Canadian embassies eavesdrop, leak says8 november 2013
A new leak suggests that Canada is using some of its embassies abroad for electronic-eavesdropping operations that work in concert with similar U.S. programs.
A U.S. National Security Agency document about a signals intelligence (SigInt) program codenamed “Stateroom” was published this week by Germany’s Der Spiegel magazine. The document, a guide to the program, was among material obtained by former NSA contractor Edward Snowden.
“STATEROOM sites are covert SIGINT collection sites located in diplomatic facilities abroad,” the leaked document says. “SIGINT agencies hosting such sites include … Communication Security Establishments [sic] or CSE (at Canadian diplomatic facilities).”
The leaked document does not give the locations of the alleged listening posts. It says that, in general, such surveillance equipment is often concealed “in false architectural features or roof maintenance sheds” atop embassies. “Their true mission is not known by the majority of diplomatic staff at the facility,” it adds
A Parliamentarian who on Tuesday introduced a motion to increase scrutiny of federal intelligence agencies said the document shows Canadians do not know enough about the Communications Security Establishment Canada (CSEC).
“We really don’t know what they’re up to,” said Jack Harris, the NDP’s long-serving defence critic. “… We’re dealing with the secret work of spies and intelligence and whether what is being done is what ought to be done.”
Government representatives at CSEC and Foreign Affairs declined to comment directly on the leak. A spokeswoman for Defence Minister Rob Nicholson, who gives CSEC its direction, also declined to comment.
In 1995, former CSEC employee Mike Frost wrote in his memoir, Spyworld, that he set up “listening posts” at Canadian embassies. His book says CSEC signals intelligence technicians during the Cold War were funded and mentored by NSA counterparts who taught them how to conceal a piece of spy machinery inside what appeared to be an office safe.
One 1972 caper recounted in the book involved agents cutting a five-foot satellite dish into 12 wedges and smuggling the equipment into Moscow before reassembling it in the attic of the Canadian embassy there. Reports were then passed back to Canada in diplomatic bags, according to the book. It was a standard courtesy for CSEC to turn off its listening gear in Moscow when important British or U.S. allies visited, according to Spyworld.
Newly leaked material indicates that close partnerships still exist among the so-called “Five Eyes” – the alliance of intelligence agencies from English-speaking countries that agree not to spy on each other while collecting intelligence on just about everybody else.
The Five Eyes agencies may have teamed up to spy on BlackBerrys belonging to foreign diplomats at a 2009 meeting of the G20 in London, according to a previously published leak from Mr. Snowden, who now lives in Moscow as the United States seeks to arrest him on espionage charges.
According to the Stateroom document, Britain, Canada, the United States and Australia still run interrelated surveillance operations from their embassies. (New Zealand, the fifth “eye,” is not mentioned.)
“It’s not surprising, but it is certainly significant that it is disclosed,” said Wesley Wark, a Canadian professor who specializes in intelligence matters. “… There is still great value in having close access to telecommunications around the world, particularly if you are interested in cellphone communications.”
Mr. Wark’s point about “close” spying contrasts with a more far-reaching 21st century surveillance methodology highlighted earlier this month.
A leaked 2012 presentation showed that CSEC officers analyzed communications flow around Brazil’s energy ministry. This suggests CSEC has access to vast databases of previously logged global telecommunications traffic – giving the agency a very far reach in determining which telephones and computer servers in the world might yield the most intelligence for Canada.
COLIN FREEZE
The Globe and Mail
Published Tuesday, Oct. 29 2013, 11:59 AM EDT
Last updated Tuesday, Oct. 29 2013, 9:54 PM EDT
Find this story at 29 October 2013
© Copyright 2013 The Globe and Mail Inc.
Five reasons our international eavesdropping isn’t worth the cost8 november 2013
Few things can get a government leader into hot water with important international partners faster than getting caught intercepting their mail, literally or electronically, as both President Barack Obama and Prime Minister Stephen Harper can attest. Similarly, few things can be as seductive to government officials as intelligence, and few things more politically risky. What governments can do technologically should not dictate what they will do politically; capacity unbounded by a well-managed overarching political strategy can lead to errors in judgment with serious and far-reaching consequences.
The reality is that the value of intelligence can be, and frequently is, over-rated.
The revelations by Edward Snowden keep coming, undermining trust in the United States among its allies. The U.S. National Security Administration, one of reportedly 15 American intelligence agencies with an estimated cumulative budget of $75-billion, has been outed for gathering data from friend and foe alike. In France, the NSA apparently vacuumed up 70 million digital communications in a single month. In Spain, the number was reportedly 60 million electronic communications. The United Nations Secretary General has been a target as have Mexico’s current and former presidents and the German Chancellor. The Germans, who long endured the espionage predations of the old East German Stasi, and who considered themselves a steadfast ally of Washington, are particularly distressed that Chancellor Angela Merkel has been an NSA target.
What kind of ally would bug the German Chancellor’s mobile phone for a decade? In what respect exactly was Chancellor Merkel a security risk to the Americans? If Presidents Bush and Obama wanted to know what she thought, why did they not just pick up the phone and ask her, or meet with her at any of the numerous summits they attended together? The alleged bugging of the communications of 34 other leaders around the world that Mr. Snowden claims happened will doubtless produce more unhappy surprises. In Brazil the United States was revealed to be spying both on the communications of President Dilma Rouseff and on the Brazilian national oil company Petrobras. Meanwhile, Canada’s Communications Security Establishment was revealed to be spying on the Brazilian Ministry of Mining and Energy.
The repercussions are potentially very serious. The sheer scale of electronic eavesdropping and the impudence with which it is undertaken have hit nerves worldwide. Consumers in this digital age, who paradoxically are more ready to tolerate the pervasive incursions of foreign corporations into their lives than the snooping of foreign governments, are up in arms. Allied governments, whose outrage appears partly but not wholly tactical, are threatening a range of retaliations. The European Parliament has sent a delegation to Washington seeking explanations. The Germans, who want to be removed from the NSA targets list, as do others, have dispatched their intelligence chiefs to Washington this week to seek cooperation.
Meanwhile, the European Union parliament is threatening to delay U.S.-EU free trade negotiations and contemplating privacy legislation that would force American internet companies like Google and Yahoo on the pain of heavy fines to get EU approval before complying with U.S. warrants seeking e-mails and search histories of EU citizens. Germany and Brazil are promoting a resolution at the UN that would call on states to respect privacy rights under the 1976 International Covenant on Civil and Political Rights particularly as regards the extraterritorial surveillance of private communications of citizens in foreign jurisdictions. Perhaps the most significant cost of the Snowden revelations is that American (and Canadian) policy to promote multi-stakeholder governance of the Internet and to limit its regulation by governments is in serious jeopardy. NSA meta-data dragnets around the world have made the case for greater national control of the Internet more persuasively than the Chinese, Russians and Iranians ever could. Meanwhile, Deutsche Telekom among others is launching a new encrypted service using only data centres located on German soil. The Balkanization of the Internet looms.
The gap between American words and American deeds has grown too wide for foreign governments and their publics to ignore. This week’s protestations by American leaders that American spying saves lives, including European lives, are seen as self-serving piffle. No lives were at stake in the German Chancellor’s office, nor were there any terrorists, as one Brazilian legislator observed, at the bottom of any Brazilian oil well. The excuse that ”they all do it” is equally unpersuasive. Although the French Direction Générale de la Sécurité Extérieure, the German Nachtrichtendienst and the Brazilian Agência Brasileira de Inteligência do do it, the point is not who else is dissembling but how effective intelligence is and at what political, financial and moral costs it is purchased. In Washington, after initially blowing off others’ concerns, the Obama administration and Congress are having second thoughts about the wisdom of spying on allies.
Here are five lessons we can draw from all this for Canada.
First, secrets are hard to keep in the digital world. The intelligence leadership and their political masters should presume that they will see their decisions on The front page of the Globe and Mail one day.
Second, intelligence is a means not an end, and not all its purposes – national security, counter-terrorism, communications security, commercial secrets and economic advantage – are equally compelling. Mature judgment is a must if sound decisions are to be made about the risks that are worth running – or not. For example, at a time when our Governor-General, Prime Minister, Foreign Minister, Trade Minster and other ministers had visited Brazil to court the government, was it really worth spying on the Brazilian Ministry of Energy and Mines, as we are alleged to have done?
Third, membership in the Five Eyes intelligence-sharing group (the US, UK, Canada, Australia and New Zealand), which dates from the end of the Second World War, entails costs as well as benefits and needs to be kept under sober review. Rubbing shoulders with the American intelligence community can be intoxicating, a poor condition in which to make important judgments.
Fourth, intelligence can be and frequently is over-rated. Spending on intelligence and diplomacy needs to be re-balanced. While intelligence operates beyond the pale of international law, diplomacy is both legally sanctioned and uncontroversial, and effective, in its creation of trusting relationships, effective. It does not make sense at a time when intelligence expenditures have grown dramatically, and CSEC is erecting a billion-dollar building in Ottawa, that the Foreign Affairs department is selling off assets abroad to cover a shrinking budget.
Fifth, leadership matters. The key challenge is not so much to do things right as it is to do the right things. Oversight to ensure that Canadian laws are not being broken is important and needs reinforcement, but coherent, strategic policy leadership that ensures that the intelligence tail never wags the foreign policy dog is crucial. Technological capacity should never trump political judgment.
The Globe and Mail
Paul Heinbecker
Wednesday, October 30, 2013
Find this story at 30 October 2013
© Copyright 2013 The Globe and Mail Inc.
Canadian embassies in U.S.-led spying efforts: Der Spiegel documents; Documents leaked by Snowden say CSEC took part in spying8 november 2013
Canadian Prime Minster Stephen Harper responds to questions as German Chancellor Angela Merkel looks on during a joint news conference on Parliament Hill, in Ottawa, Thursday August 16, 2012.
Photo: THE CANADIAN PRESS/Fred Chartrand
comment
Canadian embassies have been used to house equipment that collected signals intelligence as part of a U.S.-led spying effort, according to documents reportedly leaked by whisteblower Edward Snowden.
German news magazine Der Spiegel published a series of documents provided by Snowden, a former contractor of the National Security Agency (NSA), that detail a surveillance program codenamed “Stateroom.” According to Der Spiegel, the NSA together with the CIA placed secretive eavesdropping stations at diplomatic outposts to collect signals intelligence, also known as SigInt, on the host countries.
At U.S.-owned facilities, this was known as the “Special Collection Service,” according to the documents. However, one leaked page also indicates that Canadian diplomatic facilities were used and suggests that Communications Security Establishment Canada (CSEC) took part in the project.
The document also mentions the use of British and Australian diplomatic facilities. These monitoring stations, according to Der Spiegel, are concealed and typically placed on the upper floors or rooftops of embassies or consulates. The equipment is used to intercept communications, Der Spiegel reported.
“These sites are small in size and in number of personnel staffing them,” the document says. “They are covert, and their true mission is not know by the majority of the diplomatic staff at the facility where they are assigned.”
Der Spiegel notes: “The presence of these spying units ranks among the agency’s best-guarded secrets. After all, they are politically precarious: There are very few cases in which their use has been authorized by the local host countries.”
The documents were published along with stories looking at how the U.S. spies on European countries and specifically Germany. Last week, Der Spiegel reported they had documents showing the U.S. was monitoring German Chancellor Angela Merkel’s mobile phone.
The report caused a diplomatic rift and Merkel’s government summoned the U.S. ambassador seeking answers. U.S. President Barack Obama has said he didn’t know the NSA was monitoring the communications of allied world leaders.
The document mentioning Canadian facilities is a glossary accompanying a Stateroom guide. Canada and CSEC are listed in the definition for “Stateroom sites,” which are “covert SIGINT collection sites located in diplomatic facilities abroad.”
Canada is part of Five Eyes, the name of a sort of allied club of Western countries that has pledged not to spy on one another. Australia and the U.K. — the two other countries named in the document — are also members along with the U.S. and New Zealand. There’s speculation that in the wake of Snowden’s leaks, some countries — like Germany — are going to want to join the club.
As Canadian intelligence blog Lux Ex Umbra points out, a book written by former CSEC employee Mike Frost in 1994 alleged that surveys were done in the 1980s by CSEC to find Canadian embassies suitable for monitoring stations. CSEC has never confirmed that allegation and according to the Canadian Press, will not comment on the latest report in Der Spiegel.
Lauren Strapagiel
Published: October 29, 2013, 4:16 pm
Updated: 2 weeks ago
Find this story at 29 October 2013
© 2013 Postmedia Network Inc.
CSEC aided in U.S.-led spying efforts on diplomats8 november 2013
New revelations indicate that Canada’s ultra-secretive spy agency CSEC may have taken part in U.S.-led efforts to spy on diplomats.
Canada has used diplomatic facilities abroad to house electronic eavesdropping operations allied with American global surveillance programs, according to a recently leaked U.S. document.
A slide presentation leaked to Germany’s Der Spiegel magazine suggests that Communications Security Establishment Canada (CSEC) took part in a broader U.S.-led effort known as “Stateroom” that collect “SigInt” (signals intelligence) from secret installations inside embassies and consulates. Such spying often takes place without the knowledge of the diplomats posted to these missions, the document says.
CSEC could not immediately respond to questions about the leaked document, but generally says it does not break Canadian laws and that it cannot comment on the methods that it uses to collect foreign intelligence.
The document recording Canada’s participation in “Stateroom” was published this week by Der Spiegel magazine in a broader piece about U.S. spying in Germany. The report focused on evidence that Chancellor Angela Merkel’s mobile phone was targeted for surveillance. The disclosure has prompted German officials to openly mull expelling U.S. diplomats.
Relying “mostly” on leaked NSA documents from former U.S. contractor Edward Snowden, Der Spiegel published a leaked “Stateroom Guide” glossary that directly referenced CSEC. On Monday, Canadian blogger Bill Robinson drew attention to the passage on his “Lux Ex Umbra” intelligence blog.
“STATEROOM sites are covert SIGINT collection sites located in diplomatic facilities abroad,” the leaked document says. “SIGINT agencies hosting such sites include … Communication Security Establishments or CSE (at Canadian diplomatic facilities).”
No locations are given for the alleged CSEC outposts in embassies abroad.
The leaked U.S. document goes on to says that such surveillance equipment is concealed – “in false architectural features or roof maintenance sheds” –– and that such operations are highly compartmentalized. “They are covert, and their true mission is not known by the majority of diplomatic staff at the facility where they are assigned.”
Article by Colin Freeze for The Globe and Mail
Find this article at 29 October 2013
© Copyright 2013 The Globe and Mail Inc.
Spy agency won’t say if it uses Canadian embassies; The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.8 november 2013
The German magazine Der Spiegel this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.
OTTAWA—The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.
Lauri Sullivan, a spokeswoman for Communications Security Establishment Canada, says the agency does not comment “on our foreign intelligence collection activities or capabilities.”
German magazine Der Spiegel says Canada is using diplomatic facilities to support surveillance operations in league with key allies the United States, Britain and Australia.
Word of the Canadian reference — first reported by blogger Bill Robinson, who closely tracks CSEC — came as the NDP unsuccessfully sought support in the House of Commons to create a parliamentary committee that would look into stronger oversight for the intelligence community.
The magazine report published this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.
One slide indicates the Canadian spy agency hosts “Stateroom” sites — a term for covert signals-intelligence gathering bases hidden in consulates and embassies.
“These sites are small in size and in number of personnel staffing them,” says the slide. “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned.”
Der Spiegel alleges that the U.S. NSA, Britain’s Government Communications Headquarters and Australia’s Defense Signals Directorate also host such covert stations, with equipment installed on rooftops or upper floors of embassy buildings — protected from view by screens or false structures.
It’s just the latest of several references to the Ottawa-based spy service in Snowden’s cache of leaked materials.
Earlier documents suggest Canada helped the U.S. and Britain spy on participants at the London G20 summit four years ago. Britain’s Guardian newspaper published slides describing the operation, including one featuring the CSEC emblem.
More recently, Brazil demanded answers following accusations CSEC initiated a sophisticated spy operation against the South American country’s ministry of mines and energy.
CSEC, tasked with gathering foreign intelligence of interest to Canada, has a staff of more than 2,000 — including skilled mathematicians, linguists and computer analysts — and a budget of about $350 million.
The recent revelations — including concerns that CSEC gathers information about Canadians in the course of its foreign spying — have sparked criticism from civil libertarians and opposition politicians.
An NDP motion put forward Tuesday by defence critic Jack Harris called for a special committee to study the intelligence oversight systems of other countries and make recommendations “appropriate to Canada’s unique circumstances.” The committee would have reported its findings by May 30 next year.
The motion quickly went down to defeat. The Conservative government maintains CSEC is already subject to scrutiny by an independent commissioner who has never found an instance of the spy service straying outside the law.
By: Jim Bronskill The Canadian Press, Published on Tue Oct 29 2013
Find this story at 29 October 2013
© Copyright Toronto Star Newspapers Ltd. 1996-2013
Slides reveal Canada’s powerful espionage tool8 november 2013
Security experts say that Canadian intelligence has developed a powerful spying tool to scope out and target specific phones and computers so as to better set up hacking and bugging operations.
The outlines of the technology are contained in the slides of a PowerPoint presentation made to allied security agencies in June, 2012. Communications Security Establishment Canada (CSEC) called the tool “Olympia,” showing how its analysts sifted through an immense amount of communications data and zeroed in on the phones and computer servers they determined merited attention – in the demonstration case, inside the Brazilian Ministry of Energy and Mines.
Within weeks, CSEC figured out who was talking to whom by plugging phone numbers and Internet protocol addresses into an array of intelligence databases. In this way it “developed a detailed map of the institution’s communications,” Paulo Pagliusi, a Brazilian security expert who examined the slides, told The Globe.
The slides are part of a large trove of documents that have been leaked by Edward Snowden, the former contractor with the U.S. National Security Agency (NSA) whose disclosures have set off a debate over whether the agency has improperly intruded on the privacy of Americans. Other disclosures have raised questions about its spying on foreign governments, sometimes with the assistance of allied intelligence agencies.
The Globe and Mail has collaborated with the Brazil-based American journalist Glenn Greenwald, based on information obtained from the Snowden documents. Mr. Snowden, who went into hiding in Hong Kong before the first cache of NSA documents was leaked, has been charged by the United States with espionage and theft of government property. Russia has granted him temporary sanctuary.
Canadian officials declined to comment on the slides. Responding to an e-mail requesting comment on whether Canada co-operated with its U.S. counterpart in tapping into Brazilian communications, CSEC spokesman Andy McLaughlin said the agency “cannot comment on its foreign intelligence activities or capabilities.” Prime Minister Stephen Harper said earlier this month that he is “very concerned” about reports CSEC focused on the Brazil ministry.
Any ability to sift through telecommunications data for specific leads can be valuable for electronic-eavesdropping agencies, especially the capacity to map out – without necessarily listening into – an organization’s Internet or voice communications. This, in turn, can help isolate specific devices for potential hacking operations. By developing “Olympia” as a method for doing just this, Canada added to its spymasters’ toolkit.
The PowerPoint presentation by CSEC was first reported by Brazil’s Fantastico TV program, which earlier reported the NSA spying, in conjunction with Mr. Greenwald. Brazilian officials expressed outrage at the United States, but their criticism of Canada was more fleeting. They say they now intend to put public employees on an encrypted e-mail system.
The CSEC presentation – titled Advanced Network Tradecraft – described a technological reconnaissance mission aimed at the Brazilian energy ministry in April and May of 2012. According to the presentation, the agency knew very little about the ministry going in, apart from its Internet domain name and a few associated phone numbers. The presentation never makes clear CSEC’s intentions for targeting the Brazilian ministry.
The leaked slides also suggest Canada sought to partner with the NSA, with one slide saying CSEC was “working with TAO to further examine the possibility” of a more aggressive operation to intercept Internet communications.
“TAO” refers to “tailored access operations,” said Bruce Schneier, a privacy specialist for the Berkman Center for the Internet and Society at Harvard. “It’s the NSA ‘blackbag’ people.” (A “blackbag job” refers to a government-sanctioned break-and-enter operation – hacking in this case – to acquire intelligence.)
It is not clear whether CSEC or the NSA followed up with other actions involving the Brazilian ministry.
COLIN FREEZE AND STEPHANIE NOLEN
WASHINGTON and RIO DE JANEIRO — The Globe and Mail
Published Saturday, Oct. 19 2013, 8:00 AM EDT
Find this story at 19 October 2013
© Copyright 2013 The Globe and Mail Inc.
Canadian spies met with energy firms, documents reveal; Government agency that allegedly spied on Brazil had secret meetings with energy companies8 november 2013
Observers have suggested that Canada’s actions are related to potential competition to its tar sands. Photograph: Orjan F Ellingvag/Corbis
The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations, it has emerged.
Claims of spying on the ministry by Communications Security Establishment Canada (CSEC) come amid the Canadian government’s increasingly aggressive promotion of resource corporations at home and abroad, including unprecedented surveillance and intelligence sharing with companies.
According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.
Meetings were officially billed to discuss “threats” to energy infrastructure but also covered “challenges to energy projects from environmental groups”, “cyber security initiatives” and “economic and corporate espionage”.
The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop “ongoing trusting relations” that would help them exchange information “off the record”, wrote an official from the Natural Resources ministry in 2010.
At the most recent meeting in May 2013, which focused on “security of energy resources development”, meals were sponsored by Enbridge, a Canadian oil company trying to win approval for controversial tar sands pipelines.
Since coming to power, Conservative prime minister, Stephen Harper, has used his government apparatus to serve a natural resources development agenda, while creating sweeping domestic surveillance programs that have kept close tabs on indigenous and environmental opposition and shared intelligence with companies.
Harper has transformed Canada’s foreign policy to offer full diplomatic backing to foreign mining and oil projects, tying aid pledges to their advancement and jointly funding ventures with companies throughout Africa, South America and Asia.
Keith Stewart, an energy policy analyst with Greenpeace Canada, said: “There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.”
Observers have suggested that Canadian spying on Brazil is related to the country’s auctioning of massive offshore oil finds, potential competition to Canada’s tar sands, and Canada’s desire to gain competitive advantage for more than 40 Canadian companies involved in Brazil’s mining sector.
“There is very substantial evidence that the spying Canada was doing for economic reasons aimed at Brazil is far from an aberration,” Guardian columnist Glenn Greenwald told Canadian media on Tuesday. Greenwald hinted that he will be publishing further documents on CSEC.
“We’ve already seen how Canadian embassies around the world essentially act as agents for Canadian companies – even when they’re implicated in serious human rights abuses,” said Jamie Kneen of MiningWatch Canada, an NGO watchdog. “We just had no idea how far they were willing to go.”
Martin Lukacs and Tim Groves
theguardian.com, Wednesday 9 October 2013 12.08 BST
Find this story at 9 October 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Brazil spying allegations part of a ‘war game scenario,’ former official says8 november 2013
A former high-ranking member of Canada’s spy service says he suspects the leaked documents that purport to show Ottawa was spying on Brazil are in fact part of a pretend “wargame scenario.”
