tötungen liefern: Nach SPIEGEL-Informationen stammt ein beträchtlicher Teil der an die NSA übertragenen Daten aus der Funkzellenauswertung in Afghanistan. Der BND wiegelt ab.

    Hamburg – Der Bundesnachrichtendienst (BND) übermittelt nach SPIEGEL-Informationen afghanische Funkzellendaten an den US-Geheimdienst NSA. Spionageprogramme wie XKeyscore erstellen daraus Bewegungsprofile. Sie zeigen mit nur wenigen Minuten Verzögerung an, wo sich Handy-Nutzer aufhalten – und spielten womöglich eine wichtige Rolle bei der gezielten Tötung von Qaida-Kämpfern durch US-Drohnen.

    Der BND erklärte, Mobilfunkdaten seien für eine zielgenaue Lokalisierung eines Menschen nicht geeignet. Experten gehen aber davon aus, dass Funkzellendaten Hinweise für gezielte Tötungen liefern können. Auch die “Süddeutsche Zeitung” hatte am Samstag einen Experten zitiert, wonach die Daten des BND zur Ortung nützlich seien.

    Der Bürgerrechtler Burkhard Hirsch (FDP) hält den Datentransfer, der offenbar jenseits der parlamentarischen Kontrolle stattfindet, für sehr problematisch. “Wenn der BND in solchem Umfang für einen anderen Geheimdienst tätig wird, dann ist das ein politischer Vorgang, der unter allen Umständen im zuständigen Bundestagsgremium hätte behandelt werden müssen”, sagte Hirsch dem SPIEGEL.

    BND-Präsident Gerhard Schindler sagte der “Bild am Sonntag”, die Kooperation mit der NSA diene “auch dem unmittelbaren Schutz unserer in Afghanistan eingesetzten Soldatinnen und Soldaten”. Die durch die Fernmeldeaufklärung gewonnenen Erkenntnisse trügen dazu bei, Anschlagsplanungen von Terroristen rechtzeitig erkennen zu können. Dies gehöre zu den “prioritären Aufgaben” eines Auslandsnachrichtendiensts.

    Gegenüber dem SPIEGEL erklärte der BND, er habe seit Januar 2011 “maßgebliche Hilfe” bei der Verhinderung von vier Anschlägen auf deutsche Soldaten in Afghanistan geleistet. Bei weiteren 15 verhinderten Anschlägen habe die Datenüberwachung “zu diesen Erfolgen beigetragen”.

    11. August 2013, 14:12 Uhr

    Find this story at 11 August 2013

    © SPIEGEL ONLINE 2013

    GCHQ and European spy agencies worked together on mass surveillance (2013)

    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies BND NSA GCHQ DGSE

    The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain’s GCHQ eavesdropping agency.

    The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden.

    The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies.

    The German, French and Spanish governments have reacted angrily to reports based on National Security Agency (NSA) files leaked by Snowden since June, revealing the interception of communications by tens of millions of their citizens each month. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US.

    The US director of national intelligence, James Clapper, suggested to Congress on Tuesday that European governments’ professed outrage at the reports was at least partly hypocritical. “Some of this reminds me of the classic movie Casablanca: ‘My God, there’s gambling going on here,’ ” he said.

    Sweden, which passed a law in 2008 allowing its intelligence agency to monitor cross-border email and phone communications without a court order, has been relatively muted in its response.

    The German government, however, has expressed disbelief and fury at the revelations from the Snowden documents, including the fact that the NSA monitored Angela Merkel’s mobile phone calls.

    After the Guardian revealed the existence of GCHQ’s Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance, the German justice minister, Sabine Leutheusser-Schnarrenberger, said it sounded “like a Hollywood nightmare”, and warned the UK government that free and democratic societies could not flourish when states shielded their actions in “a veil of secrecy”.

    ‘Huge potential’

    However, in a country-by-country survey of its European partners, GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing. The survey in 2008, when Tempora was being tested, said the Federal Intelligence Service (BND), had “huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps”.

    Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them. Four years after that report, GCHQ was still only able to monitor 10 Gbps cables, but looked forward to tap new 100 Gbps bearers eventually. Hence the admiration for the BND.

    The document also makes clear that British intelligence agencies were helping their German counterparts change or bypass laws that restricted their ability to use their advanced surveillance technology. “We have been assisting the BND (along with SIS [Secret Intelligence Service] and Security Service) in making the case for reform or reinterpretation of the very restrictive interception legislation in Germany,” it says.

    The country-by-country survey, which in places reads somewhat like a school report, also hands out high marks to the GCHQ’s French partner, the General Directorate for External Security (DGSE). But in this case it is suggested that the DGSE’s comparative advantage is its relationship with an unnamed telecommunications company, a relationship GCHQ hoped to leverage for its own operations.

    “DGSE are a highly motivated, technically competent partner, who have shown great willingness to engage on IP [internet protocol] issues, and to work with GCHQ on a “cooperate and share” basis.”

    Noting that the Cheltenham-based electronic intelligence agency had trained DGSE technicians on “multi-disciplinary internet operations”, the document says: “We have made contact with the DGSE’s main industry partner, who has some innovative approaches to some internet challenges, raising the potential for GCHQ to make use of this company in the protocol development arena.”

    GCHQ went on to host a major conference with its French partner on joint internet-monitoring initiatives in March 2009 and four months later reported on shared efforts on what had become by then GCHQ’s biggest challenge – continuing to carry out bulk surveillance, despite the spread of commercial online encryption, by breaking that encryption.

    “Very friendly crypt meeting with DGSE in July,” British officials reported. The French were “clearly very keen to provide presentations on their work which included cipher detection in high-speed bearers. [GCHQ’s] challenge is to ensure that we have enough UK capability to support a longer term crypt relationship.”

    Fresh opportunities

    In the case of the Spanish intelligence agency, the National Intelligence Centre (CNI), the key to mass internet surveillance, at least back in 2008, was the Spaniards’ ties to a British telecommunications company (again unnamed. Corporate relations are among the most strictly guarded secrets in the intelligence community). That was giving them “fresh opportunities and uncovering some surprising results.

    “GCHQ has not yet engaged with CNI formally on IP exploitation, but the CNI have been making great strides through their relationship with a UK commercial partner. GCHQ and the commercial partner have been able to coordinate their approach. The commercial partner has provided the CNI some equipment whilst keeping us informed, enabling us to invite the CNI across for IP-focused discussions this autumn,” the report said. It concluded that GCHQ “have found a very capable counterpart in CNI, particularly in the field of Covert Internet Ops”.

    GCHQ was clearly delighted in 2008 when the Swedish parliament passed a bitterly contested law allowing the country’s National Defence Radio Establishment (FRA) to conduct Tempora-like operations on fibre optic cables. The British agency also claimed some credit for the success.

    “FRA have obtained a … probe to use as a test-bed and we expect them to make rapid progress in IP exploitation following the law change,” the country assessment said. “GCHQ has already provided a lot of advice and guidance on these issues and we are standing by to assist the FRA further once they have developed a plan for taking the work forwards.”

    The following year, GCHQ held a conference with its Swedish counterpart “for discussions on the implications of the new legislation being rolled out” and hailed as “a success in Sweden” the news that FRA “have finally found a pragmatic solution to enable release of intelligence to SAEPO [the internal Swedish security service.]”

    GCHQ also maintains strong relations with the two main Dutch intelligence agencies, the external MIVD and the internal security service, the AIVD.

    “Both agencies are small, by UK standards, but are technically competent and highly motivated,” British officials reported. Once again, GCHQ was on hand in 2008 for help in dealing with legal constraints. “The AIVD have just completed a review of how they intend to tackle the challenges posed by the internet – GCHQ has provided input and advice to this report,” the country assessment said.

    “The Dutch have some legislative issues that they need to work through before their legal environment would allow them to operate in the way that GCHQ does. We are providing legal advice on how we have tackled some of these issues to Dutch lawyers.”

    European allies

    In the score-card of European allies, it appears to be the Italians who come off the worse. GCHQ expresses frustration with the internal friction between Italian agencies and the legal limits on their activities.

    “GCHQ has had some CT [counter-terrorism] and internet-focused discussions with both the foreign intelligence agency (AISE) and the security service (AISI), but has found the Italian intelligence community to be fractured and unable/unwilling to cooperate with one another,” the report said.

    A follow-up bulletin six months later noted that GCHQ was “awaiting a response from AISI on a recent proposal for cooperation – the Italians had seemed keen, but legal obstacles may have been hindering their ability to commit.”

    It is clear from the Snowden documents that GCHQ has become Europe’s intelligence hub in the internet age, and not just because of its success in creating a legally permissive environment for its operations. Britain’s location as the European gateway for many transatlantic cables, and its privileged relationship with the NSA has made GCHQ an essential partner for European agencies. The documents show British officials frequently lobbying the NSA on sharing of data with the Europeans and haggling over its security classification so it can be more widely disseminated. In the intelligence world, far more than it managed in diplomacy, Britain has made itself an indispensable bridge between America and Europe’s spies.

    Julian Borger
    The Guardian, Friday 1 November 2013 17.02 GMT

    Find this story at 1 November 2013

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Berlin Denies Military Knew About Prism (2013)

    A media report on Wednesday alleged that a NATO document proves the German military knew about the NSA’s Prism surveillance program in 2011. But both Berlin and the country’s foreign intelligence agency deny the account, saying there was a NATO program with the same name in Afghanistan.

    The German government has so far claimed that it knew nothing of the United States’ Prism spying program, revealed by whistleblower Edward Snowden last month. But parts of a confidential NATO document published by daily Bild on Wednesday show that the German military, the Bundeswehr, may have already been aware of the National Security Agency’s operations in 2011, the paper alleged.

    The document, reportedly sent on Sept. 1, 2011 to all regional commands by the joint NATO headquarters in Afghanistan, gives specific instructions for working together on a program called Prism, which the paper said was the same as that run by the NSA. According to Bild, the document was also sent to the regional command in northern Afghanistan, for which Germany was responsible at the time under General Major Markus Kneip.

    Should the media report be confirmed, Berlin’s claims of ignorance will prove to have been false. But on Wednesday afternoon, Chancellor Angela Merkel’s spokesman Steffen Seibert denied the Bild story, saying that the document referred to a separate program that had been run by NATO troops, and not the US. The programs were “not identical,” he said.

    The BND, Germany’s foreign intelligence agency, also weighed in with a statement, saying that the program had not been confidential and was also not the same as the NSA’s Prism operation. “The program called Prism by the Bild report today is a NATO/ISAF program that is not identical to the NSA’s program,” it said. “The BND had no knowledge of the name, range or scope of the NSA program.”

    A Separate Prism Program?

    According to the document cited by Bild, as of Sept. 15 that year, regional commands were instructed to apply for monitoring telephone calls and e-mails, according to the document, in which Prism is named at least three times. “Existing COMINT (communications intelligence) nominations submitted outside of PRISM must be resubmitted into PRISM IOT,” it reads.

    It also states that access to the Prism program is regulated by the Joint Worldwide Intelligence Communications System (JWICS), which is used by various US intelligence services to transmit classified information.

    “Coalition RCs (regional commands) will utilize the US military or civilian personnel assigned to their collection management shop ISRLO (Intelligence, Surveillance and Reconnaissance Liaison Officer),” it goes on. In Bild’s assessment, “military or civilian personnel” stands for US intelligence service staff.

    Keeping Track of Terrorists

    The purpose of all this was to “submit the telephone numbers and email addresses of terrorists into the surveillance system,” the paper reports.

    It also claims to have seen documents indicating that the BND, Germany’s foreign intelligence agency, provided such telephone numbers to NATO, where they were ultimately fed into the surveillance system as well.

    The reason for the NATO order was that the NSA’s director had tasked the US military with coordinating surveillance in Afghanistan, Bild reported.

    The German Defense Ministry told the paper that it had “no information and knowledge of such an order,” but would be looking into the matter.

    In response to the report, Green party parliamentarian and defense spokesman Omid Nouripour told SPIEGEL ONLINE that Defense Minister Thomas de Maizière must clarify the situation. “These circumstances destroy the government’s line of defense” on the NSA scandal, he said. Chancellor Angela Merkel’s center-right coalition can “no longer claim it didn’t know anything about Prism.”

    As more details emerge about the scope of the NSA’s worldwide spying program and Germany’s alleged role in the surveillance, the scandal is becoming a central issue in the country’s campaign for the upcoming general election. Germans are particularly sensitive about data protection because of their history of state encroachment on civil liberties, first under the Nazis and then in communist East Germany. And if it turns out that Berlin knowingly tolerated and participated in the NSA activities, many would see it as a betrayal by the government.

    07/17/2013 12:29 PM

    Find this story at 17 July 2013

    © SPIEGEL ONLINE 2013

    „Prism ist nur die Spitze des Eisbergs“ NSA-Mitarbeiter: BND nutzt seit den 90ern Spähsoftware (2013)

    Eine Kuppel der ehemaligen Abhörstation der NSA auf dem Teufelsberg in Berlin

    Der BND und der US-Geheimdienst NSA arbeiten offenbar bereits 20 Jahre bei der Datenspionage zusammen. Einem Medienbericht zufolge wurden entsprechende Spähprogramme schon früher geteilt. Auch Kanzlerin Merkel könnte ausspioniert worden sein.
    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 1990er-Jahren intensiver als bislang bekannt. In einem Gespräch mit dem Magazin „Stern“ sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben „Xkeyscore“ noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 1990er-Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm „Thin Thread“ erhalten. „Thin Thread“ sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. „Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen“, sagte Binney dem „Stern“. Der BND sei „bis heute einer unserer wichtigsten Partner“.

    Mindestens 50 Spähprogramm lieferten Daten
    Auf der Basis von „Thin Thread“ sei eine Vielzahl von Abhör- und Spähprogrammen entwickelt worden. Eines der wichtigsten davon soll das Dachprogramm „Stellar Wind“ sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software „Prism“ zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen.

    „Stellar Wind“ sei mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz gewesen. Es werde heute wahrscheinlich unter anderem Namen fortgeführt, so Binney gegenüber dem Magazin.

    Nach Schätzungen von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zurzeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten „mindestens 100 Jahre der globalen Kommunikation speichern“, sagte Binney dem „Stern“. „Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.“ Er fügte hinzu: „Diese Macht gefährdet unsere Demokratie.“

    Regierungskommunikation im Visier der NSA
    Neben William Binney äußerten sich im „Stern“ zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. „Prism ist nur die Spitze des Eisbergs“, so Drake gegenüber dem „Stern“. „Ihre Kanzlerin könnte sich einmal für das Programm „Ragtime“ interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA“. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen. „Ich würde sogar sagen, dass es durchaus möglich ist“, sagte er dem Magazin.

    Mittwoch, 24.07.2013, 16:59

    Find this story at 24 July 2013

    © FOCUS Online 1996-2013

    For Western Allies, a Long History of Swapping Intelligence

    BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.

    In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.

    The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.

    “The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”

    Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.

    Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.

    President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.

    There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.

    Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.

    Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.

    When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”

    But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.

    “Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.

    In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.

    The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.

    In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.

    By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.

    “Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”

    Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.

    July 9, 2013
    By MELISSA EDDY

    Find this story at 9 July 2013

    © 2013 The New York Times Company

    NSA-Verbindung bringt deutsche Dienste in Erklärungsnot (2013)

    Der deutsche Geheimdienst wusste mehr über die Umtriebe der NSA in Deutschland als bisher bekannt. “Die stecken unter einer Decke”, sagt Edward Snowden in einem Interview im SPIEGEL. Auch gegen die Briten erhebt der Whistleblower Vorwürfe.

    Seit Wochen hält Edward Snowden die Geheimdienstwelt mit immer neuen Enthüllungen in Atem. Ob die amerikanische NSA oder die GCHQ aus Großbritannien, Systeme wie Prism oder Tempora: Der Whistleblower lässt wohldosiert Skandalöses über die internationalen Schnüffeldienste durchsickern. In einem Interview, das der SPIEGEL in seiner neuen Ausgabe veröffentlicht, beschreibt Snowden die Nähe zwischen US- und deutschem Geheimdienst – und die Datensammelwut der britischen Spione.

    In Deutschland hatten die Berichte über die umfangreichen Spionage-Tätigkeiten der USA für Überraschung und Entsetzen gesorgt – auch unter Politkern. Die Version von der vollkommenen Unwissenheit der Deutschen will Snowden so nicht gelten lassen. Im Gegenteil: Die NSA-Leute steckten “unter einer Decke mit den Deutschen”, erklärte der Whistleblower dem amerikanischen Chiffrier-Experten Jacob Appelbaum und der Dokumentarfilmerin Laura Poitras mit Hilfe verschlüsselter E-Mails, kurz bevor er weltweit bekannt wurde.

    Snowden beschreibt die Zusammenarbeit der Geheimdienste detailliert. In der NSA gebe es für solche Kooperationen mit anderen Ländern eine eigene Abteilung, das sogenannte Foreign Affairs Directorate. Dabei enthüllt er ein bemerkenswertes Detail zum Schutz von Entscheidungsträgern: Die Zusammenarbeit werde so organisiert, dass Behörden anderer Länder “ihr politisches Führungspersonal vor dem ‘Backlash’ schützen” können, falls herauskommen sollte, wie “massiv die Privatsphäre von Menschen missachtet wird”, sagt der US-Amerikaner.

    Nach SPIEGEL-Recherchen ist die Zusammenarbeit zwischen der NSA und dem Bundesnachrichtendienst (BND) offenbar tatsächlich deutlich intensiver als bislang bekannt. So lieferte die NSA die Analyse-Tools für den Lauschangriff des BND auf ausländische Datenströme, die durch Deutschland führen. Im Fokus des BND steht unter anderem die Nahost-Strecke, über die Datenpakete etwa aus Krisenregionen verlaufen.

    BND-Chef Gerhard Schindler hat den Mitgliedern des Parlamentarischen Kontrollgremiums die Zusammenarbeit mit der NSA bestätigt. (Mehr zum Thema finden Sie hier)

    Doch nicht nur die Umtriebe des BND stehen im Fokus des Gesprächs mit Snowden. Auch über den britischen Geheimdienst Government Communications Headquarters (GCHQ) gibt der 30-Jährige weitere neue Details preis. So läuft in Großbritannien ein Versuch der Komplettdatenspeicherung. Das Tempora-System der Briten sei “der erste ‘ich speichere alles’-Ansatz (‘full take’) in der Geheimdienstwelt”, sagt Snowden.

    Daten bleiben drei Tage im Pufferspeicher

    Der Umfang dieses “Full Take”-Systems ist gewaltig. Im Rahmen von Tempora werden dem Whistleblower und dem “Guardian” zufolge Verbindungsdaten bis zu 30 Tage, aber auch alle Inhalte bis zu drei Tage lang gespeichert, in einem sogenannten Pufferspeicher. “Dieser Zwischenspeicher macht nachträgliche Überwachung möglich, ihm entgeht kein einziges Bit”.

    Auf Rückfrage, ob man dieser Totalerfassung aller Internetkommunikation entgehen könne, antwortet er: “Na ja, wenn man die Wahl hat, sollte man niemals Informationen durch britische Leitungen oder über britische Server schicken.”

    Entgehen könne man dem Zugriff durch die GCHQ nur, wenn man keine Informationen über britische Leitungen oder britische Server schicke, so Snowden. Deutsche Internet-Experten halten dies in der Praxis allerdings für kaum durchführbar.

    Metadaten liefern Orientierung im Datenmeer

    Der Versuch der Komplettdatenspeicherung ist bemerkenswert, war doch bisher im Zusammenhang mit den Abhörskandalen meist von Metadaten die Rede. Auch Snowden betont in der aktuellen Ausgabe des SPIEGEL noch einmal wie wichtig die Metadaten – etwa Telefonnummern, IP-Adressen und Verbindungszeiten – eigentlich sind. Und wie sie genutzt werden. Die Metadaten seien meist “wertvoller als der Inhalt der Kommunikation”, sagt Snowden.

    Wer die Metadaten hat, weiß, wer wann mit wem kommuniziert hat. Auf dieser Basis lässt sich dann entscheiden, welche Datensätze, welche Kommunikationsinhalte man sich genauer ansehen möchte. “Die Metadaten sagen einem, was man vom breiten Datenstrom tatsächlich haben will”, so Snowden im SPIEGEL.

    So wird nach und nach klar, wie die Überwachungsprogramme von NSA und GCHQ, Prism, Tempora und Boundless Informant zusammenwirken:

    Die Metadaten-Abfrage gibt Analysten Hinweise, für welche Kommunikationen und Inhalte sie sich vielleicht interessieren könnten, dann, sagt Snowden sinngemäß, lässt sich per Knopfdruck festlegen, dass von einer Person oder einer Gruppe alle verfügbaren Inhalte im Volltext mitgeschnitten oder anderweitig erfasst werden. Zum Zielobjekt könne man aber auch “aufgrund des eigenen Facebook-Profils oder der eigenen E-Mails” werden.

    07. Juli 2013, 19:31 Uhr

    Find this story at 7 July 2013

    © SPIEGEL ONLINE 2013

    Snowden: NSA is ‘in bed with the Germans’ (2013)

    Germany, Hacking, Politics, Snowden, Terrorism, USA
    US fugitive Edward Snowden has accused Germany and the US of partnering in spy intelligence operations, revealing that cooperation between the countries is closer than German indignation would indicate, Der Spiegel magazine reported.

    “They are in bed with the Germans, just like with most other Western states,” the German magazine quotes Snowden as saying, adding that the NSA’s has a Foreign Affairs Directorate which is responsible for cooperation with other countries.

    Partnerships are orchestrated in ways that allow other countries to “insulate their political leaders from the backlash,” according to Snowden, providing a buffer between politicians and the illegal methods of snooping. He accused the collaboration of grievously “violating global privacy.”

    “Other agencies don’t ask us where we got the information from and we don’t ask them. That way they can protect their top politicians from the backlash in case it emerges how massively people’s privacy is abused worldwide,” he said.

    Snowden gave the interview to a cipher expert and a documentary filmmaker with the help of encrypted emails shortly before he rose to global fame, Der Spiegel reported.

    The publication recollected that the US Army is simultaneously in the process of building a base in Wiesbaden, southwest Germany, claiming it will be used as an intelligence center by the NSA.

    The four-story bug-proof spying center is made from imported American materials and costs $119 million. Its construction will allow for the closure of over 40 existing sites across in Heidelberg, Mannheim and Darmstadt, US Army Garrison Wiesbaden spokeswoman Anemone Rueger told Stars and Stripes.

    The Der Spiegel report also indicates that the German Federal Intelligence Service, the Bundesnachrichtendienst (BND) and NSA work very closely together.

    It was revealed at the end of June that the US combs through half a billion of German phone calls, emails and text messages on a monthly basis.

    A kite flies near antennas of Former National Security Agency (NSA) listening station at the Teufelsberg hill (German for Devil’s Mountain) in Berlin, June 30, 2013 (Reuters / Pawel Kopczynski)A kite flies near antennas of Former National Security Agency (NSA) listening station at the Teufelsberg hill (German for Devil’s Mountain) in Berlin, June 30, 2013 (Reuters / Pawel Kopczynski)

    An earlier report by Der Spiegel, also based on revelations by Snowden, revealed that the NSA bugged EU diplomatic offices and gained access to EU internal computer networks.

    Chancellor Merkel’s spokesman, Steffen Seibert said that this would constitute intolerable behavior if proven.

    “If it is confirmed that diplomatic representations of the European Union and individual European countries have been spied upon, we will clearly say that bugging friends is unacceptable,” said Chancellor Angela Merkel’s spokesman, Steffen Seibert.

    “We are no longer in the Cold War,” he said.

    Merkel remained quiet regarding the Snowden PRISM leaks when Obama visited Berlin, diplomatically stating that, “the topic of commensurability is important.”

    Germans are particularly sensitive about eavesdropping because of the hangover from the intrusive surveillance state which characterized the communist German Democratic Republic (GDR) and Nazi era totalitarianism.

    The Der Spiegel report claims that the NSA provides the BND with analysis tools to monitor data passing through German territory. Opposition parties insisted when revelations were made about the extent of espionage that somebody in Merkel’s office, where the German intelligence agencies are coordinated, must have known what was going on.