“There’s no smoking gun here. It’s again more little snippets and snapshots from the Snowden revelations; they actually mislead more than they inform,” says Ray Boisvert, until last year a deputy director of the Canadian Security Intelligence Service.
“I don’t believe it’s likely Brazil was targeted.”
A Brazilian television report on Sunday said Canada’s electronic eavesdropping agency, the Communication Security Establishment Canada (CSEC) targeted the ministry that manages the South American nation’s vast mineral and oil resources. The report was based on documents leaked by former U.S. National Security Agency contractor Edward Snowden.
Mr. Boisvert, who left the Canadian Security Intelligence Service in 2012, said the top priority for CSIS and CSEC is counter-terrorism. The directive from on high was national security, not infiltrating a Brazilian government department of mining.
“When I worked there, very closely with CSEC and I was a top-line operational leader, we were all too busy chasing bad guys who want to kill people,” the former CSIS official said.
“At the end of the day CSIS and CSEC have a mandate to go after foreign powers if those are acting in a way that’s inimical to our interests, so the poster child for that would be Iran. Everything from nuclear proliferation to state-sponsored terror,” he said.
“Brazil seems highly unlikely to me,” Mr. Boisvert said.
He said one regular practice of security organizations, however, is war-gaming.
“I’m more inclined to think that this is probably a case of a hypothetical scenario,” Mr. Boisvert said.
“CSEC does war gaming just like the military and in their case they look at [computer] networks. Before they go after a target, they will play a game on paper,” he said.
“I have got a funny feeling that is all Snowden has: is just that exploratory war game piece saying ‘OK, what would we do, boys and girls, if we had to do this?’ ”
When pressed Monday for comment on allegations that CSEC spied on Brazilians, the Harper government gave repeated indirect answers to the question, saying the CSE does not conduct surveillance on Canadians.
“This organization cannot and does not target Canadians under Canadian law,” Defence Minister Rob Nicholson said.
Canadians and Brazilians are both working on a United Nations peacekeeping mission in Haiti and Mr. Nicholson rejected the suggestion the revelations might hurt relations between Canada and Brazil. “I believe our collaboration and friendship will continue,” Mr. Nicholson said.
“It’s wise not to get involved with commenting on foreign intelligence gathering activities and so I don’t do that.”
Mr. Boisvert said he assumes the Canadian government is reaching out to Brazil to explain what really happened.
STEVEN CHASE
OTTAWA — The Globe and Mail
Published Monday, Oct. 07 2013, 1:12 PM EDT
Find this story at 7 October 2013
© Copyright 2013 The Globe and Mail Inc.
Charges that Canada spied on Brazil unveil CSEC’s inner workings8 november 2013
Leaked documents showing that Canada’s electronic intelligence-gathering agency targeted the Brazilian government threaten to disrupt relations between the countries – and thrust the secretive CSEC into the public spotlight.
On Sunday night, Brazil’s flagship Fantastico investigative program on the Globo television network revealed leaked documents suggesting that Communications Security Establishment Canada (CSEC) has spied on computers and smartphones affiliated with Brazil’s mining and energy ministry in a bid to gain economic intelligence.
The report, attributed to documents first obtained by the former U.S. government contractor Edward Snowden, includes frames of a CSEC-earmarked presentation that was apparently shared with the United States and other allies in June, 2012.
“Brazilian Ministry of Mines and Energy (MME),” a title page of the leaked case study reads. “New target to develop.”
The presentation then rhetorically asks “How can I use the information available in SIGINT [signals-intelligence] data sources to learn about the target?” before delving into specific hacking techniques.
The documents were part of a collaboration with Globo by Glenn Greenwald. The Rio de Janeiro-based journalist and confidante of Mr. Snowden has spent the past four months steadily disclosing a treasure trove of leaked materials recording the electronic eavesdropping practices of the United States and its allies.
Washington has been reeling from the disclosures. In Brazil, they have caused the most serious rift between the two nations in years – after the first revelations about NSA espionage were made last month, Brazilian president Dilma Rousseff canceled an official state visit to Washington; it was to be the first in 18 years and was intended to showcase the growing economic and political ties between the two countries. Instead Ms. Rousseff went to the UN General Assembly where she complained of “totally unacceptable” U.S. spying in her country. She gained a considerable bump in personal approval ratings after lashing out at the U.S. over the NSA activity, which has elicited a reaction of deep offense from many Brazilians.
***
http://www.theglobeandmail.com/news/world/five-highlights-from-the-canada-brazil-spying-revelations/article14721506/
Five highlights from the Canada-Brazil spying revelations Add to
…
GLOBE STAFF
The Globe and Mail
Published Monday, Oct. 07 2013, 11:02 AM EDT
Canada’s signals-intelligence agency has been spying on Brazil’s Mines and Energy Ministry, according to documents the former U.S. government contractor Edward Snowden leaked to Brazil’s Globo television network.
Globo obtained a copy of a slide presentation made by someone at the Communications Security Establishment Canada (CSEC). The document was shown at a June 2012 gathering of members of the “Five Eyes,” the signals-intelligence alliance of Canada, the United States, Britain, Australia and New Zealand.
Here are some highlights that can be gleaned from the slides:
1. Using a program called Olympia, CSEC took aim at Brazil’s Ministry of Mines and Energy, describing it as a “new target to develop” despite “limited access/target knowledge.”
2. One of the slide shows that CSEC focused on ministry portable devices and was able to identify their carriers (such as Brasil Telecom S.A. or Global Village Telecom), the kind of hardware being used (for example a Nokia 3120 or an Android-based Motorola MRUQ7) and metadata about where calls were placed, in countries such as Peru, Venezuela, Poland, Singapore, Great Britain.
Another slide in the presentation explains how analysts cross-referenced a handset’s SIM card with the network telephone number assigned to it and the handset’s unique number (IMEI).
3. CSEC metadata collection included calls made from the Ministry of Mines and Energy to the Brazilian embassy in Peru and the head office of OLADE, the Latin American Energy Organization, in Quito, Ecuador.
One slide titled showed how the Canadians connected an IP addresses assigned to the ministry to e-mail communications with Canada, Eritrea, Saudi Arabia, Thailand, Afghanistan, Jordan and South Africa.
4. Another phone monitored by CSEC belonged to Paulo Cordeiro de Andrade Pinto, a career diplomat who was ambassador to Canada from 2008 to 2011, and is now Brazil’s Under Secretary for Middle East and Africa.
5. CSEC’s next step was going to be the collection of e-mails and cooperation with a hacking specialists working for a secret unit of the U.S. National Security Agency.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” says a slide titled “Moving Forward.”
The slide mentions TAO (Tailored Access Operations), an NSA unit specializes in installing spyware and tracking devices and has been reported to have played a role in the hunt for Osama Bin Laden.
“I am working with TAO to further examine the possibility for a Man on the Side operation,” the CSEC slide says, alluding to a form of online eavesdropping.
The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.
American lawmakers have introduced several bills that aim to rein in the U.S. National Security Agency’s domestic surveillance programs.
Throughout all this, Canada’s electronic eavesdropping agency has kept a relatively low profile, never before emerging as the central figure in any Snowden-leaked spying program. Although it has existed since the Second World War, CSEC has rarely discussed any of its operations in public.
CSEC has a $350-million budget and 2,000 employees. By law, it has three mandates – to safeguard Canadian government communications and computers from foreign hackers, to help other federal security agencies where legally possible, and to gather “foreign intelligence.”
The federal government is building a new $1-billion headquarters for CSEC on the outskirts of Ottawa.
Given wide latitude by its political and bureaucratic masters to collect what “foreign intelligence” it can, CSEC is exceedingly discreet. The spy agency’s leaders rarely make any public remarks. When they do, they tend only to speak vaguely of the agency’s role in fighting terrorism.
But economic espionage appears to be a business line for CSEC. Former Carleton University Professor Martin Rudner has pointed out that the spy agency started recruiting economists and business analysts in the mid-1990s.
“CSE[C] operations in economic intelligence have gone rather beyond the strictly defensive to also help promote Canadian economic competitiveness,” Mr. Rudner wrote in an essay published in 2000. He added that the spy agency is rumoured to have given the Canadian government a leg up during NAFTA negotiations with Mexico, and also eavesdropped on the 1997 APEC summit.
Mr. Rudner added that Ottawa officials don’t necessarily share with Canadian businesses what CSEC surveillance turns up. Instead, he writes, they “sometimes provide advice and counsel by way of helping to promote Canadian trade, without necessarily revealing their sources in economic intelligence.”
While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.
The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”
The presentation goes on to map out how an individual’s smartphone – “target’s handset” – can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).
The “top secret” presentation also refers to attacks on email servers.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.
The slide suggests the presenter hoped to reach out to American superhackers – the NSA’s “Tailored Access Operations” group – for a more specialized operation: “I am working with TAO to further examine the possibility for a Man on the Side operation.”
A “Man on the Side” operation is a form of interception. According to a recent Guardian column, the NSA has installed secret servers on the Internet that can be used “impersonate a visited Web site” that a target plans to visit. The rerouting of the target’s traffic opens his or her computer or mobile device to invasion by the impersonating website.
The “Top Secret” presentation obtained by Globo is an exceedingly rare disclosure. In Ottawa, CSEC’s employees are sworn to secrecy and visitors to its complex have to check their smartphones, iPads, laptops and memory sticks at the door.
The CSEC-labeled presentation appears to have been shared with the NSA, the agency Mr. Snowden once worked for. He had retained access to the NSA’s data repositories as a security-cleared private contractor, prior to copying reams of material early this year and then flying with it to Hong Kong this summer.
Mr. Snowden leaked the materials to Mr. Greenwald in Hong Kong, prior to flying to Russia to seek asylum. The U.S. government wants to try him on espionage charges.
The leaked “CSEC – Advanced Network Tradecraft” presentation about the Olympia spying program kicks off with an allusion to Greek mythology.
It alludes to how Zeus and his sibling deities waged a 10-year battle to overthrow an older order of gods, known as the Titans. “And they said to the Titans ‘Watch Out OLYMPIAns in the house!” reads a slide in the presentation.
COLIN FREEZE AND STEPHANIE NOLEN
TORONTO AND RIO DE JANEIRO — The Globe and Mail
Published Monday, Oct. 07 2013, 7:14 AM EDT
Find this story at 7 October 2013
© Copyright 2013 The Globe and Mail Inc.
American and Canadian Spies target Brazilian Energy and Mining Ministry8 november 2013
TV Globo’s Fantastico obtains exclusive access to another document leaked by former NSA analyst Edward Snowden
The Plaza of Ministries. The heart of power in Brazil. One of these buildings houses the Ministry of Mines and Energy. On the ground floor, one room is special. Its doors open only to a select few, identified by their thumbprints.
The huge noise in the small room comes from the air conditioning, used to preserve the machines. All of the ministry’s communications go through them – phone calls, e-mail, internet.
They store files with all data on the country’s energy and mineral resources. The room, called The Safe, has steel walls and is disaster-proof. According to the IT specialist, not even a fire or a collapse of the building would harm The Safe. And the protection is not just physical. This is the most secure network on the Plaza of Ministries. It has the same kind of security used by banks, for example. And yet it has been mapped by spies in surprising detail.
The Ministry of Mines and Energy has been targeted by American and Canadian spies.
Fantastico obtained exclusive access to another document leaked by former NSA intelligence analyst Edward Snowden, now exiled in Russia. This document was only identified last week. It was among thousands delivered by Snowden in Hong Kong last June to American journalist Glenn Greenwald, co-author of this story with TV Globo Reporter Sonia Bridi.
Greenwald explains that there are thousands of documents, and it takes time to read, to understand and to make the connections between them.
Over the last ten days, Bridi and Greenwald analyzed and checked the documents with help from specialists in data protection. One presentation showcases the tools employed by the Communications Security Establishment Canada – CSEC.
The target is the Ministry of Mines and Energy of Brazil. This presentation was shown last June at a yearly meeting of analysts from intelligence agencies from five countries. The group is called Five Eyes – the United States, United Kingdom, Canada, Australia and New Zealand. Edward Snowden was present at the conference.
According to Greenwald, the documents are shared so that all are aware of what the others are doing. A computer program called Olympia shows step-b-step how all the ministry’s telephone and computer communications – including e-mails – were mapped.
The caption on one of the slides reveals the aim of the Canadian agency:
“Discover contacts of my target” – the Ministry of Mines and Energy of Brazil.
The result of this monitoring is a detailed map of the Ministry’s communications during a period not specified in the document.
Phone calls made from the Ministry to other countries were used as examples. In Ecuador, the numbers called more often are those of OLADE, the Latin American Energy Organization.
In Peru, the number belongs to the Brazilian Embassy.
Via the internet, the Canadian agency accessed communications between the Ministry’s computers and computers in countries from the Middle East, in South Africa, and in Canada itself.
Information security expert Paulo Pagliusi says He was astonished by the power of these tools. He was specially surprised by the detailed and straightforward way in which the process is explained to intelligence agents, and how thoroughly the Brazilian Ministry’s communications were dissected.
The tool identified cell phone numbers, chip registry and even make and model of the cell phones.
We found out one of them is used by the International Department of the Ministry.
Also by phone, we found another user: Paulo Cordeiro, the former Ambassador of Brazil in Canada, currently posted in the Middle East Department of the Ministry of Foreign Affairs.
Contacted by Fantastico, He declined to comment.
On Friday in Brasilia, the Minister of Mines and Energy, Edison Lobão, considered the issue a very serious one. “This is a grave fact which needs to be condemned. President Dilma Rousseff already has done so strongly at the United Nations,” said Lobão.
In her speech last month at the U.N. General Assembly, President Rousseff declared, “Telecommunication and information technologies cannot become a new battlefield between States.”
President Rousseff herself and Petrobras, the oil company associated with the Ministry, have also been targeted by American spies, as Fantastico has shown exclusively. And both may have been monitored indirectly by accessing the Ministry’s servers.
These servers use private encryption, which means they are protected by a series of codes. One of the servers, for instance, is used to contact the National Oil Agency, Patrobras, Eletrobras, the National Department of Mineral Production and even the President of the Republic. These are State conversations, government strategies which no one should be able to eavesdrop.
Minister Lobão explains that the ministry often contacts different authorities, including the President, by videoconference. “It’s regrettable that all of this is being exposed to espionage.”
Three of the world’s four largest mining companies are based in Canada.
Minister Lobão claims Canada has interests in Brazil, and particularly in the mining sector. “Several Canadian companies have shown interest in our country. Whether that means the aim of this espionage is to boost business for certain groups, I can’t say.”
The main data on Brazil’s mineral reserves is public, and spying is not required to access it.
But the Ministry’s system holds strategic information. Besides Petrobras, the Ministry of Mines and Energy’s network is connected to Eletrobras; the energy research company; the National Electric Energy Agency, which regulates bids for power plant contracts; and the National Oil Agency, in charge of auctions for exploration of the pre-salt layer.
Former Eletrobras President Pinguelli Rosa considers that this information can give a competitive advantage to companies bidding at these auctions. “Whoever knows what will happen beforehand can form partnerships, or estimate the values needed to win the auction and act accordingly. This is not a trifle, it’s a game of billions of dollars.”
Greenwald concludes that the aim of this espionage, which targets a specific ministry of one country, is clearly economic. “That’s what Snowden told me in the interview three months ago in Hong Kong.”
There is no indication in the documents that the content of these communications has been accessed – only who spoke to whom, when, where, and how.
But the author of the presentation makes the next steps very clear: among the actions suggested is a joint operation with a section of the American NSA, TAO, which is the special cyberspy taskforce, for an invasion known as “Man on the Side”.
All incoming and outgoing communications in the network can be copied, but not altered.
It’s like working on a computer with someone looking over your shoulder.
For Minister Lobão, Brazil is obviously the target of an international system of surveillance.
“What kind of damages are we risking, besides the attack on our sovereignty and individual rights? Business issues, for instance. This has not been evaluated yet, and may only surface in the long run.”
The Embassy of Canada in Brasilia declared it does not comment on intelligence and security issues.
The Communications Security Establishment issued a statement declaring that the CSE does not comment on foreign signals intelligence activities.
In another statement, the National Security Agency of the United States declared: “We are not going to comment publicly on every specific alleged intelligence activity, and as a matter of policy we have made clear that the United States gathers foreign intelligence of the type gathered by all nations. As the President said in his speech at the UN General Assembly, we’ve begun to review the way that we gather intelligence, so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share.”
TV Globo – Fantástico
Edição do dia 06/10/2013
06/10/2013 22h39
Find this story at 6 October 2013
© Copyright 2013 Globo Comunicação e Participações S.A.
NSA Documents Show United States Spied Brazilian Oil Giant8 november 2013
One week after revealing USA surveillance of the presidents of Brazil and Mexico, Fantastico brings another exclusive.
One of the prime targets of American spies in Brazil is far away from the center of power – out at sea, deep beneath the waves. Brazilian oil. The internal computer network of Petrobras, the Brazilian oil giant partly owned by the state, has been under surveillance by the NSA, the National Security Agency of the United States.
The spying is confirmed by top secret documents leaked by Edward Snowden, and obtained exclusively by Fantastico. Snowden, an ex-intelligence analyst employed by the NSA, made these and thousands of other documents public last June. He has been given asylum by Russia.
These new disclosures contradict statements by the NSA denying espionage for economic purposes.
saiba mais
The information was found by journalist Glen Greenwald, co-author of this story along with TV Globo Reporter Sonia Bridi, amid the thousands of documents given to him by Edward Snowden in June.
This statement addressed to “The Washington Post” this week highlights that ‘The department does ***not*** engage in economic espionage in any domain, including cyber.'”
However, a top secret presentation dated May 2012 is used by the NSA to train new agents step-by-step how to access and spy upon private computer networks – the internal networks of companies, governments, financial institutions – networks designed precisely to protect information.
The name of Petrobras – Brazil’s largest company – appears right at the beginning, under the title: “MANY TARGETS USE PRIVATE NETWORKS.”
Besides Petrobras, e-mail and internet services provider Google’s infrastructure is also listed as a target. The company, often named as collaborating with the NSA, is shown here as a victim.
Other targets include French diplomats – with access to the private network of the Ministry of Foreign Affairs of France – and the SWIFT network, the cooperative that unites over ten thousand banks in 212 countries and provides communications that enable international financial transactions. All transfers of money between banks across national borders goes through SWIFT.
Names of other companies and institutions on the list were blacked out in order not to compromise operations involving targets linked to terrorism.
Greenwald defends the decision to omit the names. “It’s a question of responsible journalism”, says Greenwald. “These documents contain information regarding spying against terrorists, matters of national security which should not be published, because nobody doubts that the United States, just as any other country, has the right to spy in order to guarantee national security. But there is much more information on spying on innocents, against people who have nothing to do with terrorism, or on industrial issues, which need to be made public.”
The documents are classified as “top-secret”, to be seen only by those named by the Americans as “Five Eyes” – the five countries allied in spying: the United States, Australia, Canada, Great Britain and New Zealand.
The name of Petrobras appears on several slides, as the training goes deeper in explaining how date from the target companies is monitored.
Individual folders are created for each target – and contain all the intercepted communications and IP addresses – the identification of each computer on the network – which should be immune to these attacks.
Paulo Pagliusi has a PhD in information security and has written books on the subject. He analyzed the documents for Fantastico.
“The networks in the presentation all belong to real companies. These are not made-up situations”, says Pagliusi. “Some details stand out. For instance, some numbers were blacked out. Why would they be blacked out if they weren’t real? It’s as if the instructors didn’t want the trainees to see them.”
Pagliusi points to signs that this is part of systematic spying. “You don’t obtain all of this in a single run. From what I see, this is a very consistent system that yields powerful results; it’s a very efficient form of spying,” he says.
Pagliusi concludes that this has been going on for a while: “There’s no place for amateurs in this area.”
The yearly profits of Petrobras are over 280 billion reais – US$ 120 billion. More than the GDP of many countries. And there are plenty of motives for spies to want access to the company’s protected network.
Petrobras has two supercomputers, used mainly for seismic research – which evaluate oil reserves from samples collected at sea. This is how the company mapped the Pre-salt layer, the largest discovery of new oil reserves in the world in recent years.
There is no information on the extent of the spying, nor if it managed to access the data contained in the company’s computers. It’s clear Petrobras was a target, but no documents show exactly what information the NSA searched for. But at any rate, Petrobras has strategic knowledge of deals involving billions of dollars.
For example, the details of each lot in an auction set for next month: for exploration of the Libra Field, in the Bay of Santos, part of the Pre-salt. Whether the spies had access to this information is one of the questions the Brazilian government will have to put to the United States.
Former Petrobras Director Roberto Villa considers this the greatest action in the history of oil exploration. “It’s a very peculiar auction. The auction of an area where we already know there’s oil, there’s no risk”, he says. What no one else should know, Villa says, is which are the richest lots. “Petrobras knows. And I hope only they know.” He considers that such information, if stolen, could give someone an advantage. “Someone would have an edge. If this information was leaked and someone else has obtained it, he would be in a privileged position at the auction. He’ll know where to invest and where not to. It’s a handy little secret.”
Another former Petrobras Director considers this a serious matter. “Commercially, internationally, this means a game with marked cards for some places, some countries, some friends,” says Antonio Menezes.
The Pre-salt oil is found at high seas, at depths of two thousand meters – below a layer of rocky salt, four kilometers below the ocean floor. Reaching this oil requires a lot of technology, and Petrobras is a world leader in deep-sea oil extraction.
Adriano Pires, a specialist in infrastructure, considers that spies could be specially interested in ocean-floor exploration technology. “Petrobras is the world’s number one in drilling for oil at sea. Pre-salt layers exist all around the world – there’s a pre-salt in Africa, in the Gulf of Mexico, in the North Sea. If I have this technology, I can drill for oil anywhere I want,” says Pires.
The NSA presentation contains documents prepared by the GCHQ – the British Spy agency, from a country that appears as an ally of the United States in spying. The British agency shows how two spy programs operate. “Flying Pig” and “Hush Puppy” also monitor private networks which carry supposedly secure information. These networks are known as TLS/SSL.
The presentation explains how data is intercepted, through an attack known as “Man in the Middle”. In this case, data is rerouted to the NSA central, and then relayed to its destination, without either end noticing.
A few pages ahead, the document lists the results obtained. “Results – what do we find?” “Foreign government networks”, “airlines”, “energy companies” – like Petrobras – and “financial organisations.”
TLS/SSL networks are also the security system used in financial transactions, such as when someone accesses their bank account through an ATM. The connection between a remote terminal and the bank’s central goes through a sort of secure tunnel through the internet. No one is supposed to see what travels through it.
Later, the NSA presentation shows in detail how the data of a chosen target is rerouted through spy filters beginning at the very source, until they reach the NSA’s supercomputers.
In this document the NSA names Latin America as a key target of the “SILVERZEPHYR” program, which collects the contents of voice recordings, faxes, as well as metadata, which is the overall information being transmitted in the network.
Last Sunday, Fantastico showed exclusively how the President of Brazil is a direct target of espionage.
On Thursday, President Dilma Rousseff met American counterpart Barack Obama at the G20 Summit in Russia, and she demanded explanations.
“This is what I asked: It’s very complicated for me to learn about these things through the press. I read something one day, then two days later I learn something else, and this goes on piece by piece. I’d like to know what exists (about spying). I want to know what’s going on. If there is something or not, I want to know. Is it real or not? Besides what’s been published by the press, I want to know everything they have regarding Brazil. The word ‘everything’ is very comprehensive. It means all. Every bit. In English, ‘everything’.” – the President told a press conference on Friday.
On the day Rousseff and Obama met, a story published simultaneously by British newspaper The Guardian and the American New York Times revealed that the NSA and the British GCHQ broke the protected communication codes of several internet providers – enabling them to spy on the communications of millions of people, and also on banking transactions.
The story shows that cryptography, the system of codes provided by some internet operators, comes with a built-in vulnerability, inserted on purpose by the NSA, which allows the spies to enter the system, copy, snoop, even make alterations, without leaving footprints. There is also evidence that some equipment put together in the United States comes with factory-installed spying devices.
The “New York Times” says this was done with at least one foreign government that bought American computers. But it does not reveal which government payed to be spied upon.
Lastly, another document obtained by Fantastico shows who are the spies’ clients – who gets the information obtained: American diplomats, the intelligence agencies, and the White House. It proves that spying doesn’t have as its sole purpose the fight against terrorism. On this list of objectives are also diplomatic, political and economic information.
Petrobras declined to comment. President Dilma Rousseff awaits clarifications by the U.S. government later this week.
The NSA has sent a statement attributed to James Clapper, director of National Intelligence, declaring that the agency collects information in order to give the United States and their allies early warning of international financial crises which could negatively impact the global economy and also to provide insight into other countries’ economic policy or behavior which could affect global markets.
The statement also stresses that the collected intelligence is not used “to steal the trade secrets of foreign companies on behalf of – or give intelligence we collect to – US companies to enhance their international competitiveness or increase their bottom line.”
The UK Foreign Office in London and the British Embassy in Brasilia declared they do not comment on intelligence-related issues.
Globo TV – Fantástico
Edição do dia 08/09/2013
08/09/2013 22h52 – Atualizado em 09/09/2013 00h07
Find this story at 9 September 2013
© Copyright 2013 Globo Comunicação e Participações S.A. Política de Privacidade
NSA Spied On Brazil, Mexico Leaders, Glenn Greenwald Says8 november 2013
RIO DE JANEIRO — The Brazilian government condemned a U.S. spy program that reportedly targeted the nation’s leader, labeled it an “unacceptable invasion” of sovereignty and called Monday for international regulations to protect citizens and governments alike from cyber espionage.
In a sign that fallout over the spy program is spreading, the newspaper Folha de S.Paulo reported that President Dilma Rousseff is considering canceling her October trip to the U.S., where she has been scheduled to be honored with a state dinner. Folha cited unidentified Rousseff aides. The president’s office declined to comment.
The Foreign Ministry called in U.S. Ambassador Thomas Shannon and told him Brazil expects the White House to provide a prompt written explanation over the espionage allegations.
The action came after a report aired Sunday night on Globo TV citing 2012 documents from NSA leaker Edward Snowden that indicated the U.S. intercepted Rousseff’s emails and telephone calls, along with those of Mexican President Enrique Pena Nieto, whose communications were being monitored even before he was elected as president in July 2012.
Mexico’s government said it had expressed its concerns to the U.S. ambassador and directly to the U.S. administration.
Brazilian Foreign Minister Luiz Alberto Figueiredo said, “We’re going to talk with our partners, including developed and developing nations, to evaluate how they protect themselves and to see what joint measures could be taken in the face of this grave situation.”
He added that “there has to be international regulations that prohibit citizens and governments alike from being exposed to interceptions, violations of privacy and cyberattacks.”
Justice Minister Eduardo Cardozo said at a joint news conference with Figueiredo that “from our point of view, this represents an unacceptable violation of Brazilian sovereignty.”
“This type of practice is incompatible with the confidence necessary for a strategic partnership between two nations,” Cardozo said.
Earlier, Sen. Ricardo Ferraco, head of the Brazilian Senate’s foreign relations committee, said lawmakers already had decided to formally investigate the U.S. program’s focus on Brazil because of earlier revelations that the country was a top target of the NSA spying in the region. He said the probe would likely start this week.
“I feel a mixture of amazement and indignation. It seems like there are no limits. When the phone of the president of the republic is monitored, it’s hard to imagine what else might be happening,” Ferraco told reporters in Brasilia. “It’s unacceptable that in a country like ours, where there is absolutely no climate of terrorism, that there is this type of spying.”
During the Sunday night TV program, U.S. journalist Glenn Greenwald, who lives in Rio de Janeiro and first broke the story about the NSA program in Britain’s Guardian newspaper after receiving tens of thousands of documents from Snowden, told the news program “Fantastico” that a document dated June 2012 shows that Pena Nieto’s emails were being read. The document’s date is the month before Pena Nieto was elected.
The document indicated who Pena Nieto would like to name to some government posts, among other information.
It’s not clear if the spying continues.
As for Brazil’s leader, the NSA document “doesn’t include any of Dilma’s specific intercepted messages, the way it does for Nieto,” Greenwald told The Associated Press in an email. “But it is clear in several ways that her communications were intercepted, including the use of DNI Presenter, which is a program used by NSA to open and read emails and online chats.”
The U.S. targeting mapped out the aides with whom Rousseff communicated and tracked patterns of how those aides communicated with one another and also with third parties, according to the document.
In July, Greenwald co-wrote articles in the O Globo newspaper that said documents leaked by Snowden indicate Brazil was the largest target in Latin America for the NSA program, which collected data on billions of emails and calls flowing through Brazil.
The spokesman for the U.S. Embassy in Brazil’s capital, Dean Chaves, said in an emailed response that U.S. officials wouldn’t comment “on every specific alleged intelligence activity.” But he said, “We value our relationship with Brazil, understand that they have valid concerns about these disclosures, and we will continue to engage with the Brazilian government in an effort to address those concerns.”
In Mexico City, the Mexican foreign ministry said it sent a diplomatic note to the U.S. asking for a thorough investigation of the report’s claims. It said officials also summoned the U.S. ambassador to express Mexico’s concerns.
“Without assuming the information that came out in the media is accurate, Mexico’s government rejects and condemns any espionage activity on Mexican citizens that violate international law,” the Foreign Relations Department said. “This type of practice is contrary to the Charter of the United Nations and the International Court of Justice.”
The U.S. Embassy in Mexico highlighted the “close cooperation” of Mexico and the U.S. in many areas, but said it wouldn’t comment on the NSA program or its alleged targeting of the Mexican leader.
Associated Press writer Bradley Brooks reported this story in Rio de Janeiro and Marco Sibaja reported in Brasilia. Associated Press writer Michael Weissenstein in Mexico City contributed to this report.
By BRADLEY BROOKS and MARCO SIBAJA 09/02/13 07:38 PM ET EDT
Find this story at 2 September 2013
Copyright © 2013 TheHuffingtonPost.com, Inc.
NSA ‘spied on Brazil and Mexico’ – Brazilian TV report8 november 2013
Brazil says it will demand an explanation from the US after allegations that the National Security Agency (NSA) spied on Brazilian government communications.
The allegations were made by Rio-based journalist Glenn Greenwald in a programme on TV Globo on Sunday.
Mr Greenwald obtained secret files from US whistle-blower Edward Snowden.
Communications from the Mexican president were also accessed by the NSA, Mr Greenwald said.
The US ambassador to Brazil, Thomas Shannon, was briefly summoned to the Brazilian foreign ministry, “to explain” the claims made by the American journalist.
He did not speak to reporters when he left, and there have been no comments from the foreign ministry either.
‘Attack on sovereignty’
Mr Greenwald, a columnist for the British Guardian newspaper, told TV Globo’s news programme Fantastico that secret documents leaked by Edward Snowden showed how US agents had spied on communications between aides of Brazil’s President Dilma Rousseff.
Brazil’s Justice Minister Jose Eduardo Cardozo said that “if these facts prove to be true, it would be unacceptable and could be called an attack on our country’s sovereignty”.
According to the report, the NSA also used a programme to access all internet content that Ms Rousseff visited online.
Her office said the president was meeting top ministers to discuss the case.
The BBC’s Julia Carneiro in Sao Paulo says that the suspicion in Brazil as to why the United States is allegedly spying Brazilian government communications is because Brazil is a big player and there are lots of commercial interests involved.
Mexican connection
The report also alleges that the NSA monitored the communications of Mexican President Enrique Pena Nieto, even before he was elected in July last year.
Mr Greenwald said that a document dating from June 2012 showed that Mr Pena Nieto’s emails were being read.
A spokesman for the Mexican foreign ministry told the Agence France Presse news agency that he had seen the report but had no comment.
The documents were provided to Mr Greenwald by ex-US intelligence analyst Edward Snowden, who was granted temporary asylum in Russia after leaking secret information to media in the US and Britain.
Mr Greenwald was the first journalist to reveal the secret documents leaked by Mr Snowden on 6 June. Since then, he has written a series of stories about surveillance by US and UK authorities.
The detention last month for nine hours at London’s Heathrow airport of Mr Greenwald’s partner, David Miranda, caused widespread controversy in the UK and abroad.
Mr Greenwald said the detention of his partner amounted to “bullying” and was “clearly intended to send a message of intimidation” to those working on the NSA revelations.
2 September 2013 Last updated at 12:20 ET
Find this story at 2 September 2013
BBC © 2013 The BBC
Surveillance : la DGSE a transmis des données à la NSA américaine7 november 2013
Une semaine après les manifestations d’indignation exprimées par les autorités politiques françaises après les révélations du Monde sur l’ampleur des interceptions électroniques réalisées, en France, par l’Agence nationale de sécurité (NSA) américaine, de nouveaux éléments montrent que cette émotion pouvait être, en partie, feinte.
Mardi 29 octobre, devant la commission du renseignement de la Chambre des représentants, le chef de la NSA, le général Keith Alexander, a juré que les informations du Monde ainsi que celles d’El Mundo, en Espagne, et de L’Espresso, en Italie, sur l’interception de communications de citoyens européens par la NSA étaient « complètement fausses ». Il a précisé qu’il s’agissait de « données fournies à la NSA » par ces mêmes partenaires européens.
Quelques heures plus tôt, le quotidien américain The Wall Street Journal, s’appuyant sur des sources anonymes, affirmait que les 70,3 millions de données téléphoniques collectées en France, par la NSA, entre le 10 décembre 2012 et le 8 janvier 2013, ont été communiquées par les services français eux-mêmes. Ces éléments auraient été transmis, selon ce journal, conformément à un accord de coopération en matière de renseignement entre les Etats-Unis et la France.
UN ACCORD DE COOPÉRATION CONNU SOUS LE NOM DE « LUSTRE »
Ces informations, qui tendent à dédouaner la NSA de toute intrusion, ne permettent de progresser dans la compréhension de l’espionnage américain dans le monde qu’à condition de les mettre en résonance avec l’éclairage apporté, le 28 octobre, par la Süddeutsche Zeitung. La presse allemande a signalé, grâce à une note dévoilée par l’ex-consultant de la NSA Edward Snowden, l’existence d’un accord de coopération sur la surveillance entre la France et les Etats-Unis connu sous le nom de « Lustre ».
Selon nos informations, recueillies auprès d’un haut responsable de la communauté du renseignement en France, la direction des services extérieurs français, la DGSE, a, en effet, établi, à partir de la fin 2011 et début 2012, un protocole d’échange de données avec les Etats-Unis.
La France bénéficie d’un positionnement stratégique en matière de transport de données électroniques. Les câbles sous-marins par lesquels transitent la plupart des données provenant d’Afrique et d’Afghanistan atterrissent à Marseille et à Penmarc’h, en Bretagne. Ces zones stratégiques sont à la portée de la DGSE française, qui intercepte et stocke l’essentiel de ce flux entre l’étranger et la France.
“UN TROC ENTRE LA DIRECTION DE LA NSA ET CELLE DE LA DGSE”
« C’est un troc qui s’est institué entre la direction de la NSA et celle de la DGSE, explique la même source. On donne des blocs entiers sur ces zones et ils nous donnent, en contrepartie, des parties du monde où nous sommes absents, mais la négociation ne s’est pas effectuée en une fois, le périmètre du partage s’élargit au fil des discussions qui se prolongent encore aujourd’hui. »
Il paraît donc, a priori, en partie exact, qu’une partie des données téléphoniques transitant sur le sol français soit transmise, conformément aux accords de coopération, et sans tri préalable, par la DGSE à la NSA. Il s’agit donc de données concernant aussi bien des citoyens français recevant des communications de ces zones géographiques que d’étrangers utilisant ces canaux.
Il paraît peu probable que le gouvernement français, qui supervise le financement des infrastructures d’interception et de stockage de la DGSE, ne soit pas au courant de ces pratiques. Ce qui relativise la sincérité des récriminations françaises après l’annonce, par Le Monde, de ces interceptions américaines.
GÉOGRAPHIE SOUS-MARINE
L’absence de statut juridique clair des métadonnées en France et l’étrange discrétion de la Commission nationale de contrôle des interceptions de sécurité (CNCIS) paraissent, de plus, avoir facilité la transmission à la NSA par la DGSE de millions de données relevant de la vie privée de millions de Français.
Au regard de la quantité des interceptions réalisées en un seul mois, la justification avancée par les services de renseignement concernant des questions liées à la lutte contre le terrorisme peut également être sujette à caution.
D’après un responsable à Matignon, la France n’est pas la seule à « troquer » ainsi les données passant sur son territoire. Elle appartiendrait à « une amicale » qui comprend des pays tels qu’Israël, la Suède ou l’Italie, vers lesquels convergent également des câbles sous-marins stratégiques pour les Américains. Depuis 2011, une nouvelle redistribution des cartes de la coopération en matière de renseignement s’est ainsi réalisée sur le seul fondement de cette géographie sous-marine.
RESPONSABILITÉ DES AUTORITÉS POLITIQUES FRANÇAISES
Ces informations viennent donc préciser celles déjà publiées par Le Monde concernant la collecte, en un mois, par la NSA, de 70,3 millions de données téléphoniques concernant la France. Qu’une partie de ces informations soient transmises avec l’assentiment de la DGSE ne change en rien son caractère attentatoire aux libertés. Ce nouvel éclairage pose avant tout la responsabilité des autorités politiques françaises. Sollicitée sur cette coopération, la DGSE s’est refusée à tout commentaire.
Par ailleurs, Le Monde maintient, sur la base des documents dévoilés par Edward Snowden permettant de décrypter les tableaux d’interceptions de données téléphoniques et numériques à travers le monde, qu’il s’agit d’opérations « contre » un pays nommé. Dans ce cas précis, la France.
Un haut responsable du renseignement français, joint, mercredi matin, a admis, sous couvert d’anonymat, l’existence de « ces échanges de données ». Il a néanmoins démenti « catégoriquement » que la DGSE puisse transférer « 70,3 millions de données à la NSA ».
LE MONDE | 30.10.2013 à 12h51
Par Jacques Follorou
Find this story at 30 October 2013
© Le Monde.fr
Que dit le document sur la surveillance téléphonique de la NSA en France ?7 november 2013
Le général Keith Alexander, le chef de la NSA, a mis en cause, mardi 29 octobre lors d’une audition devant la Chambre des représentants, les informations publiées par plusieurs journaux européens, dont Le Monde, sur la surveillance exercée par l’agence de renseignement dans leurs pays respectifs.
Que disent les autorités américaines ?
Selon Keith Alexander, les informations publiées par plusieurs journaux européens sont fondées sur des documents qui n’ont pas été “compris”.
A l’instar du général américain, des sources anonymes ont affirmé au Wall Street Journal que ces documents, sur lesquels se sont appuyés les journaux européens, ne montrent pas des données interceptées par la NSA au sein de ces pays, mais des informations captées par les services de renseignement européens eux-mêmes, à l’extérieur de leurs frontières.
D’où vient ce document ?
DOCUMENT
Le document sur lequel Le Monde s’est appuyé pour ses révélations fait partie des documents exfiltrés de la NSA par l’ancien sous-traitant de l’agence Edward Snowden, auxquels nous a donné accès notre collaboration avec Glenn Greenwald.
Il est issu d’un logiciel, Boundless Informant, qui agrège et organise les données contenues dans les innombrables bases de données de la NSA et permet aux analystes de l’agence d’en avoir un aperçu en quelques clics. Son existence, ainsi que la carte du monde qui en est tirée et montre l’ampleur des données collectées pour chaque pays, a été révélée par le Guardian en juin.
Ce logiciel permet aussi d’afficher un récapitulatif par pays des données le concernant. C’est le cas du document reproduit par Le Monde, sur lequel nous nous sommes fondés pour évoquer le chiffre de près de 70,3 millions de données téléphoniques interceptées.
C’est également ce type de document que El Mundo en Espagne, L’Espresso en Italie et, avant eux, Der Spiegel en Allemagne ont utilisé pour étayer leurs révélations sur la surveillance.
Que montre-t-il ?
Le document montre clairement que 70 271 990 données téléphoniques concernant la France ont été incorporées dans les bases de données de l’agence entre le 10 décembre 2012 et le 8 janvier 2013.
Pour s’y retrouver dans les nombreux “tuyaux” qui lui fournissent les données, la NSA utilise une nomenclature spécifique. Ainsi, au bas du document que nous reproduisons, on apprend que le “canal” “US-985D” – celui qui fournit l’ensemble des 70 millions de données françaises – est alimenté via deux outils techniques : “DRTBOX” et “WHITEBOX”. Le premier se taille la part du lion en récoltant près de 89 % des données affichées sur le document.
Extratit du document obtenu par “Le Monde”
Qu’est-ce qui reste flou ?
Selon la version défendue par les sources anonymes du Wall Street Journal et par Keith Alexander, ce document ne montre pas des données de Français interceptées par la NSA, mais des informations collectées par la France et ses services, en dehors du territoire hexagonal et visant avant tout des cibles non françaises. Autrement dit, les données sont-elles fournies par la France, ou sont-elles issues d’une surveillance de la France ? L’intitulé du document – “France, 30 derniers jours” – ne permet pas de trancher.
Extrait d’un document obtenu par “Le Monde”
L’existence des deux techniques d’interception “DRTBOX” et “WHITEBOX” pourrait accréditer l’existence d’un partenariat avec les services français, dont les informations du Monde fournissent la preuve.
Mais un document d’aide destiné aux analystes de la NSA répondant à leurs questions sur Boundless Informant permet, sinon de contredire, au moins de fortement nuancer l’hypothèse de la NSA, accréditant les informations du Monde. Publié par le site du Guardian en juin, il précise à plusieurs reprises que les informations qui y sont affichées sont issues de collecte “contre” les pays spécifiés.
Le document explique par exemple qu'”un clic sur un pays [depuis la carte] montre la posture de collecte (…) contre ce pays en particulier”.
Extrait d’un document publié par le “Guardian”. Le surlignage a été effectué par le “Monde”.
Ailleurs, le document précise que “l’outil [Boundless Informant] permet à ses utilisateurs de selectionner un pays [ainsi que] les détails de la collecte contre ce pays”, est-il ainsi écrit. La question “combien de données sont collectées contre un pays en particulier ?” figure, elle, dans les exemples de requêtes que peuvent formuler les analystes dans le logiciel. Enfin, il est fait mention des “capacités de collecte de la NSA” que les analystes peuvent évaluer grâce à Boundless Informant.
Extrait d’un document publié par le “Guardian”. Le surlignage a été effectué par le “Monde”.
Comme Le Monde l’a écrit lors de ses révélations, les modalités techniques précises et le périmètre de cette surveillance sont inconnus.
Pourquoi les autorités américaines démentent-elles aujourd’hui ?
Il y a plusieurs semaines déjà, des médias partenaires de M. Greenwald ont utilisé des documents similaires à celui reproduit par Le Monde. Lorsque le Spiegel annonce que 500 millions de communications de citoyens allemands sont surveillées, il le fait en se fondant notamment sur un document issu de Boundless Informant. A l’époque, la NSA n’a ni commenté ni démenti ces informations.
De fait, ce démenti public formulé par Keith Alexander intervient alors que la pression politique, domestique et internationale, s’est considérablement accrue sur son agence.
Notons enfin que les informations concernant la surveillance d’intérêts économiques hexagonaux, tout comme celle d’importants diplomates, n’a pas été démentie par le chef de l’agence de renseignement américaine.
Le Monde.fr | 30.10.2013 à 18h39
Par Martin Untersinger
Find this story at 30 October 2013
© Le Monde.fr
Codename “Lustre”; Frankreich liefert Informationen an britische und US-Geheimdienste7 november 2013
Während Hollande den jüngsten Lauschangriff heftig kritisiert, arbeitet Frankreich längst mit amerikanischen und britischen Geheimdiensten zusammen. Unter dem Codenamen “Lustre” hat die Regierung vor einiger Zeit einen Kooperationsvertrag geschlossen – sie ist damit nicht alleine.
Hollande kritisiert den Lauschangriff der US-Dienste und rückt näher an Merkel. Doch der Geheimdienst seines Landes arbeitet indes unter dem Codenamen “Lustre” mit dem Geheimdienstbündnis “Five Eyes” zusammen, dem neben den USA und Großbritannien auch Neuseeland, Kanada und Australien angehören. Paris liefert ihnen systematisch Informationen.
Frankreich hat ein entsprechendes Kooperationsabkommen – ein sogenanntes Drittparteiabkommen – geschlossen, wie aus Dokumenten des Whistleblowers Edward Snowden hervorgeht, die der Norddeutsche Rundfunk und die Süddeutsche Zeitung einsehen konnten.
Demnach kooperieren auch Israel (Codename Ruffle), Schweden (Codename Sardine) und Italien mit dem britischen und amerikanischen Geheimdienst. Die “Five Eyes”-Mitglieder sollen sich versprochen haben, sich nicht gegenseitig auszuspionieren. Das italienische Magazin L’Espresso berichtete unterdessen, dass Italiens Regierung ebenfalls von der NSA ausgespäht worden sein soll.
Süddeutsche Zeitung
26. Oktober 2013
Von John Goetz und Frederik Obermaier
Find this story at 26 October 2013
© Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
The U.S. Has Been Spying on France Since Before the NSA Existed7 november 2013
On Monday, the news broke that the National Security Agency has been actively intercepting French telephone calls and email traffic — collecting over 70 million French calls in a single month, according to Le Monde.