    BND head Gerhard Schindler confirmed the existence of the two country’s intelligence partnerships during a meeting with members of the German parliament’s control committee specifically for overseeing intelligence issues, according to Der Spiegel.

    The BND is legally allowed to look through 20 percent of transnational communications, in addition to monitoring internet search terms and telecommunications, Deutsche Welle wrote on June 30, while the US can essentially capitalize on Germany’s data collection packets. The cooperation includes the passing of data over areas deemed crisis regions.

    A supporter of German left-wing party Die Linke holds a placard in support of former US spy agency, NSA, contractor Edward Snowden in the village of Loewenberg, some 60 km (37 miles) north of Berlin, July 4, 2013 (Reuters / Thomas Peter)A supporter of German left-wing party Die Linke holds a placard in support of former US spy agency, NSA, contractor Edward Snowden in the village of Loewenberg, some 60 km (37 miles) north of Berlin, July 4, 2013 (Reuters / Thomas Peter)

    The BND lacks the capacity to fully use its legally allowed monitoring. Der Spiegel reported that the agency is currently only monitoring only about 5 percent of data traffic, but is planning to expand its server, capacity and staffing in order to be more effective.

    The Federal Office for the Protection of the Constitution, which overlooks domestic counter-espionage, is currently investigating whether the NSA has access to German Internet traffic. A preliminary analysis was inconclusive.

    “So far, we have no information that Internet nodes in Germany have been spied on by the NSA,” said Hans-Georg Maassen, the president of the Office for the Protection of the Constitution.

    NSA whistleblower Edward Snowden fled the US in May a few weeks before his first leaks were published by the Guardian. He is believed to have been holed up in Moscow airport since June 23 and initially made asylum requests to 20 countries, including Germany, followed by a further six.

    Snowden was refused asylum in Germany on the grounds that asylum requests must be made on German soil.

    A spokesman of the Interior Minister said, “the German right of residence principally entails the possibility of acceptance from abroad, if this seems necessary for international legal or urgent humanitarian reasons, or for the ensuring of political interests of the federal republic of Germany. This needs to be examined thoroughly in the case of Mr. Snowden.”

    Published time: July 07, 2013 19:36 Get short URL

    Find this story 7 July 2013

    © Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014.

    What Facebook Collects and Shares

    What Facebook could know about you, and why you should care.

    Facebook is a resource for opinions and hobbies, celebrities and love interests, friends and family, and all the activities that whirl them together in our daily lives. Much like other social networking sites, Facebook is free except for one thing that all users give up: a certain amount of personal information.

    Facebook privacy policy provides extensive information about the use of personal data of registered users. It clearly specifies what personal information is collected, how it is used, parties to whom this information may be disclosed, and the security measures taken to protect the information.

    By reading and understanding the privacy policy, a user is able to weigh the risks involved in trusting this popular Web site, before one enters any personal information into its pages or installs its applications.

    Information Collected by Facebook
    Facebook collects two types of information: personal details provided by a user and usage data collected automatically as the user spends time on the Web site clicking around.

    Regarding personal information, the user willfully discloses it, such as name, email address, telephone number, address, gender and schools attended, for example. Facebook may request permission to use the user’s email address to send occasional notifications about the new services offered.

    Facebook records Web site usage data, in terms of how users access the site, such as type of web browser they use, the user’s IP address, how long they spend logged into the site, and other statistics. Facebook compiles this data to understand trends for improving the site or making marketing decisions.

    Facebook now has fine-grained privacy settings for its users. Users can decide which part of their information should be visible and to whom. Facebook categorizes members of the user’s network as “Friends” and “Friends of Friends,” or a broader group, such as a university or locality, and “Everyone,” which includes all users of the site. The categorization increases the granularity of the privacy settings in a user’s profile.

    Children: No one under 13 is permitted to register. Children between 13 and 18 require parental permission before sending personal information over Internet. A policy alone, however, does not stop children from using the site, and parents must be watchful of their children’s online activities in order to enforce these policies.

    Facebook stores users’ personal information on secure servers behind a firewall.

    Sharing of Information with Third Parties
    Facebook does not provide personal information to third parties without the user’s consent. Facebook also limits the information available to Internet search engines. Before accepting third-party services, Facebook makes the third party sign an agreement that holds it responsible for any misuse of personal information. However, advertising by third parties on Facebook can lead to their gaining access to user information, such as IP address or cookie-based web usage information that allows personalization of advertisements.

    Precautions for Users
    Facebook provides thousands of third-party applications for its users to download. Facebook further personalizes the advertisements of these applications on the user’s profiles. It does this by mining through other sources on the Internet to information about the likings and interests of these users. Sources for such mined data are newspapers, blogs and instant messaging to provide services customized according to the user’s personality. However, because these sources are not affiliated with Facebook, it raises a concern of data mining by these sources.

    Facebook does not actually provide a mechanism for users to close their accounts, and thus raises the concern that private user data will remain indefinitely on Facebook’s servers.

    Over time, the CEO and Board of Directors of a company change, or the company may even be sold. Under such circumstances, a concern arises about the private information held by the company. Deactivation without deletion of a user’s account implies that the data continue to be present on the servers. If a company is then sold, the data of those users who are currently deactivated may be subject to compromise.

    Conclusion
    Facebook has an explicitly stated privacy policy. It aims to enhance the social networking experience of users by reducing their concerns about the privacy of their data on the Web site. However, the more the Web site tries to incorporate open innovation by allowing third-party access and other such facilities, the more it puts personal information at risk, thereby increasing the probability of losing the trust of its users.

    Find this story at 2014

    Copyright © 2003–2012 Carnegie Mellon CyLab

    Where Does Facebook Stop and the NSA Begin?

    Sometimes it’s hard to tell the difference.

    “That social norm is just something that has evolved over time” is how Mark Zuckerberg justified hijacking your privacy in 2010, after Facebook imperiously reset everyone’s default settings to “public.” “People have really gotten comfortable sharing more information and different kinds.” Riiight. Little did we know that by that time, Facebook (along with Google, Microsoft, etc.) was already collaborating with the National Security Agency’s PRISM program that swept up personal data on vast numbers of internet users.

    In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom. But perhaps we shouldn’t be surprised: At the core of Facebook’s business model is the notion that our personal information is not, well, ours. And much like the NSA, no matter how often it’s told to stop using data in ways we didn’t authorize, it just won’t quit. Not long after Zuckerberg’s “evolving norm” dodge, Facebook had to promise the feds it would stop doing things like putting your picture in ads targeted at your “friends”; that promise lasted only until this past summer, when it suddenly “clarified” its right to do with your (and your kids’) photos whatever it sees fit. And just this week, Facebook analytics chief Ken Rudin told the Wall Street Journal that the company is experimenting with new ways to suck up your data, such as “how long a user’s cursor hovers over a certain part of its website, or whether a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone.”

    There will be a lot of talk in coming months about the government surveillance golem assembled in the shadows of the internet. Good. But what about the pervasive claim the private sector has staked to our digital lives, from where we (and our phones) spend the night to how often we text our spouse or swipe our Visa at the liquor store? It’s not a stretch to say that there’s a corporate spy operation equal to the NSA—indeed, sometimes it’s hard to tell the difference.

    In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom.
    Yes, Silicon Valley libertarians, we know there is a difference: When we hand over information to Facebook, Google, Amazon, and PayPal, we click “I Agree.” We don’t clear our cookies. We recycle the opt-out notice. And let’s face it, that’s exactly what internet companies are trying to get us to do: hand over data without thinking of the transaction as a commercial one. It’s all so casual, cheery, intimate—like, like?

    But beyond all the Friends and Hangouts and Favorites, there’s cold, hard cash, and, as they say on Sand Hill Road, when the product is free, you are the product. It’s your data that makes Facebook worth $100 billion and Google $300 billion. It’s your data that info-mining companies like Acxiom and Datalogix package, repackage, sift, and sell. And it’s your data that, as we’ve now learned, tech giants also pass along to the government. Let’s review: Companies have given the NSA access to the records of every phone call made in the United States. Companies have inserted NSA-designed “back doors” in security software, giving the government (and, potentially, hackers—or other governments) access to everything from bank records to medical data. And oh, yeah, companies also flat-out sell your data to the NSA and other agencies.

    To be sure, no one should expect a bunch of engineers and their lawyers to turn into privacy warriors. What we could have done without was the industry’s pearl-clutching when the eavesdropping was finally revealed: the insistence (with eerily similar wording) that “we have never heard of PRISM”; the Captain Renault-like shock—shock!—to discover that data mining was going on here. Only after it became undeniably clear that they had known and had cooperated did they duly hurl indignation at the NSA and the FISA court that approved the data demands. Heartfelt? Maybe. But it also served a branding purpose: Wait! Don’t unfriend us! Kittens!

    O hai, check out Mark Zuckerberg at this year’s TechCrunch conference: The NSA really “blew it,” he said, by insisting that its spying was mostly directed at foreigners. “Like, oh, wonderful, that’s really going to inspire confidence in American internet companies. I thought that was really bad.” Shorter: What matters is how quickly Facebook can achieve total world domination.

    Maybe the biggest upside to l’affaire Snowden is that Americans are starting to wise up. “Advertisers” rank barely behind “hackers or criminals” on the list of entities that internet users say they don’t want to be tracked by (followed by “people from your past”). A solid majority say it’s very important to control access to their email, downloads, and location data. Perhaps that’s why, outside the more sycophantic crevices of the tech press, the new iPhone’s biometric capability was not greeted with the unadulterated exultation of the pre-PRISM era.

    The truth is, for too long we’ve been content to play with our gadgets and let the geekpreneurs figure out the rest. But that’s not their job; change-the-world blather notwithstanding, their job is to make money. That leaves the hard stuff—like how much privacy we’ll trade for either convenience or security—in someone else’s hands: ours. It’s our responsibility to take charge of our online behavior (posting Carlos Dangerrific selfies? So long as you want your boss, and your high school nemesis, to see ‘em), and, more urgently, it’s our job to prod our elected representatives to take on the intelligence agencies and their private-sector pals.

    The NSA was able to do what it did because, post-9/11, “with us or against us” absolutism cowed any critics of its expanding dragnet. Facebook does what it does because, unlike Europe—where both privacy and the ability to know what companies have on you are codified as fundamental rights—we haven’t been conditioned to see Orwellian overreach in every algorithm. That is now changing, and both the NSA and Mark Zuckerberg will have to accept it. The social norm is evolving.

    —By Monika Bauerlein and Clara Jeffery | November/December 2013 Issue

    Find this story at November/December 2013

    Copyright ©2014 Mother Jones and the Foundation for National Progress.

    The Bahamas Wants to Know Why the NSA is Recording Its Phone Calls

    Government officials in the Bahamas want their U.S. counterparts to explain why the National Security Agency has been intercepting and recording every cell phone call taking place on the island nation.

    Responding to a report published by The Intercept on Monday, which revealed that the NSA has been targeting the Bahamas’ entire mobile network and storing the audio of every phone call traversing the network for up to 30 days, Bahamian officials told the Nassau Guardian that they had contacted the U.S. and vowed to release a statement regarding the revelations.

    In a front-page story published Tuesday, Bahamian Minister of Foreign Affairs Fred Mitchell told the Guardian that his government had reached out to the U.S. for an explanation. Mitchell said the cabinet was set to meet to discuss the matter and planned to issue a statement on the surveillance. The Bahamian minister of national security told the paper he intended to launch an inquiry into the NSA’s surveillance but did not provide a comment.

    A source familiar with the situation told The Intercept that the cabinet meeting had indeed taken place, but an official in Mitchell’s office said there would be no comment Tuesday. “You’ll have to call back,” said the official, who did not identify herself.

    Calls to the office of the prime minister went unanswered, as did a call to Bahamas Telecommunications Company, the Bahamas’ largest communications provider.

    U.S. officials at the embassy in the Bahamian capital of Nassau, meanwhile, told the Guardian it would not comment on “every specific alleged intelligence activity.”

    “The United States values its relationship with the Bahamas,” Neda Brown, a U.S. embassy spokesperson, told the paper. Contacted by The Intercept, Brown directed inquires to the State Department’s Bureau of Western Hemispheres. The bureau did not return a request for comment made late Tuesday.