Turns out this is only the latest surveillance operation in a long, long history of America spying on France. A newly declassified intelligence document reveals that the NSA and its antecedents have been intercepting French communications and breaking French codes and ciphers for more than 70 years.
Monday’s Le Monde report may have generated enormous controversy in France, leading the French foreign minister to call in the U.S. ambassador and read him the riot act. But it’s hardly a new development. American eavesdroppers began listening on France during World War II. They continued doing so during the Cold War. The NSA even spied on France during the run-up to the 2003 invasion of Iraq.
A 1947 top-secret code-word NSA document, titled “The General Cryptanalytic Problems,” reveals that in April 1941, eight months before the Japanese attack on Pearl Harbor, a small U.S. Army code-breaking unit, headed by French linguist Herrick F. Bearce, began trying to solve the diplomatic codes and ciphers of the Vichy French regime headed by Marshal Philippe Pétain, which had actively collaborated with Nazi Germany since the fall of France in 1940. A few months earlier, in January 1941, U.S. Army and Navy listening posts had begun intercepting Vichy diplomatic radio traffic between France and its colonies in North and West Africa, Martinique, Madagascar, Indochina, French Guiana, Djibouti, and St. Pierre et Miquelon off the Canadian coast.
Success quickly followed, indicating that the French codes and ciphers were not particularly secure. The report shows that Bearce’s cryptanalysts broke their first Vichy French code, designated FBT, shortly after the Pearl Harbor attack in mid-December 1941. The size of Bearce’s section grew by leaps and bounds as his cryptanalysts, with considerable help from their counterparts in Britain and Canada, solved several dozen Vichy encryption systems with increasing ease. The Army continued to read all of the Vichy French codes and ciphers being used until Pétain’s regime collapsed following the Allied landings in North Africa in November 1942. Within a matter of weeks, Vichy communications traffic disappeared from the airwaves except for occasional cables to the sole French colony controlled by Vichy in French Indochina (in what is now Vietnam, Laos, and Cambodia).
After Pétain’s Vichy government collapsed, in April 1943 the U.S. Army code breakers turned their attention to the diplomatic codes and ciphers then being used by America’s nominal ally, Gen. Charles de Gaulle’s Free French government in exile, which was based in London but maintained embassies in the United States and elsewhere around the world. The report shows that in October 1943, the U.S. Army’s French code-breaking specialists, then headed by Maj. William F. Edgerton, solved the first of de Gaulle’s most important diplomatic cipher systems, designated FMD. In the months that followed, a half dozen other Free French diplomatic ciphers were solved.
With the solutions of these systems, decrypted French diplomatic traffic became the single most important source of intelligence information being produced by the U.S. Army’s code-breaking unit after Germany and Japan. By the time Japan surrendered in August 1945, the U.S. Army’s code breakers had broken or were working on the solution to 60 French diplomatic or military code and cipher systems, including nearly all of the high-level encryption systems used by de Gaulle and his top ministers to communicate with French diplomats and generals around the world.
The amount of intelligence information produced from decrypted French diplomatic traffic was enormous and incredibly valuable. For example, the French FMT diplomatic code, which the U.S. Army broke in February 1945, proved to be an intelligence bonanza for the United States since the messages encrypted in the system contained all of the high-level diplomatic traffic between Paris and the French delegation at an April 1945 conference in San Francisco that led to the establishment of the United Nations. In other words, the State Department officials at the San Francisco conference knew everything about the French negotiating positions even before the conference began.
But that is not the extent of the surprises contained in the newly declassified report. Buried all the way at the back of the document is a nine-page chapter titled simply “Assistance From Espionage,” which describes in some detail how the FBI and the predecessor to the CIA, then known as the Office of Strategic Services (OSS), stole countless foreign code books and cipher materials in order to help the Army’s code breakers at their work.
It turns out that much of the success enjoyed by the Army’s code breakers against the French codes and ciphers during World War II was because FBI and OSS burglars repeatedly broke into French embassies in Washington, D.C., and elsewhere around the world to steal French cryptographic materials. These “black-bag jobs” proved to be enormously useful in allowing the Army to break French codes and ciphers. The report states (p. 302) that “The French Section has been the recipient of more compromised [stolen] material than any other language group [within the Army code-breaking organization],” with the document showing that FBI and OSS burglars surreptitiously copied at least nine French codes and ciphers between 1941 and 1945.
But this is only the beginning of a story that has yet to be told. It might surprise people to learn that the NSA and its partners in Britain, Canada, Australia, and New Zealand have never stopped intercepting French diplomatic and military communications, or trying to break French codes and ciphers, since the day Japan surrendered on Aug. 14, 1945. The NSA’s intercept operators monitored French military communications in Indochina in the 1950s, as well as French military and diplomatic traffic during the Algerian insurgency in the 1960s. Much of what the U.S. intelligence community knew about the Israeli nuclear weapons program in the late 1950s and early 1960s came from intercepted French communications. And when the French government led the fight in the United Nations against the U.S. government’s plans to invade Iraq in 2002 and 2003, the NSA was listening then as well.
France may be a friend and ally of the United States, but that means very little in the U.S. intelligence community, where spying on America’s friends is as much a fact of life as spying on America’s enemies. As senior U.S. intelligence officials are fond of saying, “We have no friends, only targets.”
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.
Posted By Matthew M. Aid
Tuesday, October 22, 2013 – 5:32 PM
Find this story at 22 October 2013
©2013 The Slate Group, LLC.
US National Security Agency ‘spied on French diplomats’7 november 2013
The US National Security Agency has spied on French diplomats in Washington and at the UN, according to the latest claims in Le Monde newspaper.
NSA internal memos obtained by Le Monde detailed the use of a sophisticated surveillance programme, known as Genie.
US spies allegedly hacked foreign networks, introducing the spyware into the software, routers and firewalls of millions of machines.
It comes a day after claims the NSA tapped millions of phones in France.
The details in the latest Le Monde article are based on leaks from ex-intelligence analyst Edward Snowden, through Glen Greenwald, the outgoing Guardian journalist, who is feeding the material from Brazil, says the BBC’s Christian Fraser in Paris.
It comes on the day the US Secretary of State, John Kerry, is in London meeting foreign counterparts to discuss Syria.
‘Spy implants’
The Le Monde report sets out details of Genie, an NSA surveillance programme in which spyware implants were introduced remotely to overseas computers, including foreign embassies.
It claims bugs were introduced to the French Embassy in Washington (under a code name “Wabash”) and to the computers of the French delegation at the UN, codenamed “Blackfoot”.
The article suggests that in 2011, the US allocated $652m (£402m) in funding for the programme, which was spent on “spy implants”. Tens of millions of computers were reported to have been hacked that year.
A document dated August 2010 suggests intelligence stolen from foreign embassy computers ensured the US knew ahead of time the positions of other Security Council members, before a UN vote for a resolution imposing new sanctions on Iran.
The US was worried the French were drifting to the Brazilian side – who were opposed to implementing sanctions – when in truth they were always aligned to the US position, says our correspondent.
The intelligence agency quotes Susan Rice, then-US ambassador to the UN, who praises the work done by the NSA: “It helped me know… the truth, and reveal other [countries’] positions on sanctions, allowing us to keep one step ahead in the negotiations.”
On Monday, Le Monde alleged that the NSA spied on 70.3 million phone calls in France between 10 December 2012 and 8 January 2013.
At a breakfast meeting with the US secretary of state on Tuesday, French Foreign Minister Laurent Fabius demanded a full explanation.
Referring to a telephone call between the French and US presidents, Mr Fabius told reporters: “I said again to John Kerry what Francois Hollande told Barack Obama, that this kind of spying conducted on a large scale by the Americans on its allies is something that is unacceptable.”
Asked if France was considering reprisals against the US, government spokeswoman Najat Vallaud-Belkacem replied: “It is up to Foreign Minister Fabius to decide what line we take but I don’t think there is any need for an escalation.
“We have to have a respectful relationship between partners, between allies. Our confidence in that has been hit but it is after all a very close, individual relationship that we have.”
Both French officials made their comments before the latest revelations appeared in Le Monde.
Mr Snowden, a former NSA worker, went public with revelations about US spying operations in June.
The information he leaked led to claims of systematic spying by the NSA and CIA on a global scale.
Targets included rivals like China and Russia, as well as allies like the EU and Brazil.
The NSA was also forced to admit it had captured email and phone data from millions of Americans.
Mr Snowden is currently in Russia, where he was granted a year-long visa after making an asylum application.
The US wants him extradited to face trial on criminal charges.
22 October 2013 Last updated at 13:36 ET
Find this story at 22 October 2013
© 2013 The BBC
NSA leaks: France summons US ambassador over phone surveillance revealed by Edward Snowden7 november 2013
Latest leaks from Edward Snowden say American agents recorded more than 70 million French phone calls in just 30 days – including those of politicians and businessmen
The French government has summoned the US ambassador in Paris to provide an explanation for fresh Edward Snowden revelations about the NSA.
According to reports this morning in Le Monde, the American National Security Agency recorded more than 70 million phone calls made France over the course of just 30 days.
If accurate, the reports are the latest indicator of the extraordinary reaching of US electronic spying, and come alongside the news that agents also hacked the email account of former Mexican president Felipe Calderon.
The French interior minister, Manuel Valls, told reporters at an EU meet in Luxembourg: “I have immediately summoned the US ambassador and he will be received this morning at the Quai d’Orsay [French Foreign Ministry].”
“Rules are obviously needed when it comes to new communication technologies, and that’s something that concerns every country,” he the Europe-1 radio station. “If a friendly country – an ally – spies on France or other European countries, that is completely unacceptable.”
Le Monde’s story, which included the byline of the outgoing Guardian journalist Glenn Greenwald, said that the communications of prominent businessmen and politicians were spied on alongside those of suspected security threats.
It said the NSA had targeted Orange and Alcatel-Lucent – two of the biggest network operators in France – and that it used keyword technology and lists of certain types of numbers to automatically pick up millions of records a day.
The 70.3 million pieces of data came from 10 December 2012 and 8 January 2013, and it was not made clear whether they included the full content of conversations or just the metadata – the information of who, when and where the call was made.
The programme of surveillance, codenamed US-985D, also reportedly stored millions of intercepted text messages.
The article followed reports in the German weekly Der Spiegel that the NSA accessed the email account of Felipe Calderon, the former Mexican president. Mexico said it would be seeking an explanation from US officials “as soon as possible”.
Mr Snowden, a former contractor with the NSA who first went public about US surveillance techniques in June, warned then that he had gigabytes of data full of other revelations, to be released over time.
He is currently a refugee at an unknown location in Russia, after he was granted one year’s asylum on the condition, president Vladimir Putin said, that he stop leaking US secrets.
It is not known whether today’s revelations come straight from Mr Snowden himself, or if they are part of a large stock of data given in bulk to journalists at an earlier date.
The US has, as with other Snowden stories, refused to comment on what it calls confidential information.
Officials nonetheless referred Le Monde to a statement made in June, in which US director of national intelligence James Clapper defended the NSA’s programmes.
“They are lawful and conducted under authorities widely known and discussed, and fully debated and authorised by Congress,” he said. “Their purpose is to obtain foreign intelligence information, including information necessary to thwart terrorist and cyber-attacks against the United States and its allies.”
Adam Withnall
Monday, 21 October 2013
Find this story at 21 October 2013
© independent.co.uk
France in the NSA’s crosshair : phone networks under surveillance7 november 2013
The future will perhaps tell us one day why France has remained so discreet in comparison with Germany or Brazil, for example, after the first revelations about the extent of the American electronic espionage programmes in the world as revealed by Edward Snowden, the ex-employee of an NSA (National Security Agency) sub-contractor. France was also concerned and today has at its disposition tangible proof that its interests are targeted on a daily basis.
According to the documents retrieved from the NSA database by its ex-analyst, telephone communications of French citizens are intercepted on a massive scale. Le Monde has been able to obtain access to documents which describe the techniques used to violate the secrets or simply the private life of French people. Some elements of information about this espionage have been referred to by Der Speigel and The Guardian, but others are, to date, unpublished.
Amongst the thousands of documents extracted from the NSA by its ex-employee there is a graph which describes the extent of telephone monitoring and tapping (DNR – Dial Number Recognition) carried out in France. It can be seen that over a period of thirty days – from 10 December 2012 to 8 January 2013, 70,3 million recordings of French citizens’ telephone data were made by the NSA. This agency has several methods of data collection. According to the elements obtained by Le Monde, when a telephone number is used in France, it activates a signal which automatically triggers the recording of the call. Apparently this surveillance system also picks up SMS messages and their content using key words. Finally, the NSA apparently stores the history of the connections of each target – or the meta-data.
This espionage is listed under the programme US-985D. The precise explanation of this acronym has not been provided, to date, by the Snowden documents nor by the former members of the NSA. By way of comparison, the acronyms used by the NSA for the same type of interception targeting Germany are US-987LA and US-987LB. According to some sources, this series of numbers corresponds to the circle referred to by the United States as the ’third party’, to which belong France, Germany but also Austria, Poland or again Belgium. ‘The second party’ concerns the English-speaking countries historically close to Washington: the United Kingdom, Canada, Australia and New Zealand – this group is known by the name the ‘five eyes’. ‘The first party’ concerns the sixteen American secret services of which today the NSA has become the most important, according to a senior official from the French Intelligence community.
The techniques used for these interceptions appear under the codenames ‘DRTBOX’ and ‘WHITEBOX’. Their characteristics are not known either. But we do know that, thanks to DRTBOX, 62.5 million data were collected in France and that WHITEBOX enables the recording of 7.8 million elements. The documents which Le Monde has been able to see have not enabled the provision of further details on these methods. But they give sufficient explanation to lead us to think that the NSA targets concerned both people suspected of association with terrorist activities as well as people targeted simply because they belong to the worlds of business, politics or French state administration.
The NSA graph shows an average of 3 million data intercepts per day with peaks at almost 7 million on 24 December 2012 and 7 January 2013. But between 28 and 31 December no interception seems to have taken place. This apparent stoppage of activity could be explained, in particular, by the time required at the end of December 2012, for the American Congress to renew section 702 of the law dealing with electronic espionage abroad. Similarly nothing appears on the 3, 5 and 6 January 2013; this time we cannot suggest any plausible reason. Many questions are still posed by this diagram – to start with the precise identity of the targets and the justifications for such a large-scale collection of data in a foreign country which is both sovereign and an ally.
When questioned, the American authorities did not wish to comment on these documents which they considered to be ‘classified’. Nevertheless, they do refer to the statement made on 8 June 2013 by the Director of National Intelligence according to which, ’the government cannot target anyone under the court-approved procedures for Section 702 collection unless there is an appropriate, and document foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States. We cannot target even foreign persons overseas without a valid foreign intelligence purpose.
France is not the country in which the NSA intercepts the most digital or telephone connections. The ‘Boundless Informant’ system, revealed in June by Edward Snowden to the British daily The Guardian, enabled an overall vision and in real time of the information gathered throughout the world, by means of the various NSA wire-tapping systems. This system gathers not only telephone data (DNR) but also digital data (DNI Digital Network Intelligence). One of the documents which Le Monde was able to consult notes that between 8 February and 8 March 2013, the NSA collected, throughout the world, 124,8 billion telephone data items and 97,1 billion computer data items. In Europe, only Germany and the United Kingdom exceed France in terms of numbers of interceptions.
Le Monde.fr
21.10.2013 à 06h08
Par Jacques Follorou et Glenn Greenwald (Journaliste)
Find this story at 21 October 2013
© Le Monde.fr
Was ISRAEL behind the hacking of millions of French phones and NOT the U.S.? Extraordinary twist in spying saga revealed7 november 2013
Agents said to have intercepted 70 million calls and text messages a month
France had previously blamed the United States of America
U.S. was first suspected of hacking into Nicolas Sarkozy’s phone in 2012
Americans insisted they have never been behind hacking in France
Comes after it emerged German officials are planning trip to U.S. to discuss allegations Angela Merkel’s phone was hack by the NSA
The German Chancellor said President Obama’s reputation has been shattered on an international scale because of espionage scandal
Israel and not America was behind the hacking of millions of French phones, it was claimed today.
In the latest extraordinary twist in the global eavesdropping scandal, Israeli agents are said to have intercepted more than 70 million calls and text messages a month.
Up until now the French have been blaming the U.S., even summoning the country’s Paris ambassador to provide an explanation.
Scroll down for video
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012
But today’s Le Monde newspaper provides evidence that it was in fact Israeli agents who were listening in.
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012.
Intelligence officials Bernard Barbier and Patrick Pailloux travelled from Paris to Washington to demand an explanation, but the Americans hinted that the Israelis were to blame.
More…
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
The terrible truth about Gaddafi’s harem: How Libyan dictator kidnapped and raped dozens of women to fulfil his perverted desires
French opposition leader pledges to ban citizenship for children of illegal immigrants born in France
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
Cameron attacks ‘lah-di-dah, airy-fairy’ ideas about spy agencies, as he reveals his own mobile was NOT targeted by the US
The Americans insisted they have never been behind any hacking in France, and were always keen to get on with the French, whom they viewed as some of their closest allies.
They were so determined to be friends with the French, that U.S. briefing notes included details of how to pronounce the names of the Gallic officials.
A note published in Le Monde shows that the Americans refused to rule out Mossad, Israel’s notoriously uncompromising intelligence agency, or the ISNU, Israel’s cyber-intelligence unit.
Today’s newspaper report was co-written by Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden (pictured)
Tailored Access Operations (TAO), the branch of the US National Security Agency (NSA) which deals with cyber-attacks, is referred to throughout the note.
It reads: ‘TAO intentionally did not ask either Mossad or ISNU whether they were involved as France is not an approved target for joint discussions.’
Le Monde’s article, co-authored by U.S. journalist Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden, however, hints that the Israelis were doing the spying.
Both US and French intelligence work closely with Mossad, but there is known to be a great deal of suspicion between all the agencies.
A 2008 NSA note says that the Israelis are ‘excellent partners in terms of sharing information’, but it also says that Mossad is ‘the third most aggressive intelligence service in the world against the United States’.
A spokesman for the Israeli government told Le Monde: ‘Israel is a country which is a friend, ally and partner of France and does not carry out any hostile activity which could pose a threat to its security.’
France has complained in the past about Mossad’s use of its soil to plan so called black operations including the 2010 assassination in Dubai of Mahmoud Al-Mabhouh of the Palestinian movement Hamas.
The revelation comes after senior German officials said they would be travelling to the U.S. ‘shortly’ to talk about allegations the NSA bugged Angela Merkel’s phone.
Obama orders review of surveillance activities
Anger: German Chancellor Angela Merkel (left) and Brazil’s Dilma Rousseff (right) have both voiced concerns over the NSA’s infiltration of the online communications of foreigners
The heads of Germany’s foreign and domestic intelligence agencies will participate in high-level discussions with the White House and National Security Agency, government spokesman Georg Streiter said.
News of the talks signals an escalation in the diplomatic tensions between the U.S. and its allies after it was claimed the NSA had monitored the calls of 35 world leaders.
Brazil and Germany have joined forces in an attempt to pile pressure on the United Nations to rein in the snooping activities. They want a UN General Resolution that promotes the right to online privacy.
This step, the first major international response to the NSA’s infiltration of the online communications of foreigners, comes after German Chancellor Merkel said the recent U.S. espionage scandal has shattered international trust in Barack Obama.
Angela Merkel said the recent espionage scandal has shattered international trust in President Obama
Not hacked: The White House has denied that David Cameron’s communications were ever monitored
A month earlier Brazil’s president Dilma Rousseff branded the NSA’s clandestine activities ‘a breach of international law’ in a speech to the UN General Assembly and demanded steps be made to stop ‘cyberspace from being used as a weapon of war’.
Brazilian and German diplomats met in New York yesterday to thrash out a draft resolution demanding the strengthening of privacy rights in the International Covenant Civil and Political Rights.
While the UN has no real power to reign in the NSA, there are fears among security experts that the effort alone could signal a growing consensus to freeze the US out of future international security dialogues.
By Nabila Ramdani
PUBLISHED: 16:32 GMT, 25 October 2013 | UPDATED: 20:46 GMT, 25 October 2013
Find this story at 25 October 2013
© Associated Newspapers Ltd
France feared US hacked president, was Israel involved?7 november 2013
AFP – France believed the United States attempted to hack into its president’s communications network, a leaked US intelligence document published on Friday suggests.
US agents denied having anything to do with a May 2012 cyber attack on the Elysee Palace, the official residence of French presidents, and appeared to hint at the possible involvement of Mossad, Israel’s intelligence agency, a classified internal note from the US National Security Agency suggests.
Extracts from the document, the latest to emerge from the NSA via former contractor Edward Snowden, were published by Le Monde newspaper alongside an article jointly authored by Glenn Greenwald, the US journalist who has been principally responsible for a still-unravelling scandal over large-scale US snooping on individuals and political leaders all over the world.
The document is a briefing note prepared in April this year for NSA officials who were due to meet two senior figures from France’s external intelligence agency, the DGSE. The French agents had travelled to Washington to demand explanations over their discovery in May 2012 of attempts to compromise the Elysee’s communications systems.
The note says that the branch of the NSA which handles cyber attacks, Tailored Access Operations (TAO), had confirmed that it had not carried out the attack and says that most of its closest allies (Australia, Britain, Canada and New Zealand) had also denied involvement.
It goes on to note: “TAO intentionally did not ask either Mossad or (Israel’s cyber intelligence unit) ISNU whether they were involved as France is not an approved target for joint discussions.”
Le Monde interpreted this sentence as being an ironic reference to a strong likelihood that Mossad had been behind the attack.
The cyber attacks on the Elysee took place in the final weeks of Nicolas Sarkozy’s term, between the two rounds of the presidential election which he ended up losing to Francois Hollande.
The attacks had been previously reported by French media, who have described them as an attempt to insert monitoring devices into the system but it remains unclear whether the presidential networks were compromised for any time.
There was no immediate response from the Elysee on Friday when asked for comment by AFP.
Sarkozy enjoyed warmer relations with the United States than any French president of recent times, to the extent that the media sometimes referred to him as “Sarko the American.”
The revelations about the Elysee attacks followed damaging revelations that the US had tapped the mobile phone of German Chancellor Angela Merkel and spied on other allies.
“Spying between friends, that’s just not done,” Merkel said Thursday at the start of a summit of European Union leaders which has been overshadowed by the issue.
On a lighter note, the leaked document published by Le Monde on Friday underlines that NSA officials were anxious not to cause any further offence to their angry French counterparts.
Along with the technical details, the briefing note contains a phonetic guide to the pronunciation of the names of the French visitors.
They included DGSE technical director Bernard Barbier, who was to be addressed as bear-NAR bur-BYAY, and Patrick Pailloux, or pah-TREEK pie-YOO.