    In addition to the Bahamas, The Intercept‘s report also revealed NSA’s targeting of mobile networks in Mexico, Kenya and the Philippines. Calls and emails to the embassies of each country were not returned Tuesday.

    By Ryan Devereaux20 May 2014, 5:58 PM EDT 151

    Find this story at 20 May 2014

    © 2014 First Look Productions, Inc.

    WikiLeaks ignores ‘deaths’ warning, threatens to name NSA-targeted country

    Internet, Mass media, Security, USA, WikiLeaks
    Despite warnings that doing so “could lead to increased violence” and potentially deaths, anti-secrecy group WikiLeaks says it plans to publish the name of a country targeted by a massive United States surveillance operation.

    On Monday this week, journalists at The Intercept published a report based off of leaked US National Security Agency documents supplied by former contractor Edward Snowden which suggested that the NSA has been collecting in bulk the contents of all phone conversations made or received in two countries abroad.

    Only one of those nations, however — the Bahamas — was named by The Intercept. The other, journalists Ryan Devereaux, Glenn Greenwald and Laura Poitras wrote this week, was withheld as a result of “credible concerns that doing so could lead to increased violence.”

    WikiLeaks has since accused The Intercept and its parent company First Look Media of censorship and says they will publish the identity of the country if the name remains redacted in the original article. The Intercept’s Greenwald fired back over Twitter, though, and said his outlet chose to publish more details than the Washington Post, where journalists previously reported on a related call collection program but chose to redact more thoroughly.

    “We condemn Firstlook for following the Washington Post into censoring the mass interception of an entire nation,” WikiLeaks tweeted on Monday.

    “It is not the place of Firstlook or the Washington Post to deny the rights of an entire people to know they are being mass recorded,” WikiLeaks added. “It is not the place of Firstlook or WaPo to decide how a people will [choose] to act against mass breaches of their rights by the United States.”

    When Greenwald defended his decision to publish the names of four countries where telephony metadata is collected by the NSA but withhold a fifth where content is recorded as well, WikiLeaks said it could be interpreted as meaning that the unknown country doesn’t deserve to know they’re being surveilled, but Greenwald said The Intercept was “very convinced” it could lead to deaths. Later, WikiLeaks equated this as an act of racism.

    But as the conversation escalated, the WikiLeaks Twitter announced it would disclose the nation’s identify if The Intercept did not, despite requests from the US government to leave that information redact over fears of what the response could be.

    “When has true published information harmed innocents?” WikiLeaks asked. “To repeat this false Pentagon talking point is to hurt all publishers.”

    “We will reveal the name of the censored country whose population is being mass recorded in 72 hours,” WikiLeaks wrote at 6:35 p.m. EST Tuesday evening. If the organization intends to uphold that promise, that the identity of the country could be revealed before the weekend.

    As RT reported earlier this week, The Intercept story made claims that the NSA has used a program codenamed MYSTIC to collect basic phone records in at least five countries, similar to the metadata that has been controversially collected in bulk domestically as revealed in one of the first documents released by Snowden last year. In the Bahamas and one more locale, though, The Intercept reported that NSA documents reveal another program, codenamed SOMALGET, is deployed in order to process “over 100 million call events per day.”

    SOMALGET, the document reads, is a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.” According to The Intercept, the decision to wiretap all calls in and out of the Bahamas was made unilaterally and without the knowledge of the island’s government or its quarter-of-a-million people.

    Published time: May 20, 2014 18:38
    Edited time: May 22, 2014 11:17 Get short URL

    Find this story at 20 May 2014

    © Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014

    Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas

    The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.

    According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.

    SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.

    All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.

    The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

    “The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”

    By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.

    In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.

    “It’s surprising, the short-sightedness of the government,” says Michael German, a fellow at New York University’s Brennan Center for Justice who spent 16 years as an FBI agent conducting undercover investigations. “That they couldn’t see how exploiting a lawful mechanism to such a degree that you might lose that justifiable access – that’s where the intelligence community is acting in a way that harms its long-term interests, and clearly the long-term national security interests of the United States.”

    The NSA refused to comment on the program, but said in a statement that “the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false.” The agency also insisted that it follows procedures to “protect the privacy of U.S. persons” whose communications are “incidentally collected.”

    Informed about the NSA’s spying, neither the Bahamian prime minister’s office nor the country’s national security minister had any comment. The embassies of Mexico, Kenya, and the Philippines did not respond to phone messages and emails.

    In March, The Washington Post revealed that the NSA had developed the capability to record and store an entire nation’s phone traffic for 30 days. The Post reported that the capacity was a feature of MYSTIC, which it described as a “voice interception program” that is fully operational in one country and proposed for activation in six others. (The Post also referred to NSA documents suggesting that MYSTIC was pulling metadata in some of those countries.) Citing government requests, the paper declined to name any of those countries.

    The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.

    MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”

    1
    A top-secret description of the MYSTIC program written by the NSA’s Special Source Operations division

    If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”

    SOMALGET’s capabilities are further detailed in a May 2012 memo written by an official in the NSA’s International Crime and Narcotics division. The memo hails the “great success” the NSA’s drugs and crime unit has enjoyed through its use of the program, and boasts about how “beneficial” the collection and recording of every phone call in a given nation can be to intelligence analysts.

    Rather than simply making “tentative analytic conclusions derived from metadata,” the memo notes, analysts can follow up on hunches by going back in time and listening to phone calls recorded during the previous month. Such “retrospective retrieval” means that analysts can figure out what targets were saying even when the calls occurred before the targets were identified. “[W]e buffer certain calls that MAY be of foreign intelligence value for a sufficient period to permit a well-informed decision on whether to retrieve and return specific audio content,” the NSA official reported.

    “There is little reason,” the official added, that SOMALGET could not be expanded to more countries, as long as the agency provided adequate engineering, coordination and hardware. There is no indication in the documents that the NSA followed up on the official’s enthusiasm.

    2
    A 2012 memo written by the NSA’s International Crime & Narcotics division

    The documents don’t spell out how the NSA has been able to tap the phone calls of an entire country. But one memo indicates that SOMALGET data is covertly acquired under the auspices of “lawful intercepts” made through Drug Enforcement Administration “accesses”– legal wiretaps of foreign phone networks that the DEA requests as part of international law enforcement cooperation.

    When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.”

    “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”

    The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe.

    But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.”

    What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”

    Selander’s first-hand experience is echoed in the 2004 memo by the manager of the NSA’s drug-war efforts, which was titled “DEA: The Other Warfighter.” The DEA and the NSA “enjoy a vibrant two-way information-sharing relationship,” the memo observes, and cooperate so closely on counternarcotics and counterterrorism that there is a risk of “blurring the lines between the two missions.”

    Still, the ability to record and replay the phone calls of an entire country appears to be a relatively new weapon in the NSA’s arsenal. None of the half-dozen former U.S. law enforcement officials interviewed by The Intercept said they had ever heard of a surveillance operation quite like the NSA’s Bahamas collection.

    “I’m completely unfamiliar with the program,” says Joel Margolis, a former DEA official who is now executive vice president of government affairs for Subsentio, a Colorado-based company that installs lawful intercepts for telecommunications providers. “I used to work in DEA’s office of chief counsel, and I was their lead specialist on lawful surveillance matters. I wasn’t aware of anything like this.”

    3
    A 2012 memo written by the NSA’s International Crime & Narcotics division

    For nearly two decades, telecom providers in the United States have been legally obligated under the 1994 Communications Assistance for Law Enforcement Act to build their networks with wiretapping capabilities, providing law enforcement agencies with access to more efficient, centrally managed surveillance.

    Since CALEA’s passage, many countries have adopted similar measures, making it easier to gather telecommunications intelligence for international investigations. A 2001 working group for the United Nations Office on Drugs and Crime went so far as to urge countries to consider permitting foreign law enforcement agencies to initiate international wiretaps directly from within their own territories.

    The process for setting up lawful intercepts in foreign countries is largely the same as in the United States. “Law enforcement issues a warrant or other authorization, a carrier or a carrier’s agent responds to the warrant by provisioning the intercept, and the information is sent in sort of a one-way path to the law enforcement agency,” says Marcus Thomas, a former FBI assistant director who now serves as chief technology officer for Subsentio.

    When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.”

    The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.”

    Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.

    “Most telecom hardware vendors will have some solutions for legal interception,” says a former mobile telecommunications engineer who asked not to be named because he is currently working for the British government. “That’s pretty much because legal interception is a requirement if you’re going to operate a mobile phone network.”

    The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA.

    One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.

    The classified 2013 intelligence budget also describes MYSTIC as using “partner-enabled” access to both cellular and landline phone networks. The goal of the access, the budget says, is to “provide comprehensive metadata access and content against targeted communications” in the Caribbean, Mexico, Kenya, the Philippines, and the unnamed country. The budget adds that in the Bahamas, Mexico, and the Philippines, MYSTIC requires “contracted services” for its “operational sustainment.”

    SSO_Dictionary_Excerpt
    Definitions of terms related to the MYSTIC program, drawn from an NSA glossary

    The NSA documents don’t specify who is providing access in the Bahamas. But they do describe SOMALGET as an “umbrella term” for systems provided by a private firm, which is described elsewhere in the documents as a “MYSTIC access provider.” (The documents don’t name the firm, but rather refer to a cover name that The Intercept has agreed not to publish in response to a specific, credible concern that doing so could lead to violence.) Communications experts consulted by The Intercept say the descriptions in the documents suggest a company able to install lawful intercept equipment on phone networks.

    Though it is not the “access provider,” the behemoth NSA contractor General Dynamics is directly involved in both MYSTIC and SOMALGET. According to documents, the firm has an eight-year, $51 million contract to process “all MYSTIC data and data for other NSA accesses” at a facility in Annapolis Junction, Maryland, down the road from NSA’s headquarters. NSA logs of SOMALGET collection activity – communications between analysts about issues such as outages and performance problems – contain references to a technician at a “SOMALGET processing facility” who bears the same name as a LinkedIn user listing General Dynamics as his employer. Reached for comment, a General Dynamics spokesperson referred questions to the NSA.

    According to the NSA documents, MYSTIC targets calls and other data transmitted on Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries.

    In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.

    Punching into this portion of a county’s mobile network would give the NSA access to a virtually non-stop stream of communications. It would also require powerful technology.

    “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world.

    The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.

    If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets.

    But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.

    marijauna
    A slide from a 2013 NSA Special Source Operations presentation

    The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general.

    So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States?

    The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.

    “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”

    Beyond the Bahamas, the other countries being targeted by MYSTIC are more in line with the NSA’s more commonly touted priorities. In Kenya, the U.S. works closely with local security forces in combating the militant fundamentalist group Al-Shabab, based in neighboring Somalia. In the Philippines, the U.S. continues to support a bloody shadow war against Islamist extremists launched by the Bush administration in 2002. Last month, President Barack Obama visited Manila to sign a military pact guaranteeing that U.S. operations in Southeast Asia will continue and expand for at least another decade.

    Mexico, another country targeted by MYSTIC, has received billions of dollars in police, military, and intelligence aid from the U.S. government over the past seven years to fight the war on drugs, a conflict that has left more than 70,000 Mexicans dead by some estimates. Attorney General Eric Holder has described Mexican drug cartels as a U.S. “national security threat,” and in 2009, then-CIA director Michael Hayden said the violence and chaos in Mexico would soon be the second greatest security threat facing the U.S. behind Al Qaeda.

    Photo credit: Marcelo A. Salinas/MCT/Zumapress.com
    Photo credit: Marcelo A. Salinas/MCT/Zumapress.com

    The legality of the NSA’s sweeping surveillance in the Bahamas is unclear, given the permissive laws under which the U.S intelligence community operates. Earlier this year, President Obama issued a policy directive imposing “new limits” on the U.S. intelligence community’s use of “signals intelligence collected in bulk.” In addition to threats against military or allied personnel, the directive lists five broad conditions under which the agency would be permitted to trawl for data in unrestricted dragnets: threats posed by foreign powers, terrorism, weapons of mass destruction, cybersecurity, and “transnational criminal threats, including illicit finance and sanctions evasion.”

    SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless.

    “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.”

    “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”

    Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.”