25 OCTOBER 2013 – 12H58
Find this story at 25 October 2013
© 2006 – 2013 Copyright FRANCE 24. All rights reserved
NSA Targeted French Foreign Ministry7 november 2013
Espionage by the US on France has already strained relations between the two countries, threatening a trans-Atlantic trade agreement. Now a document seen by SPIEGEL reveals that the NSA also spied on the French Foreign Ministry.
America’s National Security Agency (NSA) targeted France’s Foreign Ministry for surveillance, according to an internal document seen by SPIEGEL.
Dated June 2010, the “top secret” NSA document reveals that the intelligence agency was particularly interested in the diplomats’ computer network. All of the country’s embassies and consulates are connected with the Paris headquarters via a virtual private network (VPN), technology that is generally considered to be secure.
Accessing the Foreign Ministry’s network was considered a “success story,” and there were a number of incidents of “sensitive access,” the document states.
An overview lists different web addresses tapped into by the NSA, among them “diplomatie.gouv.fr,” which was run from the Foreign Ministry’s server. A list from September 2010 says that French diplomatic offices in Washington and at the United Nations in New York were also targeted, and given the codenames “Wabash” and “Blackfoot,” respectively. NSA technicians installed bugs in both locations and conducted a “collection of computer screens” at the one at the UN.
A priority list also names France as an official target for the intelligence agency. In particular, the NSA was interested in the country’s foreign policy objectives, especially the weapons trade, and economic stability.
US-French relations are being strained by such espionage activities. In early July, French President François Hollande threatened to suspend negotiations for a trans-Atlantic free trade agreement, demanding a guarantee from the US that it would cease spying after it was revealed that the French embassy in Washington had been targeted by the NSA.
“There can be no negotiations or transactions in all areas until we have obtained these guarantees, for France but also for all of the European Union, for all partners of the United States,” he said at the time.
The NSA declined to comment to SPIEGEL on the matter. As details about the scope of the agency’s international spying operations continue to emerge, Washington has come under increasing pressure from its trans-Atlantic partners. Officials in Europe have expressed concern that negotiations for the trade agreement would be poisoned by a lack of trust.
09/01/2013 09:32 AM
Find this story at 1 September 2013
© SPIEGEL ONLINE 2013
US also eavesdrops on Israel, says former Mossad head7 november 2013
Americans want to know what Netanyahu is thinking about Iran, Palestinian issues, says Danny Yatom; follows reports NSA listened in to 35 world leaders
A day after it was revealed that the US National Security Agency monitored the private conversations of some 35 world leaders, former head of the Mossad Danny Yatom said Friday that the US listens in on its ally Israel as well.
“I can tell you with certain knowledge that [America] has been listening in on its allies, including Israel,” Yatom said, and “not necessarily in [Benjamin] Netanyahu’s tenure” as prime minister.
“The US doesn’t really care about anyone [but itself] and the Americans are vehemently denying the incidents,” Yatom told the Israeli daily Maariv on Friday. ”It could very well be that these things [monitoring calls] are happening here [in Israel] too. When the Americans think they need to listen in on someone, they’ll do just that.”
Yatom explained that there are two issues around which the Americans are likely spying on Israel — negotiations with Palestinians and the Iranian nuclear program.
“It is important for them to know what Prime Minister Benjamin Netanyahu really thinks… They have interests here because they want to be able to contend with Israeli claims that arise when talking about these issues,” the ex-Mossad chief said.
Yatom also stressed that the US seeks to obtain information on Israel’s “real” position vis-a-vis-negotiations and what obstacles stand in the way of advancing peace talks.
He also criticized the US for misusing its power as a world leader.
“The Americans rightly see themselves as a superpower, but wrongly feel that they can do whatever they want, including the eavesdropping,” he said.
Yatom served from 1996-1998 as head of the Mossad. The Israeli intelligence agency is smarting from recent reports that Turkey deliberately exposed a ring of Israeli agents in Iran, and further reports that US did not sanction or protest to Turkey over this alleged betrayal. Yatom has been particularly outspoken over the matter.
Yatom’s statements came a day after the the British newspaper The Guardian said it had obtained a confidential memo suggesting the NSA was able to monitor 35 world leaders’ communications in 2006.
The memo said the NSA encouraged senior officials at the White House, Pentagon and other agencies to share their contacts so the spy agency could add foreign leaders’ phone numbers to its surveillance systems, the report said.
The report drew furious reactions in Germany, Spain — both of whom summoned the US ambassador in their countries for talks over the report — and France.
European Union leaders, meeting Friday at a summit in Brussels, vowed to maintain a strong trans-Atlantic partnership despite their anger over allegations of widespread US spying on allies. Still, France and Germany are insisting the United States agree upon new surveillance rules with them this year to stop US eavesdropping on their leaders, innocent civilians and companies.
“We are seeking a basis for cooperation between our (intelligence) services, which we all need and from which we have all received a great deal of information … that is transparent, that is clear and is in keeping with the character of being partners,” German Chancellor Angela Merkel told reporters.
“The United States and Europe are partners, but this partnership must be built on trust and respect,” Merkel said early Friday. “That of course also includes the work of the respective intelligence services.”
Several European leaders noted Friday that the continent’s close political and commercial ties to the US must be protected as EU nations demand more assurances from the Obama administration.
“What is at stake is preserving our relations with the United States,” said French President Francois Hollande. “Trust has to be restored and reinforced.”
“The main thing is that we look to the future. The trans-Atlantic partnership was and is important,” said Lithuanian President Dalia Grybauskaite, whose nation holds the rotating presidency of the 28-country bloc.
Merkel complained to President Barack Obama on Wednesday after her government received information that her cellphone may have been monitored. Merkel and Hollande insisted that, beyond being fully briefed on what happened in the past, the European allies and Washington need to set up common rules for US surveillance that does not impede the fundamental rights of its allies.
Lazar Berman and AP contributed to this report.
By Times of Israel staff October 25, 2013, 7:50 pm 13
Find this story at 25 October 2013
© 2013 The Times of Israel, All rights reserved
No Morsel Too Minuscule for All-Consuming N.S.A.7 november 2013
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange.
The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It is hard to imagine what edge this could have given Mr. Obama in a friendly chat, if he even saw the N.S.A.’s modest scoop. (The White House won’t say.)
But it was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out?
From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries.
Mr. Obama found himself in September standing uncomfortably beside the president of Brazil, Dilma Rousseff, who was furious at being named as a target of N.S.A. eavesdropping. Since then, there has been a parade of such protests, from the European Union, Mexico, France, Germany and Spain. Chagrined American officials joke that soon there will be complaints from foreign leaders feeling slighted because the agency had not targeted them.
James R. Clapper Jr., the director of national intelligence, has repeatedly dismissed such objections as brazen hypocrisy from countries that do their own share of spying. But in a recent interview, he acknowledged that the scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart. “There’s no question that from a capability standpoint we probably dwarf everybody on the planet, just about, with perhaps the exception of Russia and China,” he said.
Since Edward J. Snowden began releasing the agency’s documents in June, the unrelenting stream of disclosures has opened the most extended debate on the agency’s mission since its creation in 1952. The scrutiny has ignited a crisis of purpose and legitimacy for the N.S.A., the nation’s largest intelligence agency, and the White House has ordered a review of both its domestic and its foreign intelligence collection. While much of the focus has been on whether the agency violates Americans’ privacy, an issue under examination by Congress and two review panels, the anger expressed around the world about American surveillance has prompted far broader questions.
If secrecy can no longer be taken for granted, when does the political risk of eavesdropping overseas outweigh its intelligence benefits? Should foreign citizens, many of whom now rely on American companies for email and Internet services, have any privacy protections from the N.S.A.? Will the American Internet giants’ collaboration with the agency, voluntary or otherwise, damage them in international markets? And are the agency’s clandestine efforts to weaken encryption making the Internet less secure for everyone?
Matthew M. Aid, an intelligence historian and author of a 2009 book on the N.S.A., said there is no precedent for the hostile questions coming at the agency from all directions.
“From N.S.A.’s point of view, it’s a disaster,” Mr. Aid said. “Every new disclosure reinforces the notion that the agency needs to be reined in. There are political consequences, and there will be operational consequences.”
A review of classified agency documents obtained by Mr. Snowden and shared with The New York Times by The Guardian, offers a rich sampling of the agency’s global operations and culture. (At the agency’s request, The Times is withholding some details that officials said could compromise intelligence operations.) The N.S.A. seems to be listening everywhere in the world, gathering every stray electron that might add, however minutely, to the United States government’s knowledge of the world. To some Americans, that may be a comfort. To others, and to people overseas, that may suggest an agency out of control.
The C.I.A. dispatches undercover officers overseas to gather intelligence today roughly the same way spies operated in biblical times. But the N.S.A., born when the long-distance call was a bit exotic, has seen its potential targets explode in number with the advent of personal computers, the Internet and cellphones. Today’s N.S.A. is the Amazon of intelligence agencies, as different from the 1950s agency as that online behemoth is from a mom-and-pop bookstore. It sucks the contents from fiber-optic cables, sits on telephone switches and Internet hubs, digitally burglarizes laptops and plants bugs on smartphones around the globe.
Mr. Obama and top intelligence officials have defended the agency’s role in preventing terrorist attacks. But as the documents make clear, the focus on counterterrorism is a misleadingly narrow sales pitch for an agency with an almost unlimited agenda. Its scale and aggressiveness are breathtaking.
The agency’s Dishfire database — nothing happens without a code word at the N.S.A. — stores years of text messages from around the world, just in case. Its Tracfin collection accumulates gigabytes of credit card purchases. The fellow pretending to send a text message at an Internet cafe in Jordan may be using an N.S.A. technique code-named Polarbreeze to tap into nearby computers. The Russian businessman who is socially active on the web might just become food for Snacks, the acronym-mad agency’s Social Network Analysis Collaboration Knowledge Services, which figures out the personnel hierarchies of organizations from texts.
The spy agency’s station in Texas intercepted 478 emails while helping to foil a jihadist plot to kill a Swedish artist who had drawn pictures of the Prophet Muhammad. N.S.A. analysts delivered to authorities at Kennedy International Airport the names and flight numbers of workers dispatched by a Chinese human smuggling ring.
The agency’s eavesdropping gear, aboard a Defense Department plane flying 60,000 feet over Colombia, fed the location and plans of FARC rebels to the Colombian Army. In the Orlandocard operation, N.S.A. technicians set up what they called a “honeypot” computer on the web that attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 that the agency deemed of potential future interest.
The Global Phone Book
No investment seems too great if it adds to the agency’s global phone book. After mounting a major eavesdropping effort focused on a climate change conference in Bali in 2007, agency analysts stationed in Australia’s outback were especially thrilled by one catch: the cellphone number of Bali’s police chief.
“Our mission,” says the agency’s current five-year plan, which has not been officially scheduled for declassification until 2032, “is to answer questions about threatening activities that others mean to keep hidden.”
The aspirations are grandiose: to “utterly master” foreign intelligence carried on communications networks. The language is corporate: “Our business processes need to promote data-driven decision-making.” But the tone is also strikingly moralistic for a government bureaucracy. Perhaps to counter any notion that eavesdropping is a shady enterprise, signals intelligence, or Sigint, the term of art for electronic intercepts, is presented as the noblest of callings.
“Sigint professionals must hold the moral high ground, even as terrorists or dictators seek to exploit our freedoms,” the plan declares. “Some of our adversaries will say or do anything to advance their cause; we will not.”
The N.S.A. documents taken by Mr. Snowden and shared with The Times, numbering in the thousands and mostly dating from 2007 to 2012, are part of a collection of about 50,000 items that focus mainly on its British counterpart, Government Communications Headquarters or G.C.H.Q.
While far from comprehensive, the documents give a sense of the agency’s reach and abilities, from the Navy ships snapping up radio transmissions as they cruise off the coast of China, to the satellite dishes at Fort Meade in Maryland ingesting worldwide banking transactions, to the rooftops of 80 American embassies and consulates around the world from which the agency’s Special Collection Service aims its antennas.
The agency and its many defenders among senior government officials who have relied on its top secret reports say it is crucial to American security and status in the world, pointing to terrorist plots disrupted, nuclear proliferation tracked and diplomats kept informed.
But the documents released by Mr. Snowden sometimes also seem to underscore the limits of what even the most intensive intelligence collection can achieve by itself. Blanket N.S.A. eavesdropping in Afghanistan, described in the documents as covering government offices and the hide-outs of second-tier Taliban militants alike, has failed to produce a clear victory against a low-tech enemy. The agency kept track as Syria amassed its arsenal of chemical weapons — but that knowledge did nothing to prevent the gruesome slaughter outside Damascus in August.
The documents are skewed toward celebration of the agency’s self-described successes, as underlings brag in PowerPoints to their bosses about their triumphs and the managers lay out grand plans. But they do not entirely omit the agency’s flubs and foibles: flood tides of intelligence gathered at huge cost that goes unexamined; intercepts that cannot be read for lack of language skills; and computers that — even at the N.S.A. — go haywire in all the usual ways.
Mapping Message Trails
In May 2009, analysts at the agency learned that Iran’s supreme leader, Ayatollah Ali Khamenei, was to make a rare trip to Kurdistan Province in the country’s mountainous northwest. The agency immediately organized a high-tech espionage mission, part of a continuing project focused on Ayatollah Khamenei called Operation Dreadnought.
Working closely with the National Geospatial-Intelligence Agency, which handles satellite photography, as well as G.C.H.Q., the N.S.A. team studied the Iranian leader’s entourage, its vehicles and its weaponry from satellites, and intercepted air traffic messages as planes and helicopters took off and landed.
They heard Ayatollah Khamenei’s aides fretting about finding a crane to load an ambulance and fire truck onto trucks for the journey. They listened as he addressed a crowd, segregated by gender, in a soccer field.
They studied Iranian air defense radar stations and recorded the travelers’ rich communications trail, including Iranian satellite coordinates collected by an N.S.A. program called Ghosthunter. The point was not so much to catch the Iranian leader’s words, but to gather the data for blanket eavesdropping on Iran in the event of a crisis.
This “communications fingerprinting,” as a document called it, is the key to what the N.S.A. does. It allows the agency’s computers to scan the stream of international communications and pluck out messages tied to the supreme leader. In a crisis — say, a showdown over Iran’s nuclear program — the ability to tap into the communications of leaders, generals and scientists might give a crucial advantage.
On a more modest scale, the same kind of effort, what N.S.A. calls “Sigint development,” was captured in a document the agency obtained in 2009 from Somalia — whether from a human source or an electronic break-in was not noted. It contained email addresses and other contact details for 117 selected customers of a Mogadishu Internet service, Globalsom.
While most on the list were Somali officials or citizens, presumably including some suspected of militancy, the document also included emails for a United Nations political officer in Mogadishu and a local representative for the charity World Vision, among other international institutions. All, it appeared, were considered fair game for monitoring.
This huge investment in collection is driven by pressure from the agency’s “customers,” in government jargon, not only at the White House, Pentagon, F.B.I. and C.I.A., but also spread across the Departments of State and Energy, Homeland Security and Commerce, and the United States Trade Representative.
By many accounts, the agency provides more than half of the intelligence nuggets delivered to the White House early each morning in the President’s Daily Brief — a measure of success for American spies. (One document boasts that listening in on Nigerian State Security had provided items for the briefing “nearly two dozen” times.) In every international crisis, American policy makers look to the N.S.A. for inside information.
Pressure to Get Everything
That creates intense pressure not to miss anything. When that is combined with an ample budget and near-invisibility to the public, the result is aggressive surveillance of the kind that has sometimes gotten the agency in trouble with the Foreign Intelligence Surveillance Court, a United States federal court that polices its programs for breaches of Americans’ privacy.
In the funding boom that followed the Sept. 11 attacks, the agency expanded and decentralized far beyond its Fort Meade headquarters in Maryland, building or expanding major facilities in Georgia, Texas, Colorado, Hawaii, Alaska, Washington State and Utah. Its officers also operate out of major overseas stations in England, Australia, South Korea and Japan, at overseas military bases, and from locked rooms housing the Special Collection Service inside American missions abroad.
The agency, using a combination of jawboning, stealth and legal force, has turned the nation’s Internet and telecommunications companies into collection partners, installing filters in their facilities, serving them with court orders, building back doors into their software and acquiring keys to break their encryption.
But even that vast American-run web is only part of the story. For decades, the N.S.A. has shared eavesdropping duties with the rest of the so-called Five Eyes, the Sigint agencies of Britain, Canada, Australia and New Zealand. More limited cooperation occurs with many more countries, including formal arrangements called Nine Eyes and 14 Eyes and Nacsi, an alliance of the agencies of 26 NATO countries.
The extent of Sigint sharing can be surprising: “N.S.A. may pursue a relationship with Vietnam,” one 2009 G.C.H.Q. document reported. But a recent G.C.H.Q. training document suggests that not everything is shared, even between the United States and Britain. “Economic well-being reporting,” it says, referring to intelligence gathered to aid the British economy, “cannot be shared with any foreign partner.”
As at the school lunch table, decisions on who gets left out can cause hurt feelings: “Germans were a little grumpy at not being invited to join the 9-Eyes group,” one 2009 document remarks. And in a delicate spy-versus-spy dance, sharing takes place even with governments that are themselves important N.S.A. targets, notably Israel.
The documents describe collaboration with the Israel Sigint National Unit, which gets raw N.S.A. eavesdropping material and provides it in return, but they also mention the agency’s tracking of “high priority Israeli military targets,” including drone aircraft and the Black Sparrow missile system.
The alliances, and the need for stealth, can get complicated. At one highly valued overseas listening post, the very presence of American N.S.A. personnel violates a treaty agreed to by the agency’s foreign host. Even though much of the eavesdropping is run remotely from N.S.A.’s base at Fort Gordon, Ga., Americans who visit the site must pose as contractors, carry fake business cards and are warned: “Don’t dress as typical Americans.”
“Know your cover legend,” a PowerPoint security briefing admonishes the N.S.A. staff members headed to the overseas station, directing them to “sanitize personal effects,” send no postcards home and buy no identifiably local souvenirs. (“An option might be jewelry. Most jewelry does not have any markings” showing its place of origin.)
Bypassing Security
In the agency’s early years, its brainy staff members — it remains the largest employer of mathematicians in the country — played an important role in the development of the first computers, then largely a tool for code breaking.
Today, with personal computers, laptops, tablets and smartphones in most homes and government offices in the developed world, hacking has become the agency’s growth area.
Some of Mr. Snowden’s documents describe the exploits of Tailored Access Operations, the prim name for the N.S.A. division that breaks into computers around the world to steal the data inside, and sometimes to leave spy software behind. T.A.O. is increasingly important in part because it allows the agency to bypass encryption by capturing messages as they are written or read, when they are not encoded.
In Baghdad, T.A.O. collected messages left in draft form in email accounts maintained by leaders of the Islamic State of Iraq, a militant group. Under a program called Spinaltap, the division’s hackers identified 24 unique Internet Protocol addresses identifying computers used by the Lebanese militant group Hezbollah, making it possible to snatch Hezbollah messages from the flood of global communications sifted by the agency.
The N.S.A.’s elite Transgression Branch, created in 2009 to “discover, understand, evaluate and exploit” foreign hackers’ work, quietly piggybacks on others’ incursions into computers of interest, like thieves who follow other housebreakers around and go through the windows they have left ajar.
In one 2010 hacking operation code-named Ironavenger, for instance, the N.S.A. spied simultaneously on an ally and an adversary. Analysts spotted suspicious emails being sent to a government office of great intelligence interest in a hostile country and realized that an American ally was “spear-phishing” — sending official-looking emails that, when opened, planted malware that let hackers inside.
The Americans silently followed the foreign hackers, collecting documents and passwords from computers in the hostile country, an elusive target. They got a look inside that government and simultaneously got a close-up look at the ally’s cyberskills, the kind of intelligence twofer that is the unit’s specialty.
In many other ways, advances in computer and communications technology have been a boon for the agency. N.S.A. analysts tracked the electronic trail left by a top leader of Al Qaeda in Africa each time he stopped to use a computer on his travels. They correctly predicted his next stop, and the police were there to arrest him.
And at the big N.S.A. station at Fort Gordon, technicians developed an automated service called “Where’s My Node?” that sent an email to an analyst every time a target overseas moved from one cell tower to another. Without lifting a finger, an analyst could follow his quarry’s every move.
The Limits of Spying
The techniques described in the Snowden documents can make the N.S.A. seem omniscient, and nowhere in the world is that impression stronger than in Afghanistan. But the agency’s capabilities at the tactical level have not been nearly enough to produce clear-cut strategic success there, in the United States’ longest war.
A single daily report from June 2011 from the N.S.A.’s station in Kandahar, Afghanistan, the heart of Taliban country, illustrates the intensity of eavesdropping coverage, requiring 15 pages to describe a day’s work.
The agency listened while insurgents from the Haqqani network mounted an attack on the Hotel Intercontinental in Kabul, overhearing the attackers talking to their bosses in Pakistan’s tribal area and recording events minute by minute. “Ruhullah claimed he was on the third floor and had already inflicted one casualty,” the report said in a typical entry. “He also indicated that Hafiz was located on a different floor.”
N.S.A. officers listened as two Afghan Foreign Ministry officials prepared for a meeting between President Hamid Karzai of Afghanistan and Iranian officials, assuring them that relations with the United States “would in no way threaten the interests of Iran,” which they decided Mr. Karzai should describe as a “brotherly country.”
The N.S.A. eavesdropped as the top United Nations official in Afghanistan, Staffan de Mistura, consulted his European Union counterpart, Vygaudas Usackas, about how to respond to an Afghan court’s decision to overturn the election of 62 members of Parliament.
And the agency was a fly on the wall for a long-running land dispute between the mayor of Kandahar and a prominent local man known as the Keeper of the Cloak of the Prophet Muhammad, with President Karzai’s late brother, Ahmed Wali Karzai, as a mediator.
The agency discovered a Taliban claim to have killed five police officers at a checkpoint by giving them poisoned yogurt, and heard a provincial governor tell an aide that a district police chief was verbally abusing women and clergymen.
A Taliban figure, Mullah Rahimullah Akhund, known on the United States military’s kill-or-capture list by the code name Objective Squiz Incinerator, was overheard instructing an associate to buy suicide vests and a Japanese motorbike, according to the documents.
And N.S.A. listened in as a Saudi extremist, Abu Mughira, called his mother to report that he and his fellow fighters had entered Afghanistan and “done victorious operations.”
Such reports flowed from the agency’s Kandahar station day after day, year after year, and surely strengthened the American campaign against the Taliban. But they also suggest the limits of intelligence against a complex political and military challenge. The N.S.A. recorded the hotel attack, but it had not prevented it. It tracked Mr. Karzai’s government, but he remained a difficult and volatile partner. Its surveillance was crucial in the capture or killing of many enemy fighters, but not nearly enough to remove the Taliban’s ominous shadow from Afghanistan’s future.