    It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”

    Documents published with this article:

    SOMALGET memo
    SIDToday: DEA – The “Other” Warfighter
    SSO Dictionary Excerpt
    MYSTIC
    SSO March 14, 2013
    SSO April 18, 2013 – What’s New
    SSO May 2, 2013
    SSO May 3, 2013 – MYSTIC
    SSO May 3, 2012
    Black Budget

    By Ryan Devereaux, Glenn Greenwald and Laura Poitras19 May 2014, 12:37 PM EDT 395

    Find this story at 19 May 2014

    © 2014 First Look Productions, Inc

    Greenwald: Washington Post ‘suppressed’ foreign countries under NSA eavesdropping program

    It’s been a couple of months since the Washington Post published a scoop on the extraordinary overseas eavesdropping capabilities of the U.S. government. Under the bylines of Barton Gellman and Ashkan Soltani, the paper revealed that the National Security Agency (NSA) had amassed a system — known as “MYSTIC” — enabling it to “rewind and review” all of the telephone conversations of a foreign country.

    From the story: “A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.” Details on the program came from documents supplied by NSA whistleblower Edward Snowden as well as from sources familiar with the program.

    A really juicy scoop, with one desiccating caveat: The Post withheld a detail critical to understanding the scope and capabilities of the program:

    At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

    Ah, a legacy media outlet acceding to a request from the U.S. government. Or, in other words, the raison d’etre of Glenn Greenwald, the former Guardian columnist and current First Look Media talent who has long criticized American media outlets for wimping out on disclosure of sensitive information. In a recent interview with Amy Goodman of Democracy Now, Greenwald riffed, “[t]he editors at The Washington Post are very much old-style, old-media, pro-government journalists, the kind who have essentially made journalism in the U.S. neutered and impotent and obsolete.”

    Following the Post’s story on MYSTIC, the Erik Wemple Blog waited a couple of weeks and then asked Greenwald, essentially, where’s your story on this thing? He responded, “I can’t comment on that yet, except to say that, obviously, if we were to publish something that the WashPost has announced it thinks shouldn’t be published, it would take work (and thus time) with editors, lawyers and the like.”

    Time, indeed. Yesterday, The Intercept, First Look Media’s magazine on national security matters, published its version of the Post’s MYSTIC story. In the very headline of the piece, it drew a distinction between its piece and that of the Washington Post: “Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas.”

    The Bahamas? The what?

    Under the bylines of Ryan Devereaux, Greenwald and Laura Poitras, The Intercept reports that the NSA worked with the Drug Enforcement Agency (DEA) to secure a “backdoor” to the cell phone network of the island nation, “without the knowledge or consent of the Bahamian government.” Noting that the agency commonly cites such life-and-death imperatives as anti-terrorism to justify its eavesdropping program, in this case it’s going after drug traffickers and smugglers, “a far cry from derailing terror plots or intercepting weapons of mass destruction,” notes the story.

    If the Bahamas sounds like an odd place on which to focus such a spy initiative, that’s perhaps by design, notes the story: It could well be a “sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.”

    As for the “elsewhere,” Greenwald and The Intercept go there, to a point. Here’s the big reveal of the story: “Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.”

    John Cook, The Intercept’s editor-in-chief, declined an interview request about the decisions behind the story, instead leaving the matter to Twitter. Which provides a rich back-and-forth for this case.

    Following publication of the story, Wikileaks ripped The Intercept for failing to embrace a more radical form of transparency:

    The principals then went off to the races:

    And then some input from The Intercept’s priest of adversarial press-government relations:

    Compare that sentiment with what Greenwald tweeted the day the Washington Post published its MYSTIC story:

    As part of the back-and-forth Wikileaks made a bid for renewed relevance with this boast:

    The exchange proves that in the world of radical media-government adversarialists, purity is a prerequisite. Here, Greenwald apparently thought his publication was sticking to its governing principles in publishing the names of four countries, only to get shouted down by Wikileaks for not going far enough (Greenwald couldn’t be reached for comment). In a previous post, Greenwald has criticized the NSA for allegedly spilling details of top-secret programs when it suits its propaganda mission, only to turn around and insist to media outlets that lives will be endangered if they publish sensitive information.

    The Intercept’s partial defiance of the NSA in publishing the names of four countries surely adds contour to the story of MYSTIC — the example of the Bahamas alone fleshes out various legal and diplomatic considerations involved in foreign surveillance. The more careful Washington Post version of the story was interesting yet unsatisfying: Absent a specific country, it was more difficult to reach hard conclusions on the program’s legitimacy, legality and efficacy. Those are the dangers of scaling back detail in consideration of security concerns. When asked if naming just the Bahamas as a way of explaining NSA capabilities would have been a tolerably cautious approach, Washington Post Executive Editor Martin Baron replied, “You make some assumptions here, but I’m not going to address them.”

    There are also perils to The Intercept’s approach. It may have touched off a macho-transparentist scramble to out that one country whose secretness The Intercept genuinely wants to protect.

    Whatever the outcome, each outlet apparently got the same pitch from the government: “We shared with both news outlets the very same concerns about risks to human life and national security,” says NSA spokeswoman Vanee’ Vines in a statement to this blog. She also sent along this statement:

    Every day, NSA provides valuable intelligence on issues of concern to all Americans – such as international terrorism, cyber crime, international narcotics trafficking, and the proliferation of weapons of mass destruction. The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all.

    NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets. Moreover, all of NSA’s efforts are strictly conducted under the rule of law and provide appropriate protection for privacy rights.

    The Agency collects data to meet specific security and intelligence requirements such as counterintelligence, counterterrorism, counterproliferation, cyber security, force protection for U.S. troops and allies, and combating transnational crime.

    Erik Wemple writes the Erik Wemple blog, where he reports and opines on media organizations of all sorts.

    BY ERIK WEMPLE May 20

    Find this story at 20 May 2014

    © 1996-2014 The Washington Post

    Glenn Greenwald: how the NSA tampers with US-made internet routers

    The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide

    For years, the US government loudly warned the world that Chinese routers and other internet devices pose a “threat” because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA’s documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.

    Tell us what you think: Star-rate and review this book
    The drumbeat of American accusations against Chinese internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, “may be violating United States laws” and have “not followed United States legal obligations or international standards of business behaviour”. The committee recommended that “the United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies”.

    The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products: “Private-sector entities in the United States are strongly encouraged to consider the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services. US network providers and systems developers are strongly encouraged to seek other vendors for their projects. Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems.”

    The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: “‘If Huawei gets in the middle of US-China relations,’ and causes problems, ‘it’s not worth it’.”

    But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA’s Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.

    The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some “SIGINT tradecraft … is very hands-on (literally!)”.

    Eventually, the implanted device connects back to the NSA. The report continues: “In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.”

    It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices. But the US is certainly doing the same.

    Warning the world about Chinese surveillance could have been one of the motives behind the US government’s claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA’s own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.

    The Guardian, Monday 12 May 2014 22.39 BST

    Find this story at 12 May 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    EXCLUSIVE: EMAILS REVEAL CLOSE GOOGLE RELATIONSHIP WITH NSA (2014)

    National Security Agency head and Internet giant’s executives have coordinated through high-level policy discussions

    Email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt suggest a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass after last year’s revelations about NSA spying.

    Disclosures by former NSA contractor Edward Snowden about the agency’s vast capability for spying on Americans’ electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law.

    But Al Jazeera has obtained two sets of email communications dating from a year before Snowden became a household name that suggest not all cooperation was under pressure.

    On the morning of June 28, 2012, an email from Alexander invited Schmidt to attend a four-hour-long “classified threat briefing” on Aug. 8 at a “secure facility in proximity to the San Jose, CA airport.”

    “The meeting discussion will be topic-specific, and decision-oriented, with a focus on Mobility Threats and Security,” Alexander wrote in the email, obtained under a Freedom of Information Act (FOIA) request, the first of dozens of communications between the NSA chief and Silicon Valley executives that the agency plans to turn over.

    Alexander, Schmidt and other industry executives met earlier in the month, according to the email. But Alexander wanted another meeting with Schmidt and “a small group of CEOs” later that summer because the government needed Silicon Valley’s help.

    “About six months ago, we began focusing on the security of mobility devices,” Alexander wrote. “A group (primarily Google, Apple and Microsoft) recently came to agreement on a set of core security principles. When we reach this point in our projects we schedule a classified briefing for the CEOs of key companies to provide them a brief on the specific threats we believe can be mitigated and to seek their commitment for their organization to move ahead … Google’s participation in refinement, engineering and deployment of the solutions will be essential.”

    Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society, said she believes information sharing between industry and the government is “absolutely essential” but “at the same time, there is some risk to user privacy and to user security from the way the vulnerability disclosure is done.”

    The challenge facing government and industry was to enhance security without compromising privacy, Granick said. The emails between Alexander and Google executives, she said, show “how informal information sharing has been happening within this vacuum where there hasn’t been a known, transparent, concrete, established methodology for getting security information into the right hands.”

    The classified briefing cited by Alexander was part of a secretive government initiative known as the Enduring Security Framework (ESF), and his email provides some rare information about what the ESF entails, the identities of some participant tech firms and the threats they discussed.

    The classified briefing cited by Alexander was part of a secretive government initiative known as the Enduring Security Framework (ESF), and his email provides some rare information about what the ESF entails, the identity of some participant tech firms and the threats they discussed.
    Alexander explained that the deputy secretaries of the Department of Defense, Homeland Security and “18 US CEOs” launched the ESF in 2009 to “coordinate government/industry actions on important (generally classified) security issues that couldn’t be solved by individual actors alone.”

    “For example, over the last 18 months, we (primarily Intel, AMD [Advanced Micro Devices], HP [Hewlett-Packard], Dell and Microsoft on the industry side) completed an effort to secure the BIOS of enterprise platforms to address a threat in that area.”

    “BIOS” is an acronym for “basic input/output system,” the system software that initializes the hardware in a personal computer before the operating system starts up. NSA cyberdefense chief Debora Plunkett in December disclosed that the agency had thwarted a “BIOS plot” by a “nation-state,” identified as China, to brick U.S. computers. That plot, she said, could have destroyed the U.S. economy. “60 Minutes,” which broke the story, reported that the NSA worked with unnamed “computer manufacturers” to address the BIOS software vulnerability.

    But some cybersecurity experts questioned the scenario outlined by Plunkett.

    “There is probably some real event behind this, but it’s hard to tell, because we don’t have any details,” wrote Robert Graham, CEO of the penetration-testing firm Errata Security in Atlanta, on his blog in December. “It”s completely false in the message it is trying to convey. What comes out is gibberish, as any technical person can confirm.”

    And by enlisting the NSA to shore up their defenses, those companies may have made themselves more vulnerable to the agency’s efforts to breach them for surveillance purposes.

    “I think the public should be concerned about whether the NSA was really making its best efforts, as the emails claim, to help secure enterprise BIOS and mobile devices and not holding the best vulnerabilities close to their chest,” said Nate Cardozo, a staff attorney with the Electronic Frontier Foundation’s digital civil liberties team.

    He doesn’t doubt that the NSA was trying to secure enterprise BIOS, but he suggested that the agency, for its own purposes, was “looking for weaknesses in the exact same products they’re trying to secure.”

    The NSA “has no business helping Google secure its facilities from the Chinese and at the same time hacking in through the back doors and tapping the fiber connections between Google base centers,” Cardozo said. “The fact that it’s the same agency doing both of those things is in obvious contradiction and ridiculous.” He recommended dividing offensive and defensive functions between two agencies.

    Google, NSA
    The government has asked for Silicon Valley’s help. Adam Berry / Getty Images
    Two weeks after the “60 Minutes” broadcast, the German magazine Der Spiegel, citing documents obtained by Snowden, reported that the NSA inserted back doors into BIOS, doing exactly what Plunkett accused a nation-state of doing during her interview.

    Google’s Schmidt was unable to attend to the mobility security meeting in San Jose in August 2012.

    “General Keith.. so great to see you.. !” Schmidt wrote. “I’m unlikely to be in California that week so I’m sorry I can’t attend (will be on the east coast). Would love to see you another time. Thank you !” Since the Snowden disclosures, Schmidt has been critical of the NSA and said its surveillance programs may be illegal.

    Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, did attend that briefing. Foreign Policy reported a month later that Dempsey and other government officials — no mention of Alexander — were in Silicon Valley “picking the brains of leaders throughout the valley and discussing the need to quickly share information on cyber threats.” Foreign Policy noted that the Silicon Valley executives in attendance belonged to the ESF. The story did not say mobility threats and security was the top agenda item along with a classified threat briefing.

    A week after the gathering, Dempsey said during a Pentagon press briefing, “I was in Silicon Valley recently, for about a week, to discuss vulnerabilities and opportunities in cyber with industry leaders … They agreed — we all agreed on the need to share threat information at network speed.”

    Google co-founder Sergey Brin attended previous meetings of the ESF group but because of a scheduling conflict, according to Alexander’s email, he also could not attend the Aug. 8 briefing in San Jose, and it’s unknown if someone else from Google was sent.

    A few months earlier, Alexander had emailed Brin to thank him for Google’s participation in the ESF.

    “I see ESF’s work as critical to the nation’s progress against the threat in cyberspace and really appreciate Vint Cerf [Google’s vice president and chief Internet evangelist], Eric Grosse [vice president of security engineering] and Adrian Ludwig’s [lead engineer for Android security] contributions to these efforts during the past year,” Alexander wrote in a Jan. 13, 2012, email.

    “You recently received an invitation to the ESF Executive Steering Group meeting, which will be held on January 19, 2012. The meeting is an opportunity to recognize our 2012 accomplishments and set direction for the year to come. We will be discussing ESF’s goals and specific targets for 2012. We will also discuss some of the threats we see and what we are doing to mitigate those threats … Your insights, as a key member of the Defense Industrial Base, are valuable to ensure ESF’s efforts have measurable impact.”

    A Google representative declined to answer specific questions about Brin’s and Schmidt’s relationship with Alexander or about Google’s work with the government.

    “We work really hard to protect our users from cyberattacks, and we always talk to experts — including in the U.S. government — so we stay ahead of the game,” the representative said in a statement to Al Jazeera. “It’s why Sergey attended this NSA conference.”

    Brin responded to Alexander the following day even though the head of the NSA didn’t use the appropriate email address when contacting the co-chairman.

    “Hi Keith, looking forward to seeing you next week. FYI, my best email address to use is [redacted],” Brin wrote. “The one your email went to — sergey.brin@google.com — I don’t really check.”

    May 6, 2014 5:00AM ET
    by Jason Leopold @JasonLeopold

    Find this story at 6 May 2014

    © 2014 Al Jazeera America, LLC.

    US tech giants knew of NSA data collection, agency’s top lawyer insists (2014)

    NSA general counsel Rajesh De says big tech companies like Yahoo and Google provided ‘full assistance’ in legally mandated collection of data

    The senior lawyer for the National Security Agency stated on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data.

    Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet.

    Asked during a Wednesday hearing of the US government’s institutional privacy watchdog if collection under the law, known as Section 702 or the Fisa Amendments Act, occurred with the “full knowledge and assistance of any company from which information is obtained,” De replied: “Yes.”

    When the Guardian and the Washington Post broke the Prism story in June, thanks to documents leaked by whistleblower Edward Snowden, nearly all the companies listed as participating in the program – Yahoo, Apple, Google, Microsoft, Facebook and AOL – claimed they did not know about a surveillance practice described as giving NSA vast access to their customers’ data. Some, like Apple, said they had “never heard” the term Prism.

    De explained: “Prism was an internal government term that as the result of leaks became the public term,” De said. “Collection under this program was a compulsory legal process, that any recipient company would receive.”

    After the hearing, De added that service providers also know and receive legal compulsions surrounding NSA’s harvesting of communications data not from companies but directly in transit across the internet under 702 authority.

    The disclosure of Prism resulted in a cataclysm in technology circles, with tech giants launching extensive PR campaigns to reassure their customers of data security and successfully pressing the Obama administration to allow them greater leeway to disclose the volume and type of data requests served to them by the government.

    Last week, Facebook founder Mark Zuckerberg said he had called US president Barack Obama to voice concern about “the damage the government is creating for all our future.” There was no immediate response from the tech companies to De’s comments on Wednesday.

    It is unclear what sort of legal process the government serves on a company to compel communications content and metadata access under Prism or through upstream collection. Documents leaked from Snowden indicate that the NSA possesses unmediated access to the company data.

    The secret Fisa court overseeing US surveillance for the purposes of producing foreign intelligence issues annual authorisations blessing NSA’s targeting and associated procedures under Section 702.After winning a transparency battle with the administration in the Fisa court earlier this year, the companies are now permitted to disclose the range of Fisa orders they receive, in bands of 1,000, which presumably include orders under 702.

    Passed in 2008, Section 702 retroactively gave cover of law to a post-9/11 effort permitting the NSA to collect phone, email, internet and other communications content when one party to the communication is reasonably believed to be a non-American outside the United States. The NSA stores Prism data for five years and communications taken directly from the internet for two years.

    While Section 702 forbids the intentional targeting of Americans or people inside the United States – a practice known as “reverse targeting” – significant amounts of Americans’ phone calls and emails are swept up in the process of collection.

    In 2011, according to a now-declassified Fisa court ruling, the NSA was found to have collected tens of thousands of emails between Americans, which a judge on the court considered a violation of the US constitution and which the NSA says it is technologically incapable of fixing.

    Renewed in December 2012 over the objections of senate intelligence committee members Ron Wyden and Mark Udall, Section 702 also permits NSA analysts to search through the collected communications for identifying information about Americans, an amendment to so-called “minimisation” rules revealed by the Guardian in August and termed the “backdoor search loophole” by Wyden.

    De and his administration colleagues, testifying before the Privacy and Civil Liberties Oversight Board, strongly rejected suggestions by the panel that a court authorise searches for Americans’ information inside the 702 databases. “If you have to go back to court every time you look at the information in your custody, you can imagine that would be quite burdensome,” deputy assistant attorney general Brad Wiegmann told the board.

    De argued that once the Fisa court permits the collection annually, analysts ought to be free to comb through it, and stated that there were sufficient privacy safeguards for Americans after collection and querying had occurred. “That information is at the government’s disposal to review in the first instance,” De said.

    De also stated that the NSA is not permitted to search for Americans’ data from communications taken directly off the internet, citing greater risks to privacy.

    Section 702 is not the only legal authority the US government possesses to harvest data transiting the internet.

    Neither De nor any other US official discussed data taken from the internet under different legal authorities. Different documents Snowden disclosed, published by the Washington Post, indicated that NSA takes data as it transits between Yahoo and Google data centers, an activity reportedly conducted not under Section 702 but under a seminal executive order known as 12333.

    De and his administration colleagues were quick to answer the board that companies were aware of the government’s collection of data under 702, which Robert Litt, general counsel for the director of national intelligence, told the board was “one of the most valuable collection tools that we have.”

    “All 702 collection is pursuant to court directives, so they have to know,” De reiterated to the Guardian.

    • This article was amended on 20 March 2014 to remove statements in the original that the testimony by Rajesh De contradicted denials by technology companies about their knowledge of NSA data collection. It was also updated to clarify that the companies challenged the secrecy surrounding Section 702 orders. Other minor clarifications were also made.

    Spencer Ackerman in Washington
    theguardian.com, Wednesday 19 March 2014 18.40 GMT

    Find this story at 19 March 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Apple, Google and AT&T meet Obama to discuss NSA surveillance concerns (2013)

    Silicon Valley companies concerned at effect on business as revelations over US government spying spread more widely

    Barack Obama hosted a summit on government surveillance and digital privacy attended by Apple chief executive Tim Cook, Google vice-president Vint Cerf and the boss of US telecoms network AT&T on Thursday.

    The US president attended in person, sources told the Politico blog, as did other technology company executives. Additional attendees included representatives of the Center for Democracy and Technology and Gigi Sohn, leader of internet campaign group Public Knowledge.

    The meeting was apparently prompted by growing concerns among US technology companies that revelations from the Guardian and others about the extent and depth of surveillance by the National Security Agency, and the companies’ obligation to allow access to data under secret court rules, could be damaging their reputation and commercial interests abroad.

    The gathering followed a closed-doors meeting earlier this week with Obama’s chief of staff Denis McDonough and general counsel Kathy Ruemmler at the White House.

    On the agenda at Tuesday’s meeting were the surveillance activities of the NSA, commercial privacy issues and the online tracking of consumers.

    “This is one of a number of discussions the administration is having with experts and stakeholders in response to the president’s directive to have a national dialogue about how to best protect privacy in a digital era, including how to respect privacy while defending our national security,” one official told Politico.

    McDonough and Ruemmler met members of the Information Technology Industry Council, TechNet and Tech America, which represent a range of companies from defence contractors to digital giants Facebook, Google and Microsoft.

    Campaigners including the American Civil Liberties Union and the Electronic Privacy information Center were also present, Politico’s Tony Romm reported.

    The Guardian’s revelations about the breadth of the NSA’s access to data, particularly relating to foreign individuals, has created PR problems for US companies. Apple has set its sights on China as a huge potential growth market, but if people there fear eavesdropping by the US government it could harm sales. And Google stands to lose business in cloud computing to European rivals if customers fear similar eavesdropping. Cloud computing companies have estimated they could lose billions of dollars of business as a result.

    The White House is also battling to respond to growing unrest over surveillance of citizens by the state and the vast caches of data many digital giants are now storing about individual consumers.

    Obama has promised more public debate about the country’s counterterrorism activities and privacy safeguards in general amid signs of widespread support for NSA whistleblower Edward Snowden, but officials have so far declined to provide details about this week’s technology summits.

    The meetings came as a wave of Americans posted messages of support to the former security contractor, whose leaks exposed the extent of government sponsored surveillance in the US and Europe.

    A website launched by the digital rights group Fight for the Future on Wednesday has attracted more than 10,000 posts expressing support for Snowden’s actions. Billed as an exercise to put faces to statistics, the website features a combination of photographs of individuals holding up signs and written words of support.

    In June, Reuters/Ipsos found 31% of respondents believed Snowden was a patriot, while 23% thought he was a traitor. Another 46% said they did not know. Gallup found in June that 53% of respondents disapproved of government snooping programmes, while just 37% approved and 10% had no opinion.

    In a statement, Fight for the Future cofounder Tiffiniy Cheng said: “We’ve seen an unbelievable response already – the messages keep streaming in. The government reads the same polls that we do. They know that Snowden has the public’s support. But now we’re adding faces to those statistics. As someone who volunteered and worked for Obama’s election, I feel totally burned by the president’s civil liberties and human rights records. If he truly cares about representing the American people, he should turn his attention to shutting down the NSA’s illegal surveillance programs, and leave Mr Snowden alone.”

    The website was launched shortly before Obama pulled out of a presidential meeting with Russia’s leader Vladimir Putin in Moscow next month. This followed Russia’s decision to grant Snowden asylum.

    Juliette Garside
    theguardian.com, Friday 9 August 2013 17.37 BST

    Find this story at 9 August 2013

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    BT and Vodafone among telecoms companies passing details to GCHQ (2013)

    Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables

    Some of the world’s leading telecoms firms, including BT and Vodafone, are secretly collaborating with Britain’s spy agency GCHQ, and are passing on details of their customers’ phone calls, email messages and Facebook entries, documents leaked by the whistleblower Edward Snowden show.

    BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables. The cables carry much of the world’s phone calls and internet traffic.

    In June the Guardian revealed details of GCHQ’s ambitious data-hoovering programmes, Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. It emerged GCHQ was able to tap into fibre-optic cables and store huge volumes of data for up to 30 days. That operation, codenamed Tempora, has been running for 20 months.

    On Friday Germany’s Süddeutsche newspaper published the most highly sensitive aspect of this operation – the names of the commercial companies working secretly with GCHQ, and giving the agency access to their customers’ private communications. The paper said it had seen a copy of an internal GCHQ powerpoint presentation from 2009 discussing Tempora.

    The document identified for the first time which telecoms companies are working with GCHQ’s “special source” team. It gives top secret codenames for each firm, with BT (“Remedy”), Verizon Business (“Dacron”), and Vodafone Cable (“Gerontic”). The other firms include Global Crossing (“Pinnage”), Level 3 (“Little”), Viatel (“Vitreous”) and Interoute (“Streetcar”). The companies refused to comment on any specifics relating to Tempora, but several noted they were obliged to comply with UK and EU law.

    The revelations are likely to dismay GCHQ and Downing Street, who are fearful that BT and the other firms will suffer a backlash from customers furious that their private data and intimate emails have been secretly passed to a government spy agency. In June a source with knowledge of intelligence said the companies had no choice but to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.

    Together, these seven companies operate a huge share of the high-capacity undersea fibre-optic cables that make up the backbone of the internet’s architecture. GCHQ’s mass tapping operation has been built up over the past five years by attaching intercept probes to the transatlantic cables where they land on British shores. GCHQ’s station in Bude, north Cornwall, plays a role. The cables carry data to western Europe from telephone exchanges and internet servers in north America. This allows GCHQ and NSA analysts to search vast amounts of data on the activity of millions of internet users. Metadata – the sites users visit, whom they email, and similar information – is stored for up to 30 days, while the content of communications is typically stored for three days.

    GCHQ has the ability to tap cables carrying both internet data and phone calls. By last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.

    Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.

    This operation is carried out under clandestine agreements with the seven companies, described in one document as “intercept partners”. The companies are paid for logistical and technical assistance.

    The identity of the companies allowing GCHQ to tap their cables was regarded as extremely sensitive within the agency. Though the Tempora programme itself was classified as top secret, the identities of the cable companies was even more secret, referred to as “exceptionally controlled information”, with the company names replaced with the codewords, such as “GERONTIC”, “REMEDY” and “PINNAGE”.

    However, some documents made it clear which codenames referred to which companies. GCHQ also assigned the firms “sensitive relationship teams”. One document warns that if the names emerged it could cause “high-level political fallout”.

    Germans have been enraged by the revelations of spying by the National Security Agency and GCHQ after it emerged that both agencies were hoovering up German data as well. On Friday the Süddeutsche said it was now clear that private telecoms firms were far more deeply complicit in US-UK spying activities than had been previously thought.

    The source familiar with intelligence maintained in June that GCHQ was “not looking at every piece of straw” but was sifting a “vast haystack of data” for what he called “needles”.

    He added: “If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic – British people talking to each other.” The source said analysts used four criteria for determining what was examined: security, terror, organised crime and Britain’s economic wellbeing.”The vast majority of the data is discarded without being looked at … we simply don’t have the resources.”

    Nonetheless, the agency repeatedly referred to plans to expand this collection ability still further in the future.

    Once it is collected, analysts are able to search the information for emails, online chats and browsing histories using an interface called XKeyscore, uncovered in the Guardian on Wednesday. By May 2012, 300 analysts from GCHQ and 250 NSA analysts had direct access to search and sift through the data collected under the Tempora program.

    Documents seen by the Guardian suggest some telecoms companies allowed GCHQ to access cables which they did not themselves own or operate, but only operated a landing station for. Such practices could raise alarm among other cable providers who do not co-operate with GCHQ programmes that their facilities are being used by the intelligence agency.

    Telecoms providers can be compelled to co-operate with requests from the government, relayed through ministers, under the 1984 Telecommunications Act, but privacy advocates have raised concerns that the firms are not doing enough to challenge orders enabling large-scale surveillance, or are co-operating to a degree beyond that required by law.

    “We urgently need clarity on how close the relationship is between companies assisting with intelligence gathering and government,” said Eric King, head of research for Privacy International. “Were the companies strong-armed, or are they voluntary intercept partners?”

    Vodafone said it complied with the laws of all the countries in which its cables operate. “Media reports on these matters have demonstrated a misunderstanding of the basic facts of European, German and UK legislation and of the legal obligations set out within every telecommunications operator’s licence … Vodafone complies with the law in all of our countries of operation,” said a spokesman.

    “Vodafone does not disclose any customer data in any jurisdiction unless legally required to do so. Questions related to national security are a matter for governments not telecommunications operators.”

    A spokeswoman for Interoute said: “As with all communication providers in Europe we are required to comply with European and local laws including those on data protection and retention. From time to time we are presented with requests from authorities. When we receive such requests, they are processed by our legal and security teams and if valid, acted upon.”

    A spokeswoman for Verizon said: “Verizon continually takes steps to safeguard our customers’ privacy. Verizon also complies with the law in every country in which we operate.”

    BT declined to comment.

    James Ball, Luke Harding and Juliette Garside
    The Guardian, Friday 2 August 2013 18.36 BST

    Find this story at 2 August 2013

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Newly declassified documents on phone records program released (2013)

    Obama administration officials faced deepening political skepticism Wednesday about a far-reaching counterterrorism program that collects millions of Americans’ phone records, even as they released newly declassified documents in an attempt to spotlight privacy safeguards.

    The previously secret material — a court order and reports to Congress — was released by Director of National Intelligence James R. Clapper as a Senate Judiciary Committee hearing opened Wednesday morning in which lawmakers sharply questioned the efficacy of the collection of bulk phone records. A senior National Security Agency official conceded that the surveillance effort was the primary tool in thwarting only one plot — not the dozens that officials had previously suggested.

    Read the documents
    NSA
    Secret FISA court order to Verizon
    The Obama administration declassified government documents related to NSA collection of telephone metadata records on Wednesday.
    Graphic
    How the secret FISA court works Click Here to View Full Graphic Story
    How the secret FISA court works
    Click here to subscribe.

    In recent weeks, political support for such broad collection has sagged, and the House last week narrowly defeated a bipartisan bid to end the program, at least in its current form. On Wednesday, senior Democratic senators voiced equally strong doubts.

    “This bulk-collection program has massive privacy implications,” said Senate Judiciary Committee Chairman Patrick J. Leahy (Vt.). “The phone records of all of us in this room — all of us in this room — reside in an NSA database. I’ve said repeatedly, just because we have the ability to collect huge amounts of data does not mean that we should be doing so. . . . If this program is not effective, it has to end. So far, I’m not convinced by what I’ve seen.”

    Administration officials defended the collection effort and a separate program targeting foreigners’ communication as essential and operating under stringent guidelines.

    “With these programs and other intelligence activities, we are constantly seeking to achieve the right balance between the protection of national security and the protection of privacy and civil liberties,” Deputy Attorney General James Cole said. “We believe these two programs have achieved the right balance.”

    Cole nonetheless said the administration is open to amending the program to achieve greater public trust. Legislation is pending in the Senate that would narrow its scope.

    The NSA program collecting phone records began after the September 2001 terrorist attacks and was brought under the supervision of the Foreign Intelligence Surveillance Court in 2006. But its existence remained hidden until June, when the Guardian newspaper in Britain published a classified FISC order to a U.S. phone company to turn over to the NSA all call records. Former NSA contractor Edward Snowden leaked the order to the newspaper.

    On Wednesday, the Guardian published new documents provided by Snowden that outlined previously unknown features of an NSA data-retrieval system called XKeyscore. The newspaper reported that the search tool allowed analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”

    NSA slides describing the system published with the Guardian article indicated that analysts used it to sift through government databases, including Pinwale, the NSA’s primary storage system for e-mail and other text, and Marina, the primary storage and analysis tool for “metadata.” Another slide described analysts using XKeyscore to access a database containing phone numbers, e-mail addresses, log-ins and Internet user activity generated from other NSA programs.

    The newspaper said the disclosures shed light on Snowden’s claim that the NSA’s surveillance programs allowed him while sitting at his desk to “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal ­e-mail.” U.S. officials have denied that he had such capability.

    In a statement responding to the Guardian report, the NSA said “the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against — and only against — legitimate foreign intelligence targets.” The agency further said: “Access to XKEYSCORE, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks. . . . Not every analyst can perform every function, and no analyst can operate freely. Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.”

    On Wednesday, Clapper disclosed the FISA court’s “primary” order that spells out the program’s collection rules and two reports to Congress that discussed the program, which is authorized under Section 215 of the “business records” provision of the Foreign Intelligence Surveillance Act. Administration officials released the documents to reassure critics that the program is strictly supervised and minimally invasive.

    For instance, the primary order states that only “appropriately trained and authorized personnel” may have access to the records, which consist of phone numbers of calls made and received, their time and duration, but not names and content. Officials call this metadata. The order also states that to query the data, there must be “reasonable, articulable suspicion,” presumably that the number is linked to a foreign terrorist group.

    But the documents fueled more concern about the program’s scope among civil liberties advocates who are pressing the administration to release the legal rationale that might explain what makes such large numbers of records relevant to an authorized investigation. Perhaps most alarming to some critics was the disclosure, in the order, that queries of the metadata return results that are placed into a “corporate store” that may then be searched for foreign intelligence purposes with fewer restrictions.

    That disclosure takes on significance in light of Deputy NSA Director John C. Inglis’s testimony last month that analysts could extend their searches by “three hops.” That means that starting from a target’s phone number, analysts can search on the phone numbers of people in contact with the target, then the numbers of people in contact with that group, and then the numbers of people in contact with that larger pool. That is potentially millions of people, said Jameel Jaffer, deputy legal director of the American Civil Liberties Union, who also testified Wednesday.

    The Office of the DNI earlier released a statement that fewer than 300 numbers were queried in 2012. That could still mean potentially hundreds of millions of records, Sen. Richard J. Durbin (D-Ill.) said at the hearing.

    Also, according to the order, the NSA does not need to audit the results of searches of the corporate store.

    The order asserts that phone metadata could be obtained with a grand jury subpoena. That may be true for one person or even a group of people, but not for all Americans’ phone records, critics said.

    Privacy advocates criticized redactions in the reports to Congress of information about the NSA’s failure to comply with its own internal rules. That is “among the most important information that the American public needs to critically assess whether these programs are proper,” said Mark Rumold, a staff lawyer at the Electronic Frontier Foundation.

    At the hearing, Leahy voiced upset with the administration for suggesting that the program was as effective in thwarting terrorist plots as another NSA program, authorized under Section 702 of FISA and targeting foreigners’ communications. “I don’t think that’s a coincidence when we have people in government make that comparison, but it needs to stop,” he said of attempts to conflate the two programs’ utility.

    He noted that senior officials had testified that the phone logging effort was critical to thwarting 54 plots, but after reviewing NSA material, he said that assertion cannot be made — “not by any stretch.” Pressed by Leahy on the point, Inglis admitted that the program “made a contribution” in 12 plots with a domestic nexus, but only one case came close to a “but-for” or critical contribution.

    Carol D. Leonnig and William Branigin contributed to this report.

    By Ellen Nakashima, Published: July 31, 2013

    Find this story at 31 July 2013

    © 1996-2014 The Washington Post

    Telekom-Riesen helfen den Geheimdiensten (2013)

    Der britische Geheimdienst wurde bei Abhöraktionen umfangreicher von Telekommunikationsfirmen unterstützt als bislang bekannt. Das berichten “Süddeutsche Zeitung” und NDR. Sogar Programmierarbeit soll an die Firmen ausgelagert worden sein.

    Berlin – Laut übereinstimmenden Berichten des NDR und der “Süddeutschen Zeitung” (SZ) sind einige private Telekommunikationsunternehmen stärker in die Abhöraktionen ausländischer Geheimdienste verwickelt als bisher angenommen. Der britische Geheimdienst GCHQ etwa, ein enger Partner des US-Diensts NSA, arbeite beim Abhören des Internetverkehrs mit sieben großen Firmen zusammen.

    NDR und “Süddeutsche Zeitung” beziehen sich in ihren Berichten auf Dokumente des ehemaligen NSA-Vertragsmitarbeiters Edward Snowden, die sie einsehen konnten. Die interne Präsentation von 2009 nennt neben den internationalen Unternehmen British Telecom, Verizon und Vodafone auch die Netzwerkbetreiber Level 3, Interoute, Viatel und Global Crossing als Schlüsselpartner des GCHQ. Global Crossing wurde inzwischen von Level 3 gekauft.

    Gemeinsam spannen die Unternehmen laut NDR und “SZ” ein engmaschiges Datennetz über Europa und weite Teile der Welt. Einige Firmen wie Level 3 betreiben in Deutschland demnach große Datenzentren. Demnach betreibt Level 3 Rechenzentren in mehreren deutschen Städten, ein Transatlantikkabel von Global Crossing ist in Westerland auf Sylt mit deutschen Netzen verbunden. Das Unternehmen Interoute, das den Unterlagen zufolge auch mit dem GCHQ kooperiert, betreibt 15 Netzknoten in Deutschland.