Mining All the Tidbits
In the Afghan reports and many others, a striking paradox is the odd intimacy of a sprawling, technology-driven agency with its targets. It is the one-way intimacy of the eavesdropper, as N.S.A. employees virtually enter the office cubicles of obscure government officials and the Spartan hide-outs of drug traffickers and militants around the world.
Venezuela, for instance, was one of six “enduring targets” in N.S.A.’s official mission list from 2007, along with China, North Korea, Iraq, Iran and Russia. The United States viewed itself in a contest for influence in Latin America with Venezuela’s leader then, the leftist firebrand Hugo Chávez, who allied himself with Cuba, and one agency goal was “preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests.”
A glimpse of what this meant in practice comes in a brief PowerPoint presentation from August 2010 on “Development of the Venezuelan Economic Mission.” The N.S.A. was tracking billions of dollars flowing to Caracas in loans from China (radar systems and oil drilling), Russia (MIG fighter planes and shoulder-fired missiles) and Iran (a factory to manufacture drone aircraft).
But it was also getting up-close and personal with Venezuela’s Ministry of Planning and Finance, monitoring the government and personal emails of the top 10 Venezuelan economic officials. An N.S.A. officer in Texas, in other words, was paid each day to peruse the private messages of obscure Venezuelan bureaucrats, hunting for tidbits that might offer some tiny policy edge.
In a counterdrug operation in late 2011, the agency’s officers seemed to know more about relations within a sprawling narcotics network than the drug dealers themselves. They listened to “Ricketts,” a Jamaican drug supplier based in Ecuador, struggling to keep his cocaine and marijuana smuggling business going after an associate, “Gordo,” claimed he had paid $250,000 and received nothing in return.
The N.S.A., a report said, was on top of not just their cellphones, but also those of the whole network of “buyers, transporters, suppliers, and middlemen” stretching from the Netherlands and Nova Scotia to Panama City and Bogotá, Colombia. The documents do not say whether arrests resulted from all that eavesdropping.
Even with terrorists, N.S.A. units can form a strangely personal relationship. The N.S.A.-G.C.H.Q. wiki, a top secret group blog that Mr. Snowden downloaded, lists 14 specialists scattered in various stations assigned to Lashkar-e-Taiba, the Pakistani terrorist group that carried out the bloody attack on Mumbai in 2008, with titles including “Pakistan Access Pursuit Team” and “Techniques Discovery Branch.” Under the code name Treaclebeta, N.S.A.’s hackers at Tailored Access Operations also played a role.
In the wiki’s casual atmosphere, American and British eavesdroppers exchange the peculiar shoptalk of the secret world. “I don’t normally use Heretic to scan the fax traffic, I use Nucleon,” one user writes, describing technical tools for searching intercepted documents.
But most striking are the one-on-one pairings of spies and militants; Bryan is assigned to listen in on a man named Haroon, and Paul keeps an ear on Fazl.
A Flood of Details
One N.S.A. officer on the Lashkar-e-Taiba beat let slip that some of his eavesdropping turned out to be largely pointless, perhaps because of the agency’s chronic shortage of skilled linguists. He “ran some queries” to read intercepted communications of certain Lashkar-e-Taiba members, he wrote in the wiki, but added: “Most of it is in Arabic or Farsi, so I can’t make much of it.”
It is a glimpse of the unsurprising fact that sometimes the agency’s expensive and expansive efforts accomplish little. Despite the agency’s embrace of corporate jargon on goal-setting and evaluation, it operates without public oversight in an arena in which achievements are hard to measure.
In a world of ballooning communications, the agency is sometimes simply overwhelmed. In 2008, the N.S.A.’s Middle East and North Africa group set about updating its Sigint collection capabilities. The “ambitious scrub” of selectors — essentially search terms — cut the number of terms automatically searched from 21,177 to 7,795 and the number of messages added to the agency’s Pinwale database from 850,000 a day to 450,000 a day.
The reduction in volume was treated as a major achievement, opening the way for new collection on Iranian leadership and Saudi and Syrian diplomats, the report said.
And in a note that may comfort computer novices, the N.S.A. Middle East analysts discovered major glitches in their search software: The computer was searching for the names of targets but not their email addresses, a rather fundamental flaw. “Over 500 messages in one week did not come in,” the report said about one target.
Those are daily course corrections. Whether the Snowden disclosures will result in deeper change is uncertain. Joel F. Brenner, the agency’s former inspector general, says much of the criticism is unfair, reflecting a naïveté about the realpolitik of spying. “The agency is being browbeaten for doing too well the things it’s supposed to do,” he said.
But Mr. Brenner added that he believes “technology has outrun policy” at the N.S.A., and that in an era in which spying may well be exposed, “routine targeting of close allies is bad politics and is foolish.”
Another former insider worries less about foreign leaders’ sensitivities than the potential danger the sprawling agency poses at home. William E. Binney, a former senior N.S.A. official who has become an outspoken critic, says he has no problem with spying on foreign targets like Brazil’s president or the German chancellor, Angela Merkel. “That’s pretty much what every government does,” he said. “It’s the foundation of diplomacy.” But Mr. Binney said that without new leadership, new laws and top-to-bottom reform, the agency will represent a threat of “turnkey totalitarianism” — the capability to turn its awesome power, now directed mainly against other countries, on the American public.
“I think it’s already starting to happen,” he said. “That’s what we have to stop.”
Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”
November 2, 2013
By SCOTT SHANE
Find this story at 2 November 2013
© 2013 The New York Times Company
NSA shares raw intelligence including Americans’ data with Israel7 november 2013
• Secret deal places no legal limits on use of data by Israelis
• Only official US government communications protected
• Agency insists it complies with rules governing privacy
• Read the NSA and Israel’s ‘memorandum of understanding’
The agreement for the US to provide raw intelligence data to Israel was reached in principle in March 2009, the document shows. Photograph: James Emery
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.
The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.
But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”
According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.
Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.
“This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.
In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.
“Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.
The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.
Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.
It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.
The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.
Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.
The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.
Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.
Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.
The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.
While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.
“Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”
In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”
Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”
The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.
It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.
However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”
The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.
In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.
“NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”
Glenn Greenwald, Laura Poitras and Ewen MacAskill
The Guardian, Wednesday 11 September 2013 15.40 BST
Find this story at 11 September 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Snowden Documents Reveal NSA Gave Israeli Spies Raw Emails, Texts, Calls of Innocent Americans23 september 2013
Despite assurances from President Obama, the scandal around the National Security Agency continues to grow. The Guardian reports the NSA has routinely passed raw intelligence to Israel about U.S. citizens. “The NSA was sharing what they call raw signals intelligence, which includes things like who you are calling and when you are calling, the content of your phone call, the text of your emails, your text messages, your chat messages,” says Alex Abdo of the American Civil Liberties Union. “It sounds like all of that was handed over.” Abdo also discusses the ACLU’s successful fight to force the government to declassify documents that show the NSA wrongly put 16,000 American phone numbers on an “alert list.”
Transcript
This is a rush transcript. Copy may not be in its final form.
JUAN GONZÁLEZ: The Guardian newspaper reported Wednesday the National Security Agency routinely has passed raw intelligence to Israel without first removing details about U.S. citizens. Documents leaked by NSA contractor Edward Snowden revealed details of a secret intelligence-sharing agreement between the NSA and its Israeli counterpart, that shows the U.S. government handed over intercepted communications containing phone calls and emails of U.S. citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
Meanwhile, newly declassified documents show the NSA wrongly put 16,000 phone numbers on an “alert list” so their incoming calls could be monitored in violation of court-ordered privacy protections.
AMY GOODMAN: When the NSA notified the Foreign Intelligence Surveillance Court about the error, Judge Reggie Walton of the Foreign Intelligence Surveillance Court wrote, quote, “The court is exceptionally concerned about what appears to be a flagrant violation of its order in this matter.” The documents were declassified after a long fight with the Electronic Frontier Foundation and the American Civil Liberties Union that filed a Freedom of Information Act lawsuit two years ago.
In other NSA news, Brazilian President Dilma Rousseff is facing pressure at home to cancel an upcoming state visit to the White House after documents leaked by Snowden revealed the NSA had hacked into the computer networks of Brazil’s state-run oil company Petrobras. On Wednesday, President Obama’s national security adviser, Susan Rice, met with Brazilian Foreign Minister Luiz Alberto in an attempt to smooth relations between the countries.
To talk more about all of these latest developments, we’re joined by Alex Abdo. He is staff attorney at the National Security Project at the American Civil Liberties Union.
Alex, let’s take these in order. The information about the NSA, the U.S. intelligence agency, handing over raw data that it’s collected—legally or illegally, I think remains to be determined—to Israel, can you explain what’s taken place?
ALEX ABDO: It’s difficult to explain. And it’s, you know, of course, not surprising that the NSA is sharing foreign intelligence with our intelligence partners, but what’s troubling is that along with the foreign intelligence is information about innocent Americans that hasn’t been taken out of the data that’s being shared with our intelligence partners. And it’s troubling for a couple of reasons, the first of which, we haven’t known about this, and this may have been going on for years, and the second of which, there’s no avenue for Americans, innocent Americans who are swept up into these dragnets and have their information handed over to our intelligence partners, to stop that flow of information, to assert their rights and prevent it. So this has been going on for some time, it seems, and it raises new questions about the NSA’s—the extent to which we should trust the NSA with information, very sensitive, about innocent Americans.
JUAN GONZÁLEZ: And what limitations were placed on the information that was—that was handed over to the Israelis, in terms of what they could do with it or how long they could hold it?
ALEX ABDO: Well, based on the documents that were released, it seems as though we basically had a “trust us” regime in place for the sharing of data with Israel. And that’s cold comfort, I think, to the potentially thousands or millions of Americans who find their way into these international surveillance dragnets of the NSA. But there’s simply no way of knowing right now how many Americans were affected, how the information was used, or what other measures the NSA may have taken or may not have taken to protect our privacy.
AMY GOODMAN: And what the information was that was handed over, is it the actual—is it the metadata of phone calls, who you called, when you called them? Is it the actual phone call?
ALEX ABDO: It sounds as though it was all of that. The NSA was sharing what they call raw signals intelligence, which includes things like who you’re calling and when you’re calling, but also the content of your phone calls, the text of your emails, your text messages, your chat messages. It sounds as though all of that was handed over in what they call this raw intelligence.
AMY GOODMAN: And who was targeted?
ALEX ABDO: It’s hard to say. It sounds as though the information sharing was indiscriminate, that they handed over large amounts of information without actually targeting at the outset, and allowing the Israeli analog to the NSA to then scour this information for what was useful. And like I said, they, you know, apparently had in place a clause asking Israel not to abuse this information, but there really didn’t seem to be any legally enforceable way to prevent Americans’ privacy from being violated in the course of this intelligence sharing.
JUAN GONZÁLEZ: Now, the documents you have referred to appear between 2006 and 2009, which would be the tail end of the Bush administration, but your battle to get access to the documents occurred during the Obama administration. Can you talk about that battle to be able to get these documents released?
ALEX ABDO: Sure. In 2011, two senators, Senators Wyden and Udall, started raising red flags, warnings to America about a secret interpretation that the government was relying on to collect an extraordinary amount of information about innocent Americans. And on the heels of that discussion, the ACLU and other organizations, including the Electronic Frontier Foundation, filed requests with the government for these secret interpretations of law. And the Obama administration, which had come into power on a promise of a new era of transparency, fought bitterly to keep these documents secret for years. And they were—it’s actually a bit ironic. In the midst of the disclosures, Obama was in the course of defending very vigorously in court extreme secrecy about these very same documents that were released two days ago. So, it’s—the secrecy was troubling. The fact that they’re now public is a good first step toward greater transparency, but this is information that did not come easily out of the Obama administration.
AMY GOODMAN: One of the documents released was a March 2nd, 2009, court order written by Judge Reggie Walton, now the presiding judge on the Foreign Intelligence Surveillance Court. Walton writes of the NSA’s bulk collection of phone records, quote, “To approve such a program, the Court must have every confidence that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Court’s orders. The Court no longer has such confidence.” This is the judge.
ALEX ABDO: This is extremely troubling, and it should be very disturbing. We have trusted for years a secret and one-sided judicial process to safeguard Americans’ right to privacy when it comes to NSA surveillance. And the disclosures over the past few months have confirmed that we shouldn’t trust that system to safeguard our right to privacy. And at the end of the day, the battle is between a system in which the NSA is required to go to court to engage in lawful surveillance versus the system that it has now, where it rarely has to go to court to spy even on innocent Americans. And we shouldn’t have confidence in that system, and now we know that there are even more reasons than we suspected not to have confidence in the system. But at the end of the day, that’s the debate, whether the NSA, when it wants to spy on Americans, should be forced to go to a court to justify that spying. The NSA hasn’t been doing that for years, and we need to change that, to force the NSA to justify its surveillance in court.
JUAN GONZÁLEZ: Of course, President Obama has been justifying that surveillance. I want to turn to a clip from him speaking last month about the leaks by Edward Snowden.
PRESIDENT BARACK OBAMA: If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s emails. What you’re hearing about is the prospect that these could be abused. Now, part of the reason they’re not abused is because these checks are in place, and those abuses would be against the law and would be against the orders of the FISC.
JUAN GONZÁLEZ: What about President Obama’s claim that the checks are in place?
ALEX ABDO: Well, I think it’s quite obvious now that the checks are not in place, that the very authorities that the government says are carefully overseen by the secret court in D.C. and by regulators within the intelligence communities are failing, that there are violations of even these very permissive rules. But at the end—you know, a core problem is not just that there are violations, but that the law authorizes an extraordinary amount of surveillance in the first place. And that underlying authorization is far too broad. It allows the NSA to engage in a form of dragnet surveillance of even Americans’ communications, that’s not tied to a particular investigation. It’s not tied to a particular terrorist plot that the NSA is trying to stop. That, I think, is the most troubling aspect of these revelations, is that these powers are simply too broad, to begin with.
AMY GOODMAN: On Wednesday, the Yahoo CEO, Marissa Mayer, responded to critics who have accused Internet companies of working with the NSA. During an interview at the TechCrunch Disrupt conference in San Francisco, she was asked why tech companies had not simply decided to tell the public more about what the NSA was doing.
MARISSA MAYER: We can’t talk about those things.
MICHAEL ARRINGTON: Why?
MARISSA MAYER: Because they’re classified.
MICHAEL ARRINGTON: What is—I mean, why?
MARISSA MAYER: And so—so, I mean—just to—
MICHAEL ARRINGTON: Let’s just say, look, right now you were just to tell us the truth about what’s going on, the stuff that’s classified, like what do you think would happen to you?
MARISSA MAYER: I mean, releasing classified information is treason.
MICHAEL ARRINGTON: And then what happens?
MARISSA MAYER: Just generally, and you—you know, incarcerated.
AMY GOODMAN: That was Marissa Mayer. She is the head of Yahoo. Alex Abdo?
ALEX ABDO: You know, Ms. Mayer is correct that there are extraordinary limits on what these companies can say, but it’s not correct to say that they can’t be doing more to protect the privacy of their users. There are a number of steps that these companies can take and should take, and Yahoo recently took one of those steps in joining Google and Microsoft in pushing the secret court in D.C. to allow them to say more about the government surveillance. Those companies want to be able to tell the public how many Americans are affected by the government’s surveillance, the numbers of court orders they get to turn over this information, and, very generally, the type of information they’re being asked to turn over. That’s all information that the government should allow these companies to disclose. It would allow Americans to better understand the surveillance that’s taking place in our name, and it would allow us to make a decision for ourselves whether the surveillance is lawful and whether it’s necessary.
JUAN GONZÁLEZ: Not only that, but I think there is a—as I’ve said before on this show, there is a conflict between the economic needs of these companies, because they’re all global companies, and no matter what happens in the United States, this is going to affect their businesses in other parts of the world as more and more countries decide you can’t trust American technology companies to use their search engines or use their products if they are allowing the government to serveil not only American citizens, but people around the world, so that it seems to me there’s a need to meet the needs of their own shareholders, the business interests of the company, to oppose these kind of government policies.
ALEX ABDO: I think that’s right. We’re putting our American companies at a competitive disadvantage when it comes to their business. They’re being forced to compete with companies outside the U.S. that aren’t receiving these NSA surveillance orders. But it’s important to note, too, that these companies can do more to protect the privacy of their consumers, even when they are not allowed to talk about the surveillance of the NSA. They can put in place technological fixes that allow users to trust their services more. And we’re starting to see that type of a response by the tech industry. They’re starting to compete over privacy. One of Microsoft’s—for example, its new campaigns is “Don’t get Scroogled.” It’s their way of competing against Google’s skimming of our emails for ad tracking. And as Americans, I think, come to appreciate the value of our privacy and the vastness of the information we trust with these companies, they’ll come to demand greater assurances from the Googles and the Microsofts and the Yahoos.
AMY GOODMAN: We want to thank you very much for being with us, and just end with what surprised you most by all of these revelations that have come out from Ed Snowden. I mean, the president says this debate has—would have happened anyway. You’re a longtime—and certainly the ACLU has been deeply concerned about civil liberties issues. Would it have happened anyway? And what have you found most shocking in the last few months?
ALEX ABDO: I don’t think this transparency would have happened. This is an involuntary debate that the administration is now welcoming after the fact, and it’s a long overdue one. And one of the things that has shocked me the most, I think, is, in reading these documents, to see how much information is kept secret that should never have been kept secret in the first place. Americans deserve to be a part of this conversation, but they’re being kept out of it by unnecessary overclassification of this information.
AMY GOODMAN: Thanks so much, Alex Abdo, staff attorney at the National Security Project of the American Civil Liberties Union. This is Democracy Now!, democracynow.org, The War and Peace Report. Back in a minute.
Thursday, September 12, 2013
Find this story at 12 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
NSA shares raw intelligence including Americans’ data with Israel23 september 2013
The agreement for the US to provide raw intelligence data to Israel was reached in principle in March 2009, the document shows. Photograph: James Emery
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.
The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.
But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”
According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.
Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.
“This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.
In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.
“Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.
The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.
Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.
It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.
The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.
Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.
The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.
Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.
Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.
The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.
While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.
“Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”
In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”
Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”
The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.
It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.
However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”
The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.
In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.
“NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”
Glenn Greenwald, Laura Poitras and Ewen MacAskill
The Guardian, Wednesday 11 September 2013 15.40 BST
Find this story at 11 September 2013
Read the NSA and Israel’s ‘memorandum of understanding’
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
US stops jailed activist Barrett Brown from discussing leaks prosecution6 september 2013
Federal court order prohibits Brown from talking to the media in what critics say is latest in crackdown on investigative journalism
Brown’s lawyer says the gagging order is a breach of Brown’s first amendment rights. Photograph: Nikki Loehr
A federal court in Dallas, Texas has imposed a gag order on the jailed activist-journalist Barrett Brown and his legal team that prevents them from talking to the media about his prosecution in which he faces up to 100 years in prison for alleged offences relating to his work exposing online surveillance.
The court order, imposed by the district court for the northern district of Texas at the request of the US government, prohibits the defendant and his defence team, as well as prosecutors, from making “any statement to members of any television, radio, newspaper, magazine, internet (including, but not limited to, bloggers), or other media organization about this case, other than matters of public interest.”
It goes on to warn Brown and his lawyers that “no person covered by this order shall circumvent its effect by actions that indirectly, but deliberately, bring about a violation of this order”.
According to Dell Cameron of Vice magazine, who attended the hearing, the government argued that the gag order was needed in order to protect Brown from prejudicing his right to a fair trial by making comments to reporters.
But media observers seen the hearing in the opposite light: as the latest in a succession of prosecutorial moves under the Obama administration to crack-down on investigative journalism, official leaking, hacking and online activism.
Brown’s lead defence attorney, Ahmed Ghappour, has countered in court filings, the most recent of which was lodged with the court Wednesday, that the government’s request for a gag order is unfounded as it is based on false accusations and misrepresentations.
The lawyer says the gagging order is a breach of Brown’s first amendment rights as an author who continues to write from his prison cell on issues unconnected to his own case for the Guardian and other media outlets.
In his memo to the court for today’s hearing, Ghappour writes that Brown’s July article for the Guardian “contains no statements whatsoever about this trial, the charges underlying the indictment, the alleged acts underlying the three indictments against Mr Brown, or even facts arguably related to this prosecution.”
The gag order does give Brown some room to carry on his journalistic work from prison. It says that he will be allowed to continue publishing articles on topics “not related to the counts on which he stands indicted”.
Following the imposition of the order, Ghappour told the Guardian: “The defense’s overriding concern is that Mr Brown continue to be able to exercise his first amendment right as a journalist. The order preserves that ability.”
The lawyer adds that since the current defence team took over in May, Brown has made only three statements to the media, two of which where articles that did not concern his trial while the third ran no risk of tainting the jury pool. “Defendant believes that a gag order is unwarranted because there is no substantial, or even reasonable, likelihood of prejudice to a fair trial based on statements made by defendant or his counsel since May 1, 2013.”
Brown, 32, was arrested in Dallas on 12 September last year and has been in prison ever since, charged with 17 counts that include threatening a federal agent, concealing evidence and disseminating stolen information. He faces a possible maximum sentence of 100 years in custody.
Before his arrest, Brown became known as a specialist writer on the US government’s use of private military contractors and cybersecurity firms to conduct online snooping on the public. He was regularly quoted by the media as an expert on Anonymous, the loose affiliation of hackers that caused headaches for the US government and several corporate giants, and was frequently referred to as the group’s spokesperson, though he says the connection was overblown.
In 2011, through the research site he set up called Project PM, he investigated thousands of emails that had been hacked by Anonymous from the computer system of a private security firm, HB Gary Federal. His work helped to reveal that the firm had proposed a dark arts effort to besmirch the reputations of WikiLeaks supporters and prominent liberal journalists and activists including the Guardian’s Glenn Greenwald.
In 2012, Brown similarly pored over millions of emails hacked by Anonymous from the private intelligence company Stratfor. It was during his work on the Stratfor hack that Brown committed his most serious offence, according to US prosecutors – he posted a link in a chat room that connected users to Stratfor documents that had been released online.
The released documents included a list of email addresses and credit card numbers belonging to Stratfor subscribers. For posting that link, Brown is accused of disseminating stolen information – a charge with media commentators have warned criminalises the very act of linking.
As Geoffrey King, Internet Advocacy Coordinator for the Committee to Protect Journalists, has put it, the Barrett Brown case “could criminalize the routine journalistic practice of linking to documents publicly available on the internet, which would seem to be protected by the first amendment to the US constitution under current doctrine”.
In its motion to the Dallas district court, US prosecutors accuse Brown and his associates of having “solicited the services of the media or media-types to discuss his case” and of continuing to “manipulate the public through press and social media comments”.
It further accuses Ghappour of “co-ordinating” and “approving” the use of the media, and alleges that between them they have spread “gross fabrications and substantially false recitations of facts and law which may harm both the government and the defence during jury selection”.