    Teilweise sei die Kooperation mit dem Geheimdienst über den einfachen Zugang zu den Datennetzen hinausgegangen, berichten “SZ” und NDR. Einige Firmen sollen laut den Dokumenten sogar Computerprogramme entwickelt haben, um dem britischen Geheimdienst das Abfangen von Daten aus ihren Netzen zu erleichtern. Faktisch habe der GCHQ einen Teil seiner Ausspäharbeit an Privatunternehmen delegiert.

    Viatel bestreitet Zusammenarbeit

    Die meisten der Unternehmen verwiesen laut NDR und “SZ” auf Gesetze, die Regierungen erlaubten, Firmen unter bestimmten Umständen zur Herausgabe von Informationen zu verpflichten. Viatel widersprach den Angaben und erklärte, nicht mit dem GCHQ zu kooperieren und dem Geheimdienst auch keinen Zugang zur eigenen Infrastruktur oder zu Kundendaten zu gewähren.

    02. August 2013, 09:20 Uhr

    Find this story at 2 August 2013

    © SPIEGEL ONLINE 2013

    Agreements with private companies protect U.S. access to cables’ data for surveillance (2013)

    The U.S. government had a problem: Spying in the digital age required access to the fiber-optic cables traversing the world’s oceans, carrying torrents of data at the speed of light. And one of the biggest operators of those cables was being sold to an Asian firm, potentially complicating American surveillance efforts.

    Enter “Team Telecom.”

    In months of private talks, the team of lawyers from the FBI and the departments of Defense, Justice and Homeland Security demanded that the company maintain what amounted to an internal corporate cell of American citizens with government clearances. Among their jobs, documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.

    This “Network Security Agreement,” signed in September 2003 by Global Crossing, became a model for other deals over the past decade as foreign investors increasingly acquired pieces of the world’s telecommunications infrastructure.

    The publicly available agreements offer a window into efforts by U.S. officials to safeguard their ability to conduct surveillance through the fiber-optic networks that carry a huge majority of the world’s voice and Internet traffic.

    The agreements, whose main purpose is to secure the U.S. telecommunications networks against foreign spying and other actions that could harm national security, do not authorize surveillance. But they ensure that when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely, say people familiar with the deals.

    Negotiating leverage has come from a seemingly mundane government power: the authority of the Federal Communications Commission to approve cable licenses. In deals involving a foreign company, say people familiar with the process, the FCC has held up approval for many months while the squadron of lawyers dubbed Team Telecom developed security agreements that went beyond what’s required by the laws governing electronic eavesdropping.

    The security agreement for Global Crossing, whose fiber-optic network connected 27 nations and four continents, required the company to have a “Network Operations Center” on U.S. soil that could be visited by government officials with 30 minutes of warning. Surveillance requests, meanwhile, had to be handled by U.S. citizens screened by the government and sworn to secrecy — in many cases prohibiting information from being shared even with the company’s executives and directors.

    “Our telecommunications companies have no real independence in standing up to the requests of government or in revealing data,” said Susan Crawford, a Yeshiva University law professor and former Obama White House official. “This is yet another example where that’s the case.”

    The full extent of the National Security Agency’s access to fiber-optic cables remains classified. The Office of the Director of National Intelligence issued a statement saying that legally authorized data collection “has been one of our most important tools for the protection of the nation’s — and our allies’ — security. Our use of these authorities has been properly classified to maximize the potential for effective collection against foreign terrorists and other adversaries.”

    It added, “As always, the Intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens.”

    Collecting information

    Documents obtained by The Washington Post and Britain’s Guardian newspaper in recent weeks make clear how the revolution in information technology sparked a revolution in surveillance, allowing the U.S. government and its allies to monitor potential threats with a reach impossible only a few years earlier.

    Yet any access to fiber-optic cables allows for possible privacy intrusions into Americans’ personal communications, civil libertarians say.

    As people worldwide chat, browse and post images through online services, much of the information flows within the technological reach of U.S. surveillance. Though laws, procedural rules and internal policies limit how that information can be collected and used, the data from billions of devices worldwide flow through Internet choke points that the United States and its allies are capable of monitoring.

    This broad-based surveillance of fiber-optic networks runs parallel to the NSA’s PRISM program, which allows analysts to access data from nine major Internet companies, including Google, Facebook, Microsoft, Yahoo, AOL and Apple, according to classified NSA PowerPoint slides. (The companies have said the collection is legal and limited.)

    One NSA slide titled, “Two Types of Collection,” shows both PRISM and a separate effort labeled “Upstream” and lists four code names: Fairview, Stormbrew, Blarney and Oakstar. A diagram superimposed on a crude map of undersea cable networks describes the Upstream program as collecting “communications on fiber cables and infrastructure as data flows past.”

    The slide has yellow arrows pointing to both Upstream and PRISM and says, “You Should Use Both.” It also has a header saying “FAA 702 Operations,” a reference to a section of the amended Foreign Intelligence Surveillance Act that governs surveillance of foreign targets related to suspected terrorism and other foreign intelligence.

    Under that provision, the government may serve a court order on a company compelling it to reach into its networks for data on multiple targets who are foreigners reasonably believed to be overseas. At an Internet gateway, the government may specify a number of e-mail addresses of foreigners to be targeted without the court signing off on each one.

    When the NSA is collecting the communications of a foreign, overseas target who is speaking or e-mailing with an American, that American’s e-mail or phone call is considered to be “incidentally” collected. It is considered “inadvertently” collected if the target actually turns out to be an American, according to program rules and people familiar with them. The extent of incidental and inadvertent collection has not been disclosed, leading some lawmakers to demand disclosure of estimates of how many Americans’ communications have been gathered. No senior intelligence officials have answered that question publicly.

    Using software that scans traffic and “sniffs out” the targeted e-mail address, the company can pull out e-mail traffic automatically to turn over to the government, according to several former government officials and industry experts.

    It is unclear how effective that approach is compared with collecting from a “downstream” tech company such as Google or Facebook, but the existence of separate programs collecting data from both technology companies and telecommunications systems underscores the reach of government intelligence agencies.

    “People need to realize that there are many ways for the government to get vast amounts of e-mail,” said Chris Soghoian, a technology expert with the American Civil Liberties Union.

    Controlling the data flow

    The drive for new intelligence sources after the Sept. 11, 2001, attacks relied on a key insight: American companies controlled most of the Internet’s essential pipes, giving ample opportunities to tap the torrents of data flowing by. Even terrorists bent on destruction of the United States, it turned out, talked to each other on Web-based programs such as Microsoft’s Hotmail.

    Yet even data not handled by U.S.-based companies generally flowed across parts of the American telecommunications infrastructure. Most important were the fiber-optic cables that largely have replaced the copper telephone wires and the satellite and microwave transmissions that, in an earlier era, were the most important targets for government surveillance.

    Fiber-optic cables, many of which lie along the ocean floor, provide higher-quality transmission and greater capacity than earlier technology, with the latest able to carry thousands of gigabits per second.

    The world’s hundreds of undersea cables now carry 99 percent of all intercontinental data, a category that includes most international phone calls, as well, says TeleGeography, a global research firm.

    The fiber-optic networks have become a rich source of data for intelligence agencies. The Guardian newspaper reported last month that the Government Communications Headquarters, the British equivalent of the NSA, taps and stores data flowing through the fiber-optic cables touching that nation, a major transit point for data between Europe and the Americas. That program, code-named Tempora, shares data with the NSA, the newspaper said.

    Tapping undersea transmission cables had been a key U.S. surveillance tactic for decades, dating back to the era when copper lines carrying sensitive telephone communications could be accessed by listening devices divers could place on the outside of a cable’s housing, said naval historian Norman Polmar, author of “Spy Book: The Encyclopedia of Espionage.”

    “The U.S. has had four submarines that have been outfitted for these special missions,” he said.

    But the fiber-optic lines — each no thicker than a quarter — were far more difficult to tap successfully than earlier generations of undersea technology, and interception operations ran the risk of alerting cable operators that their network had been breached.

    It’s much easier to collect information from any of dozens of cable landing stations around the world — where data transmissions are sorted into separate streams — or in some cases from network operations centers that oversee the entire system, say those familiar with the technology who spoke on the condition of anonymity to discuss sensitive intelligence matters.

    Expanding powers

    In the aftermath of the Sept. 11 attacks, the NSA said its collection of communications inside the United States was constrained by statute, according to a draft report by the agency’s inspector general in 2009, which was obtained by The Post and the Guardian. The NSA had legal authority to conduct electronic surveillance on foreigners overseas, but the agency was barred from collecting such information on cables as it flowed into and through the United States without individual warrants for each target.

    “By 2001, Internet communications were used worldwide, underseas cables carried huge volumes of communications, and a large amount of the world’s communications passed through the United States,” the report said. “Because of language used in the [Foreign Intelligence Surveillance] Act in 1978, NSA was required to obtain court orders to target e-mail accounts used by non-U.S. persons outside the United States if it intended to intercept the communications at a webmail service within the United States. Large numbers of terrorists were using such accounts in 2001.”

    As a result, after White House and CIA officials consulted with the NSA director, President George W. Bush, through a presidential order, expanded the NSA’s legal authority to collect communications inside the United States. The President’s Surveillance Program, the report said, “significantly increased [NSA’s] access to transiting foreign communications.”

    Gen. Michael Hayden, then the NSA director, described that information as “the real gold of the program” that led to the identification of threats within the United States, according to the inspector general’s report.

    Elements of the President’s Surveillance Program became public in 2005, when the New York Times reported the government’s ability to intercept e-mail and phone call content inside the United States without court warrants, sparking controversy. The FISA court began oversight of those program elements in 2007.

    As these debates were playing out within the government, Team Telecom was making certain that surveillance capacity was not undermined by rising foreign ownership of the fiber-optic cables that the NSA was using.

    The Global Crossing deal created particular concerns. The company had laid an extensive network of undersea cables in the world, but it went bankrupt in 2002 after struggling to handle more than $12 billion in debt.

    Two companies, one from Singapore and a second from Hong Kong, struck a deal to buy a majority stake in Global Crossing, but U.S. government lawyers immediately objected as part of routine review of foreign investment into critical U.S. infrastructure.

    President Gerald Ford in 1975 had created an interagency group — the Committee on Foreign Investment in the United States, or CFIUS — to review deals that might harm U.S. national security. Team Telecom grew out of that review process. Those executive branch powers were expanded several times over the decades and became even more urgent after the Sept. 11 attacks, when the Defense Department became an important player in discussions with telecommunications companies.

    The Hong Kong company soon withdrew from the Global Crossing deal, under pressure from Team Telecom, which was worried that the Chinese government might gain access to U.S. surveillance requests and infrastructure, according to people familiar with the negotiations.

    Singapore Technologies Telemedia eventually agreed to a slate of concessions, including allowing half of the board of directors of a new subsidiary managing the undersea cable network to consist of American citizens with security clearances. They would oversee a head of network operations, a head of global security, a general counsel and a human resources officer — all of whom also would be U.S. citizens with security clearances. The FBI and the departments of Defense, Justice and Homeland Security had the power to object to any appointments to those jobs or to the directors who had to be U.S. citizens.

    U.S. law already required that telecommunications companies doing business in the United States comply with surveillance requests, both domestic and international. But the security agreement established the systems to ensure that compliance and to make sure foreign governments would not gain visibility into the working of American telecommunications systems — or surveillance systems, said Andrew D. Lipman, a telecommunications lawyer who has represented Global Crossing and other firms in negotiating such deals.

    “These Network Security Agreements flesh out the details,” he said.

    Lipman, a partner with Bingham McCutchen, based in Washington, said the talks with Team Telecom typically involve little give and take. “It’s like negotiating with the Motor Vehicle Department,” he said.

    Singapore Technologies Telemedia sold Global Crossing in 2011 to Level 3 Communications, a company based in Colorado. But the Singaporean company maintained a minority ownership stake, helping trigger a new round of review by Team Telecom and a new Network Security Agreement that added several new conditions.

    A spokesman for Level 3 Communications declined to comment for this article.

    By Craig Timberg and Ellen Nakashima, Published: July 7, 2013

    Find this story at 7 July 2013

    © 1996-2014 The Washington Post

    << oudere artikelen  nieuwere artikelen >>