But Ghappour in his legal response has pointed out that several of the specific accusations raised by the government are inaccurate. Prosecutors refer to an article in the Guardian by Greenwald published on 21 March 2013 based partly on an interview between the journalist and Brown, yet as Ghappour points out that piece was posted on the Guardian website before the accused’s current legal team had been appointed.
Under his legal advice, Ghappour writes, Brown has maintained “radio silence” over his case and has given no further interviews, thus negating the government’s case for a gagging order.
Ed Pilkington in New York
theguardian.com, Wednesday 4 September 2013 22.50 BST
Find this story at 4 September 2013
© 2013 Guardian News and Media Limited or its affiliated companies.
Barrett Brown Faces 105 Years in Jail; But no one can figure out what law he broke. Introducing America’s least likely political prisoner6 september 2013
The mid-June sun is setting on the Mansfield jail near Dallas when Barrett Brown, the former public face of Anonymous, shuffles into the visitors hall wearing a jumpsuit of blazing orange. Once the nattiest anarchist around, Brown now looks like every other inmate in the overcrowded North Texas facility, down to his state-issued faux-Crocs, the color of candy corn.
Who Are America’s New Political Prisoners?
Brown sits down across from his co-counsel, a young civil-liberties lawyer named Ahmed Ghappour, and raises a triumphant fist holding several sheets of notebook paper. “Penned it out,” he says. “After 10 months, I’m finally getting the hang of these archaic tools.” He hands the article, titled “The Cyber-Intelligence Complex and Its Useful Idiots,” to his lawyer with instructions to send it to his editor at The Guardian. Brown used to write for the British daily, but since he’s been in prison, it’s written about him and his strange legal ordeal that has had him locked up for nearly a year while he awaits trial next month. Should he be found guilty of all the charges the federal government is bringing against him – 17 counts, ranging from obstruction of justice to threatening a federal officer to identity fraud – he’ll face more than 100 years in prison.
Given the serious nature of his predicament, Brown, 32, seems shockingly relaxed. “I’m not worried or panicked,” he says. “It’s not even clear to me that I’ve committed a crime.” He describes his time here as a break from the drug-fueled mania of his prior life, a sort of digital and chemical fast in which he’s kicked opiates and indulged his pre-cyber whims – hours spent on the role-playing game GURPS and tearing through the prison’s collection of what he calls “English manor-house literature.”
Brown has been called many things during his brief public career – satirist, journalist, author, Anonymous spokesman, atheist, “moral fag,” “fame whore,” scourge of the national surveillance state. His commitment to investigating the murky networks that make up America’s post-9/11 intelligence establishment set in motion the chain of events that culminated in a guns-drawn raid of his Dallas apartment last September. “For a long time, the one thing I was happy not to see in here was a computer,” says Brown. “It appears as though the Internet has gotten me into some trouble.”
Encountering Barrett Brown’s story in passing, it is tempting to group him with other Anonymous associates who have popped up in the news for cutting pleas and changing sides. Brown’s case, however, is a thing apart. Although he knew some of those involved in high-profile “hacktivism,” he is no hacker. His situation is closer to the runaway prosecution that destroyed Aaron Swartz, the programmer-activist who committed suicide in the face of criminal charges similar to those now being leveled at Brown. But unlike Swartz, who illegally downloaded a large cache of academic articles, Brown never broke into a server; he never even leaked a document. His primary laptop, sought in two armed FBI raids, was a miniature Sony netbook that he used for legal communication, research and an obscene amount of video-game playing. The most serious charges against him relate not to hacking or theft, but to copying and pasting a link to data that had been hacked and released by others.
“What is most concerning about Barrett’s case is the disconnect between his conduct and the charged crime,” says Ghappour. “He copy-pasted a publicly available link containing publicly available data that he was researching in his capacity as a journalist. The charges require twisting the relevant statutes beyond recognition and have serious implications for journalists as well as academics. Who’s allowed to look at document dumps?”
Brown’s case is a bellwether for press freedoms in the new century, where hacks and leaks provide some of our only glimpses into the technologies and policies of an increasingly privatized national security-and-surveillance state. What Brown did through his organization Project PM was attempt to expand these peepholes. He did this by leading group investigations into the world of private intelligence and cybersecurity contracting, a $56 billion industry that consumes 70 percent of the U.S. intelligence budget.
Meet Jacob Applelaum, the American Wikileaks Hacker
“Barrett was an investigative journalist who was merely doing his professional duty,” says Christophe Deloire of Reporters Without Borders. “The sentence that he is facing is absurd and dangerous.”
B
rown grew up in the affluent North Dallas neighborhood of Preston Hollow, where, following his parents’ divorce, he lived with his New Age mother. Karen Lancaster always believed her only son was special – he once wrote that she called him “an indigo child with an alien soul.” Among her house rules was that mother and son meditate together daily. She instructed him in the predictions of Nostradamus and made sure he kept a dream journal for the purpose, as Brown described it, “of helping him divine the future by way of my external connection to the collective unconscious.” (For her part, Brown’s mother says she was progressive, but not “New Age”, and that her son’s comments were made in jest.)
The Rise and Fall of Jeremy Hammond, Enemy of the State
A precocious pre-adolescent reader and writer, Brown produced a newspaper on his family’s desktop computer while in elementary school. When he started writing for the student paper at his private high school in the mid-Nineties, he quickly clashed with the paper’s censors over his right to criticize the administration. “Barrett always challenged authority, even as a kid, and anytime you go up against authority, you’re going to get in trouble,” says Brown’s father, Robert. “You could sort of always see this coming.”
By the time he reached high school, Brown had discovered Ayn Rand and declared himself an atheist. He founded an Objectivist Society at school and distinguished himself from other Randians by placing second out of 5,000 entrants in a national Ayn Rand essay contest. (Brown now expresses regret over this.) By all accounts, Brown hated everything about organized education, preferring to follow his own curricula and chat up girls on the bulletin-board systems of a still-embryonic Internet.
After his sophomore year, Brown told his parents he wasn’t going back. He signed up for online courses and spent his junior year in Tanzania with his father, a Maserati-driving conservative, safari hunter and serial entrepreneur who was trying to launch a hardwood-harvesting business. “Barrett loved living in Africa,” says his father. “He preferred adventure to being in school with his peers. We weren’t far from the embassy that was bombed that year.”
Brown returned to the U.S. and in 2000 joined some of his childhood friends in Austin, where he spent two semesters taking writing classes at the University of Texas. After dropping out, he spent a summer doing what one friend calls a “heroic” amount of Ecstasy and acid before settling into the charmed life of a pre-crisis Austin slacker – working part-time, smoking pot and paying cheap rent in a series of group houses with enormous porches. Brown’s roommates remember his rooms as being strewn with leaning towers of books and magazines – he especially liked Gore Vidal, P.J. O’Rourke and Hunter S. Thompson – but say he was not especially political. “After 9/11 and Iraq, there were a lot of protests in Austin,” says Ian Holmes, a childhood friend of Brown’s. “I don’t remember him participating in it or being extra vocal, but he was against it all like everyone else.”
As Brown built up his clip book and matured as a writer, his ambitions began to outgrow Austin. In 2007, Brown moved to Brooklyn with a group of old friends that called itself “the Texadus.” Their Bushwick apartment emerged as a hub for Lone Star State refugees who liked to get high, crush beers and play video games. “People were always hanging out and coming and going,” says Caleb Pritchard, a childhood friend of Brown’s who lived with him in Austin and Brooklyn. Among the apartment’s large cast of characters were a crew of weed-delivery guys from Puerto Rico and Honduras who used the apartment as a daytime base of business operations. “They brought over an Xbox, bought us beer and food and played strategy games with us,” Pritchard says. “It was a good cultural exchange for a bunch of skinny white kids from Dallas.”
As virtual-world games grew increasingly sophisticated, Brown spent more time in front of his computer. But he didn’t play the games like most people. In Second Life, he linked up with a group of people known as “griefers,” the term for hackers who in the mid-00s became known for generating chaos inside video-game worlds. Socializing on the bulletin board 4chan.org, they formed the first cells of what would later become Anonymous. In the documentary We Are Legion, about the hacktivist group, Brown waxes nostalgic over his griefer period, when he’d spend entire nights “on Second Life riding around in a virtual spaceship with the words ‘faggery daggery doo’ written on it, wearing Afros, dropping virtual bombs on little villages while waving giant penises around. That was the most fun time I ever had in my life.”
When everyone else went out to the bars, Brown stayed in. Aside from video games and the odd afternoon of pick-up basketball, he also pounded out columns, diaries and blog posts for Vanity Fair, Daily Kos and McSweeney’s, as well as restaurant reviews and essays for weeklies like New York Press and The Onion’s A.V. Club. Though he had some paying gigs, he published most heavily in unpaid, self-edited community forums like Daily Kos and The Huffington Post. “Barrett wasn’t really working in New York so much as getting by with the help of friends and family,” says Pritchard. Among his unpaid gigs was his work as the spokesman for the Godless Americans PAC, which led to Brown’s first TV appearance, on the Fox News morning show Fox & Friends.
In Brooklyn, Brown resumed shooting heroin, which he’d dabbled in off and on since he was 19. Over the years, doctors have diagnosed him with ADHD and depression. Accurate or not, the diagnoses suggest Brown was drawn to opiates for more than just the high. “When I joined him in Brooklyn in ’08, Barrett was already basically a functional junkie,” says Pritchard.
Heroin did not mellow Brown when it came to America’s pundit class. Brown’s critique made clear he didn’t want to join the journalistic establishment so much as lash it without mercy. Then, in March 2010, he announced in a blog post the goal of replacing it, of making its institutions irrelevant and rebuilding them in the image of an overly self-confident 28-year-old junkie named Barrett Brown. It was perhaps his first public manifestation of extreme self-assurance that could come off as imperious self-importance. Brown himself did not deny it, once saying, “I don’t think arrogance is something I’m in a position to attack anyone on.”
The project envisioned by Brown was a new kind of crowdsourced think tank to be “established with a handful of contributors who have been selected by virtue of intellectual honesty, proven expertise in certain topics and journalistic competence in general.” He named it Project PM, after a gang in William Gibson’s Neuromancer called the Panther Moderns.
Brown conceived his new network partly as a response to what he saw as the sad state of affairs at the two main homes for his work, Daily Kos and HuffPo. After years of vibrancy, both now suffered from “the watering-down of contributor quality,” he said. At Project PM, he assured that “below-average participants will have only very limited means by which to clutter the network.”
How Anonymous Took Down the Music Industry’s Websites
With typical cigarette-waving flourish, Brown declared, “Never has there existed such opportunity for revolution in human affairs.”
Had Project PM developed along the lines of Brown’s original vision – as a kind of exclusive, experts-only, friends-of-Barrett blogger network – it is extremely unlikely that Brown would now be in jail. Or that the FBI would have subpoenaed the company hired to secure its server, as it did in March. But Project PM ended up taking a different route.
Julian Assange: The Rolling Stone Interview
T
he event that locked Brown’s path into a collision course with the federal government came on February 11th, 2010, when he posted an essay on Huffington Post that he grandiloquently titled “Anonymous, Australia and the Inevitable Fall of the NationState.”
At the time, Anonymous was in the news after some of its hackers, in an action they called Operation Titstorm, brought down Australian government servers in retaliation for the government’s attempt to block certain kinds of niche pornography. For Brown, Titstorm was a world-historic game-changer, a portent of an age in which citizens could successfully challenge state power on their laptops and neutralize government propaganda and censorship.
In the comically aggrandizing tone that had become his trademark, Brown concluded, “I am now certain that this phenomenon is among the most important and underreported social developments to have occurred in decades.”
Among those taken by Brown’s interpretation of Titstorm was Gregg Housh, a Boston Web designer and early Anonymous associate, who had emerged as a sort of quasi-spokesman for the group. Through Housh, Brown gained entrance to the online inner sanctums of the hackers he thought were turning history on its head. Housh, who was starting to feel burned out from fielding the barrage of international media requests, saw Brown as someone who could step in and talk to reporters for Anonymous.
“Barrett ‘got it’ in a way few journalists did,” says Housh. “Soon, he was one of us, and that pretty much set the course for everything that happened next.”
Brown always denied holding any official capacity as the spokesman of Anonymous, maintaining such a thing was not even possible given the amorphous nature of the group. Yet he embraced the media role with relish, sometimes using the royal “we” during interviews. In March 2011, Brown described himself to a visiting NBC News crew as a “senior strategist” for Anonymous. He also, along with Housh, began writing a book about the group, detailing the transformation of Anonymous from a community of amoral videogame-playing punks into an ethical crusade, assisting street protests across the globe during the Arab Spring.
From the beginning, Brown’s public role was a subject of internal controversy. A minority dismissed and attacked him as a preening “name fag” – Anonymous slang for people who use their real names and speak to the press. Others were more bothered that Brown was a “moral fag,” the term used by unrepentant griefers to describe the new generation of hacktivists who began flocking to the Anonymous banner in 2008. In We Are Legion, Brown makes his allegiance clear, hailing the hacktivists for turning a “nihilist, ridiculous group” into a “force for good.”
Yet something of the old griefer remained in Brown even after his and the group’s politicization process had converged to take on the world of intelligence outsourcing. “He was just trolling the hell out of these corporate-surveillance guys,” says Joe Fionda, a New York activist who assisted Brown in his investigations. “Not just doing the serious research work no one else was doing – getting tax files and all that – but calling them at their homes to introduce himself, sometimes straight up pranking them. He’s legit funny and sees the humor and the absurd in everything.”
Another former colleague, a Boston Web developer and activist named Lauren Pespisa, shared Brown’s love of prank calls: “Sometimes we’d drink and prank-call lobbyists for fun. We went after this one group, Qorvis, because they were helping the kingdom of Bahrain handle its image when they were shooting people. So we’d call them up and ‘dragon shout’ at them,” she says, referring to a sound effect in one of Brown’s favorite video games, The Elder Scrolls V: Skyrim.
By combining the two ethos of Anonymous, Brown won over more people than he alienated. Part of his appeal was the act of his drily affected pseudo-aristocratic-asshole persona, which he exaggerated during media appearances. He preferred a corduroy sports jacket to the Guy Fawkes mask that Anonymous members favor. A typical portrait showed Brown’s arm slung over a chair, a Marlboro dangling off his bottom lip and a stuffed bobcat on the wall behind him. He was oth loved and hated for being one of the more colorful characters found in the Internet Relay Chat rooms where hackers gathered. He famously once conducted a strategy session while drinking red wine in a bubble bath.
“Barrett became a bit like the court jester of Anonymous,” says Gabriella Coleman, a professor at McGill University who has written about the network. “His behavior was legendary because he was the ethical foil. Anonymous isn’t just for hackers. People like Barrett Brown can thrive: the organizer, the media-maker, the spectacle-maker.”
W
hen Brown met Housh, he was nearing the end of his three-year stint in Brooklyn. In the spring of 2010, Brown called his parents and told them he had a heroin problem. At their urging, he returned to Dallas and began an outpatient treatment that included the heroin replacement Suboxone. It was from a tiny Dallas apartment that Brown deepened his involvement with Anonymous. Since most of his friends lived in Austin, his new social life consisted of the IRC rooms populated by hacktivists. It was a world of nonstop, petty cyberintrigue, which to outsiders can appear like a hellish fusion of The Hollywood Squares, WarGames and Degrassi Junior High.
Bradley Manning Explains His Motives
Pritchard remembers the first time Brown crashed on his couch in Austin after his return to Dallas. “I’d wake up, and he’d be online having conversations with these kids on Skype or something,” he says. “Barrett would say, ‘I know what you’re doing!’ The other guy would be stroking his chin like he’s Dr. Claw, saying, ‘No, I know what you’re doing.’ It was nonstop cyberwar, with these dorks just dorking it out with each other. It seemed like a bunch of kids trolling each other.”
Still, Pritchard appreciated that beneath the dorkery, Brown was involved in serious business. This was Brown’s first year as an unofficial spokesman for Anonymous, and it was eventful. The hackers were aiding the uprisings of the Arab Spring, and assaulted PayPal and credit-card companies in retaliation for their refusal to process donations to WikiLeaks. This latter action, called Operation PayBack, earned the attention of the Justice Department. In the summer of 2011, the FBI issued 35 search warrants and arrested 14 suspected hackers.
The Trials of Bradley Manning
By the time of the arrests, Brown’s focus had settled squarely on the nexus between government agencies, private intelligence firms and the information-security industry – known as InfoSec – contracted to build programs and technologies of surveillance, disruption and control that Brown suspected were in many cases unconstitutional. What’s more, he was as bratty as ever about it. He phoned CEOs and flacks at their homes and called them liars. He boasted about bringing the whole system down. As the first raids and arrests took place following Operation PayBack, some observers of Brown’s antics began to suspect that the court jester of Anonymous was not a very safe thing to be.
“You could just tell it was going to end badly,” says an Anonymous member and veteran hacker. “When he really started making noise about going after these intel-contracting companies, I was like, ‘You’re going to get locked up, kid.'”
A
fter Operation Payback, Anonymous was on the radar of every private security firm looking to build a quick reputation. In the office of Aaron Barr, CEO of a struggling digital-security contractor called HBGary Federal, it was the biggest thing on the radar. Barr was convinced that taking down Anonymous before it struck again was a fast track to industry juice and massive contracts. In February 2011, he bragged to The Financial Times about the supersecret sleuthing techniques he had developed to get the goods on Anonymous. He claimed to know the identities of the group’s leaders. Implicit in Barr’s comments was the possibility of federal raids on those identified.
Partly to avoid that outcome, and partly out of curiosity, an Anonymous cell hacked HBGary’s servers. They discovered that Barr’s techniques involved hanging out on major social-media sites and compiling lists of mostly innocent people. It wasn’t the only example of his staggering miscalculation: Within minutes, the hackers easily got around the firm’s security defenses, ransacking company servers, wiping Barr’s personal tablet and absconding with 70,000 internal e-mails. Stephen Colbert devoted a segment to the fiasco, based around the image of Barr sticking his penis in a hornets’ nest.
Once the hackers who broke into HBGary’s servers discovered that Barr was basically a clown, they abandoned pursuit. “There were tens of thousands of e-mails and no one wanted to go through them,” says an Anonymous associate who observed the HBGary hack. “Everyone was like, ‘We’re not even going to dump these, because there’s no point.'”
Brown disagreed. When the hackers posted the e-mails on a BitTorrent site, he used Project PM to organize the painstaking work of collating and connecting the dots to see what picture emerged.
“Nobody was reading more than a couple of the e-mails before getting bored,” says the Anonymous associate. “But Barrett has this strangely addictive and journalistic kind of mind, so he could stare at those e-mails for 10 hours. He’d be sitting alone in the HBGary channel, yelling at everyone, ‘You’ve got to pay attention! Look at the crap I found!'” Brown quickly drew in some 100 volunteers to help him trawl through and make sense of the e-mails.
The HBGary cache offered one of the fullest looks ever at how corporate-state partnerships were targeting groups they considered subversive or inimical to the interests of corporate America. The projects under consideration at HBGary ranged from cyberattacks and disinformation campaigns targeting civic groups and journalists to Weird Science-supermodel avatars built to infiltrate and disrupt left-wing and anarchist networks.
Project PM volunteer investigator Joe Fionda remembers the disturbing thrill of uncovering HBGary’s use of a Maxim pinup to create online personas designed to spy for corporate and government clients. “I couldn’t believe how much crazy shit they were up to,” Fionda says. “My brain still feels like it’s going to explode.”
The biggest fish flopping in Brown’s net was the story of a cluster of contractors known as Team Themis. The origins of Team Themis dated to Bank of America’s alarm over Julian Assange’s 2010 claim to possess documents that “could take down a bank or two.” The Department of Justice recommended Bank of America retain the services of the white-shoe D.C. law firm Hunton & Williams and the high-powered intelligence contractor Booz Allen Hamilton. On behalf of Bank of America, Hunton & Williams turned to the large and growing world of InfoSec subcontractors to come up with a plan, settling on HBGary and two dataintelligence shops, Berico Technologies and Palantir Technologies.
The Themis three were also preparing a proposal for Hunton & Williams on behalf of another client, the U.S. Chamber of Commerce. The leaked HBGary documents revealed that Themis was exploring ways of discrediting and disrupting the activities of organized labor and its allies for the Chamber. The potential money at stake in these contracts was considerable. According to Wired, the trio proposed that the Chamber create a $2-milliona-month sort of cyber special-forces team “of the kind developed and utilized by the Joint Special Operations Command.” They also suggested targeting a range of left-of-center organizations, including the SEIU, watchdog groups like U.S. Chamber Watch, and the Center for American Progress. (The Chamber of Commerce and Bank of America have denied ever hiring Team Themis or having any knowledge of the proposals.)
In pursuit of the Chamber and Bank of America contracts, the Themis three devised multipronged campaigns amounting to a private-sector information-age COINTELPRO, the FBI’s program to infiltrate and undermine “subversive” groups between 1956 and 1971. Among the The mis ideas presented to Hunton & Williams: “Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error.”
The revelations represented a triumph for Brown and his wiki. A group of Democratic congressmen asked four Republican committee chairs to hold hearings on the “deeply troubling” question of whether “tactics developed for use against terrorists may have been unleashed illegally against American citizens.” But the calls for investigation went nowhere. The lack of outrage in Washington or on influential editorial pages didn’t shock Brown, who had long ago lost hope in the politicians and pundits who are “clearly intent on killing off even this belated scrutiny into the invisible empire that so thoroughly scrutinizes us – at our own expense and to unknown ends.”
It was Brown’s finest moment, but his relationship with Anonymous was rapidly deteriorating. By May 2011, Brown had begun turning on the network. “There’s little quality control in a movement like [Anonymous],” Brown told an interviewer. “You attract a lot of people whose interest is in fucking with video-game companies.”
Brown’s haughty dismissal of the new crop of hacktivists was not a feeling shared by the FBI. The government continued to see Anonymous as a major and growing threat. And in the summer of 2011, it acquired a key piece in its operation to destroy the network. On the night of June 7th, four months after the HBGary hack, two federal agents visited the Jacob Riis publichousing project on Manhattan’s Lower East Side and introduced themselves to a 27-year-old unemployed hacker named Hector Monsegur, known inside Anonymous as “Sabu.” As a leader of an Anonymous offshoot called Lulzsec, he had hacked a number of state and corporate servers. In early 2011, he made some rookie errors that led the FBI to his door: Facing the prospect of being indicted on 12 counts of criminal conspiracy, Sabu rolled over on his old hacker associates. He signed a cooperation agreement and began feeding the FBI information on Anonymous plots. The biggest of these involved a private global intelligence contractor located in Barrett Brown’s backyard, the Austin-based Stratfor.
I
n early December 2011, a young Chicago Anon named Jeremy Hammond cracked Stratfor’s server and downloaded some 5 million internal documents. With the apparent blessing and supervision of the FBI, Sabu provided the server for Hammond to store the docs. Hammond then proceeded to release them to the public. Sifting through the data dump would require a massive coordinated effort of exactly the kind Project PM had been training for. Brown and his dedicated volunteers attacked the mountains of e-mails. “We had between 30 and 50 people involved, usually 15 at a time,” says Lauren Pespisa, the Boston Project PM volunteer who now helps organize Brown’s legaldefense fund.
Did the Mainstream Media Fail Bradley Manning?
After six months of work, Brown would discover what he considered the fattest spider amid the miles of Stratfor web: a San Diego-based cybersecurity firm called Cubic. As Brown followed the strings, he discovered links between Cubic and a data-mining contractor known as TrapWire, which had ties to CIA vets. Brown thought that he had stumbled on a major find illuminating new technologies for spying and surveillance, but the media pickup was not what Brown had hoped. Major dailies shrugged off the story, and Gawker and Slate poured cold water on his alarm, calling it “outlandish.” Brown responded to the criticism with a rambling, connect-the-conspiracy-dots YouTube video.
It wasn’t just gossip sites that viewed Brown’s reading of the Stratfor docs with a skeptical eye. Even sympathetic students of intelligence contracting urged caution about interpreting the TrapWire materials. “I applaud anyone digging into this stuff, but you can’t really draw conclusions from what these contractors say in these e-mails because they’re bragging and they’re trying to land business,” says Tim Shorrock, whose 2008 book Spies for Hire first exposed the scope of the intelligence-contracting industry. “Some of the quote-unquote intelligence that Stratfor was reporting on was ludicrous. Why would an intelligence agency buy this stuff?”
WikiLeaks Stratfor Emails: A Secret Indictment Against Julian Assange?
Meanwhile, deeply buried in the TrapWire debate was the fact that included in the Stratfor docs were the credit-card numbers of 5,000 Stratfor clients. Brown likely did not give the numbers a second thought. But it’s these numbers that form the most serious charges against Brown. The government alleges that when Brown pasted a link in a chat room to the alreadyleaked documents, he was intentionally “transferring” data for the purpose of credit-card and identity fraud.
“If the Pentagon Papers included creditcard info, then would The New York Times have been barred from researching them?” says Brown’s co-counsel Ghappour. “There is nothing to indicate Barrett wanted to profit from this information, or that he ever had the information in his possession. He was openly critical of such motives and disapproved of hacking for the sake of it. This was a big part of his rift with Anonymous – why he was considered a ‘moral fag’ by some.”
The FBI raided Brown’s Dallas apartment on the morning of March 6th, 2012, three months after the Stratfor hack, and one day after Jeremy Hammond was arrested in Chicago. More than a dozen feds led by agent Robert Smith knocked down the door with warrants for Brown’s computers and seized his Xbox. Brown was staying at his mother’s house nearby. Later that morning, the agents appeared at the home of Brown’s mother with a second warrant. They found his laptop in a kitchen cabinet, and she was later charged with obstruction. Brown, who was in the shower preparing for a TV interview when the agents arrived, was not arrested. The agents left with his laptop.
Among hacktivists, theories differ on the motive behind the FBI action. As one of the few public figures associated with Anonymous, Brown made a soft target with a potentially very valuable hard drive or two. Some say it was meant as a warning; others say Brown had simply pissed off too many powerful people, or was getting too close to something big.
Then there is the theory, advanced by Gregg Housh, that Brown and Hammond were targeted out of frustration with a blown sting against WikiLeaks founder Julian Assange. After looking into the Stratfor hack, Housh believes that the FBI allowed the hack to proceed not in order to arrest Hammond but Assange. “The idea was to have Sabu sell the stolen Stratfor material to Assange,” says Housh. “This would give them a concrete charge that he had knowingly bought stolen material to distribute on WikiLeaks.”
Housh believes Hammond got wind of Sabu’s plan to sell the documents to Assange and dumped them before the transaction could take place. While there is no proof of contact between Sabu and Assange, Sabu reportedly communicated with Sigurdur Thordarson, a teenage Icelandic WikiLeaks volunteer and an FBI informant.
“Hammond had no idea what he’d done,” says Housh. “The FBI were a day away from having evidence against Assange, and Hammond screwed it up for them. That’s why they went after him so hard.”
Yet Hammond, who led the Stratfor hack, faced only 30 years before cutting a plea deal for 10. Why is Brown facing 105?
F
ollowing the March raid, Brown continued his investigations and planned for the future of Project PM. 2012 was going to be a big year. He had a new nucleus of friends and colleagues in Boston, where he was going to move and live in an activist group house. His investigations increasingly took place outside the Anonymous network. Brown had new allies in groups like Telecomix, a collective that operated its own crowdsourcing investigations into the cybersurveillance industry. That summer, he visited New York for the Hackers on Planet Earth conference, an annual gathering of hackers and activists, where he met a few of his Project PM colleagues offline for the first time. “I remember he was wearing a full suit in this crazy heat, sweating profusely in the lobby of the Hotel Pennsylvania,” says Fionda. “He was still struggling with kicking heroin, he had tremors and looked like he was in a lot of pain. But he was full of energy. He was telling everyone, ‘We’re going to the center of the Earth with this story!'”
But Brown’s mental state seemed to deteriorate during the summer of 2012. Having battled depression throughout his life, he had gone off his meds and was simultaneously struggling with cold-turkey breaks from Suboxone for heroin withdrawal. His YouTube channel documents the effects. In August, Brown posted a clip that showed him skeet-shooting over the words of Caligula’s lament: “If only all of Rome had just one neck.” In early September, as Brown planned his move to Boston, he struggled to contain his rage at the local FBI agent Robert Smith, who had raided his mother’s home and taken his beloved Xbox.
In September, Brown uploaded a discombobulated three-part video series, the last one titled “Why I’m Going to Destroy FBI Agent Robert Smith.” In the videos, Brown struggles to maintain focus. He demands the return of his Xbox and warns that he comes from a military family that has trained him with weapons – weapons he says he’ll use to defend his home. He calls Smith a “fucking chickenshit little faggot cocksucker” before uttering the words he has since admitted were ill-considered, as well as the result of a chemically combustive mental state.
Why Shouldn’t Freedom of the Press Apply to WikiLeaks?
“Robert Smith’s life is over,” says Brown. “And when I say his life is over, I don’t say I’m going to go kill him, but I’m going to ruin his life and look into his fucking kids. How do you like them apples?”
It takes a suspension of disbelief to hear a credible physical threat as defined by law. The rail-thin Brown appears a desperate, pathetic character in need of psychiatric help. A more humane FBI office might have sent a doctor rather than a car of armed agents. But the FBI didn’t send a shrink. That evening a team of armed agents stormed Brown’s apartment, threw him violently to the ground and arrested him for threatening a federal officer.
WikiLeaks Releases ‘Beat the Blockade’ Benefit CD
Over the next four months, federal grand juries issued three multicount indictments for obstruction and “access devicefraud” related to the Stratfor link. It is the last of these that concern civil-liberties activists and that could have a possible chilling effect. “One can’t apply the transfer provision of the statute to someone conducting research,” says Ghappour. “If cutting and pasting a link is the same as the transfer of the underlying data, then anyone on the Internet is prone to violating the Computer Fraud and Abuse Act.”
The FBI has shown interest in expanding that theoretical “anyone” to include Brown’s circle of volunteers. In March, the bureau went hunting for the digital fingerprints of Project PM administrators with a subpoena. The action has shaken the group’s inner circle, as it was surely intended. “It was a pretext to sow discord and fear in Barrett’s project,” says Alan Ross, a U.K. investigator for Project PM. “They were desperate to bolster their case. After the subpoena, people began to worry about being monitored. I worry about my personal safety even though I acted within the confines of the law. I worry about travel.”
Travel is one thing Brown does not have to worry about at the moment. Nor, if the government gets its way, will he have to worry about handling the media, his former specialty. In August, the prosecution requested a gag be placed on Brown and his lawyers, a move that suggests they understand the dangers of public scrutiny of the legal peculiarities of United States vs. Barrett Lancaster Brown.
Meanwhile, Brown has not joined the prison tradition of mastering the law behind bars. Rather than study up on cyberfraud statutes, he has resumed his writing on intel contractors and the pundits who defend them. “Nobody talks to me here,” Brown says of his year in jail, “but I was pretty unsociable on the outside too.” One of the hardest things about incarceration for the atheist has been contending with his cellmates’ singing of hymns. “Prison is great for reading and for thought, until they start in with their Pentecostal nonsense,” says Brown. “It ruins everything.”
His friends keep him supplied with articles and printouts, which lately have included material related to the Edward Snowden leak. Snowden gained access to information about secret NSA spying on private citizens while working for the intelligence subcontractor Booz Allen Hamilton, a company that had been on Brown’s radar long before most Americans learned of it in the wake of Snowden’s bombshells.
“This is all much bigger than me,” Brown says in the visiting room. “What matters is this.” He leans over to tap his handwritten manuscript. The pages of the essay are messy on the table, and sticking out from under the pile is the last sentence on the last page. “This is the world that we accept if we continue to avert our eyes,” it says. “And it promises to get much worse.”
This story is from the August 29th, 2013 issue of Rolling Stone.
http://www.rollingstone.com/culture/news/barrett-brown-faces-105-years-in-jail-20130905
by Alexander Zaitchik
SEPTEMBER 05, 2013
Find this story at 5 September 2013
Copyright ©2013 Rolling Stone
In Secret AT&T Deal, U.S. Drug Agents Given Access to 26 Years of Americans’ Phone Records6 september 2013
The New York Times has revealed the Drug Enforcement Administration has an even more extensive collection of U.S. phone records than the National Security Agency. Under a secretive DEA program called the Hemisphere Project, the agency has access to records of every phone call transmitted via AT&T’s infrastructure dating back to 1987. That period covers an even longer stretch of time than the NSA’s collection of phone records, which started under President George W. Bush. Each day, some four billion call records are swept into the database, which is stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over records after agents obtain an administrative subpoena. The DEA says the collection allows it to catch drug dealers who frequently switch phones, but civil liberties advocates say it raises major privacy concerns. We speak with Scott Shane, national security reporter for The New York Times and co-author of the report, “Drug Agents Use Vast Phone Trove, Eclipsing NSA’s.”
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: In a moment we’ll be talking about the death of David Frost with the director Ron Howard, but first we turn to news that one government agency has an even more extensive collection of U.S. phone records than the National Security Administration, the NSA. That agency is the Drug Enforcement Administration. In a front-page article, The New York Times has revealed a secretive operation inside the DEA called the Hemisphere Project. Under this program, the DEA has access to records of every phone call over AT&T’s network dating back to 1987. That period covers a longer stretch of time than the NSA’s collection of phone records, which began under President George W. Bush. Some four billion call records are gathered to the DEA’s database every day. It’s unclear if other major phone companies are involved.
Unlike with the NSA, the DEA’s phone records are actually stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over data after agents obtain an administrative subpoena. The U.S. government says the program allows DEA agents to keep up with those in the drug trade who often switch phones. In a statement, Justice Department spokesperson Brian Fallon said that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations” and that Hemisphere “simply streamlines the process.”
The disclosure of the DEA’s Hemisphere program follows another major revelation involving the DEA and government surveillance. It was revealed last month a secretive DEA unit has used information taken from NSA wiretaps for cases unrelated to terrorism. The DEA has also provided classified intelligence obtained by the NSA and other sources to the Internal Revenue Service to help in their investigations of Americans.
Well, for more, we’re joined by Scott Shane, national security reporter for The New York Times. His front-page article, co-written with Colin Moynihan, appeared in Monday’s New York Times, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”
Welcome to Democracy Now!, Scott Shane. Explain exactly how it’s done and how you found out about this.
SCOTT SHANE: Well, as you mentioned, I wrote this article with Colin Moynihan, a colleague at The New York Times, and he received from an activist in Washington state, named Drew Hendricks, a 27-slide PowerPoint, which was prepared by AT&T and government agents, apparently DEA or possibly other government agencies, and essentially they’re training slides to introduce folks who are going to be working on the Hemisphere Project, how it works and what it can do. And Drew Hendricks, the activist in Washington, got these slides as part of a series of public information requests. He’s sort of a peace activist out there, and he had been helping some folks with a lawsuit and just, you know, fired off a bunch of public information requests to police agencies in Washington state and other places on the West Coast. This set of slides came back with one of those requests.
Drew Hendricks believes it may have been sent actually by accident, included by accident. And so—but, in fact, it’s unclassified. It’s marked “Law enforcement sensitive,” but it’s unclassified, and it actually states that the Hemisphere Project is unclassified. What’s kind of remarkable to us is that this has been going on for at least six years under the name Hemisphere Project, and it’s unclassified, but no one has ever learned about it. I couldn’t find a single reference to it in the Nexis database or on the web. And so, they’ve kept it very well hidden, and indeed some of the slides say, if you get information from Hemisphere, never reveal the source of the information. So, the government has kept this very, very well hidden, along with AT&T.
AMY GOODMAN: And explain what exactly it is, what AT&T is keeping records of and how the government uses this information.
SCOTT SHANE: AT&T operates what are called switches, through which telephone calls travel all around the country. And what AT&T does in this program is it collects all the—what are called the CDRs, the call data records, the so-called metadata from the calls that we’ve heard about in the NSA context. This is the phone number—phone numbers involved in a call, its time, its duration, and in this case it’s also the location. Some are cellphone calls; some are land line calls. Anything that travels through an AT&T switch, even if it’s not made by an AT&T customer—for example, if you’re using your T-Mobile cellphone but your call travels through an AT&T switch somewhere in the country, it will be picked up by this project and dumped into this database. So AT&T collects the information on all these calls, basically who called who when all over the country. And as you mentioned, there is a slide that says four billion—with a B—call data records are added to the database every day. I’m told by some technical experts that it’s possible one call can create more than one call data record. Apparently, if a cellphone, for example, in a moving car switches from one tower to another, that could be another record, so—because those numbers sound pretty high, 12—you know, maybe 12 or so calls per American per day.
But anyway, all that call data goes into this giant database, and then when a drug agent at one of three centers around the country—in Los Angeles, Houston and Atlanta—finds a number of interest, they can ask the AT&T person sitting next to them, “Check this out.” The AT&T person accesses the database, the Hemisphere database, and they can come back with a record of, you know, “Here’s the other numbers called by this number, the number you’re interested in,” and when and where, in many cases, and then they can follow up.
I should say that in order to access the database, the government says that the agent asking AT&T to make the search has to produce at least what’s called an administrative subpoena, which is essentially a form, a DEA form, not approved by a court or by a judge, but simply a DEA form saying, you know, here’s why we’re interested in this number. So there’s no judicial oversight, but it is—these administrative subpoenas are used routinely in a criminal investigation. So the government’s side of the story is that this is no different from kind of routine criminal investigation that happens every day.
AMY GOODMAN: Scott Shane, very quickly, my final question is about the issue of privacy. What does this raise for Americans?
SCOTT SHANE: Well, I think what it shows is that, apart from the program we’ve learned about with the NSA in recent months, there are many other programs that the government has, many of them related to law enforcement as well as to intelligence gathering, and also that the government works extremely closely with some telecommunications and Internet companies, sometimes using court orders but often using voluntary arrangements like this one, and often paying the companies to participate, so that the universe of data that’s gathered and has implications for American privacy goes way beyond any one agency or even beyond the government itself into the corporate sector.
AMY GOODMAN: Scott Shane, I want to thank you for being with us, national security reporter for The New York Times. We’ll link to your front-page article yesterday, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”
Tuesday, September 3, 2013
Find this story at 3 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
DEA has more extensive domestic phone surveillance op than NSA6 september 2013
For at least six years, US anti-drug agents have used subpoenas to routinely gain access to an enormous AT&T database. It’s an intrusion greater in scale and longevity than the NSA’s collection of phone calls, revealed by Edward Snowden’s leaks.
As part of the secret Hemisphere Project the government has been paying AT&T to place its employees in drug-fighting units around the country, the New York Times reports.
The US’s largest telecoms operator has been supplying phone data to the Drug Enforcement Administration since 1987.
The project covers every call that passes through an AT&T switch, including those made by clients of other operators, with some four billion call records added to the database on a daily basis.
And, unlike the much debated NSA data, the Hemisphere data includes information on the location of those, making the calls.
The New York Times found out about the surveillance program after it received slides, describing the Hemisphere Project, from peace activist, Drew Hendricks.
The activist said he was sent the PowerPoint presentation – which is unclassified, but marked “Law enforcement sensitive” – in response to a series of public information requests to West Coast police agencies.
The slides revealed that the program was launched back in 2007 and has been carried out in great secrecy since then.
“All requestors are instructed to never refer to Hemisphere in any official document,” one of the slides said.
The paper performed a search of the Nexis database, but found no reference to the program in news reports or Congressional hearings.
The US administration has acknowledged that Hemisphere is operational in three states, adding that the project employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.
Justice Department spokesman, Brian Fallon, stressed that it’s crucial that the phone data is stored by AT&T, and not by the government like in the NSA case. It has requested phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge, but by a federal agency, the DEA.
According to the spokesman, Hemisphere proved especially effective in finding criminals, who frequently discard their cellphones in order to avoid being tracked by polices.
“Subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations,” he said in a statement.
The 27-slide PowerPoint presentation highlights several cases, in which Hemisphere solved big crimes, with not all of them being drug-related.
For example, this March it found the new phone number and location of a man, who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent.
In 2011, Hemisphere tracked Seattle drug dealers, who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.
AT&T spokesman, Mark A. Siegel, declined to answer detailed questions on Hemisphere, only saying that AT&T “like all other companies, must respond to valid subpoenas issued by law enforcement.”
Representatives from Verizon, Sprint and T-Mobile all declined to comment when asked by the New York Times whether their companies participated in Hemisphere or any other similar programs.
An undisclosed federal law enforcement official told the paper the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.
It’s not the first time AT&T has been involved in federal surveillance programs, the company operated a telecommunication interception facility for the NSA between 2003 and 2006.
Published time: September 02, 2013 23:41
Edited time: September 04, 2013 09:04
Find this story at 4 September 2013
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2013.
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s6 september 2013
For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.
The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.
The project comes to light at a time of vigorous public debate over the proper limits on government surveillance and on the relationship between government agencies and communications companies. It offers the most significant look to date at the use of such large-scale data for law enforcement, rather than for national security.
The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years.
Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.
The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.
The program was started in 2007, according to the slides, and has been carried out in great secrecy.
“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.
The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.
But they said the project, which has proved especially useful in finding criminals who discard cellphones frequently to thwart government tracking, employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.
Crucially, they said, the phone data is stored by AT&T, and not by the government as in the N.S.A. program. It is queried for phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge but by a federal agency, in this case the D.E.A.
Brian Fallon, a Justice Department spokesman, said in a statement that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations.”
Mr. Fallon said that “the records are maintained at all times by the phone company, not the government,” and that Hemisphere “simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection.”
He said that the program was paid for by the D.E.A. and the White House drug policy office but that the cost was not immediately available.
Officials said four AT&T employees are now working in what is called the High Intensity Drug Trafficking Area program, which brings together D.E.A. and local investigators — two in the program’s Atlanta office and one each in Houston and Los Angeles.
Daniel C. Richman, a law professor at Columbia, said he sympathized with the government’s argument that it needs such voluminous data to catch criminals in the era of disposable cellphones.
“Is this a massive change in the way the government operates? No,” said Mr. Richman, who worked as a federal drug prosecutor in Manhattan in the early 1990s. “Actually you could say that it’s a desperate effort by the government to catch up.”
But Mr. Richman said the program at least touched on an unresolved Fourth Amendment question: whether mere government possession of huge amounts of private data, rather than its actual use, may trespass on the amendment’s requirement that searches be “reasonable.” Even though the data resides with AT&T, the deep interest and involvement of the government in its storage may raise constitutional issues, he said.
Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said the 27-slide PowerPoint presentation, evidently updated this year to train AT&T employees for the program, “certainly raises profound privacy concerns.”
“I’d speculate that one reason for the secrecy of the program is that it would be very hard to justify it to the public or the courts,” he said.
Mr. Jaffer said that while the database remained in AT&T’s possession, “the integration of government agents into the process means there are serious Fourth Amendment concerns.”
Mr. Hendricks filed the public records requests while assisting other activists who have filed a federal lawsuit saying that a civilian intelligence analyst at an Army base near Tacoma infiltrated and spied on antiwar groups. (Federal officials confirmed that the slides are authentic.)
Mark A. Siegel, a spokesman for AT&T, declined to answer more than a dozen detailed questions, including ones about what percentage of phone calls made in the United States were covered by Hemisphere, the size of the Hemisphere database, whether the AT&T employees working on Hemisphere had security clearances and whether the company has conducted any legal review of the program
“While we cannot comment on any particular matter, we, like all other companies, must respond to valid subpoenas issued by law enforcement,” Mr. Siegel wrote in an e-mail.
Representatives from Verizon, Sprint and T-Mobile all declined to comment on Sunday in response to questions about whether their companies were aware of Hemisphere or participated in that program or similar ones. A federal law enforcement official said that the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.
The PowerPoint slides outline several “success stories” highlighting the program’s achievements and showing that it is used in investigating a range of crimes, not just drug violations. The slides emphasize the program’s value in tracing suspects who use replacement phones, sometimes called “burner” phones, who switch phone numbers or who are otherwise difficult to locate or identify.
In March 2013, for instance, Hemisphere found the new phone number and location of a man who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent. A month earlier the program helped catch a South Carolina woman who had made a series of bomb threats.
And in Seattle in 2011, the document says, Hemisphere tracked drug dealers who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.
September 1, 2013
By SCOTT SHANE and COLIN MOYNIHAN
Find this story at 1 September 2013
© 2013 The New York Times Company
The NSA-DEA police state tango; This week’s DEA bombshell shows us how the drug war and the terror war have poisoned our justice system6 september 2013
So the paranoid hippie pot dealer you knew in college was right all along: The feds really were after him. In the latest post-Snowden bombshell about the extent and consequences of government spying, we learned from Reuters reporters this week that a secret branch of the DEA called the Special Operations Division – so secret that nearly everything about it is classified, including the size of its budget and the location of its office — has been using the immense pools of data collected by the NSA, CIA, FBI and other intelligence agencies to go after American citizens for ordinary drug crimes. Law enforcement agencies, meanwhile, have been coached to conceal the existence of the program and the source of the information by creating what’s called a “parallel construction,” a fake or misleading trail of evidence. So no one in the court system – not the defendant or the defense attorney, not even the prosecutor or the judge – can ever trace the case back to its true origins.
On one hand, we all knew more revelations were coming, and the idea that the government would go after drug suspects with the same dubious extrajudicial methods used to pursue terrorism suspects is a classic and not terribly surprising example of mission creep. Both groups have been held up as bogeymen for years, in order to scare the public into accepting ever nastier and more repressive laws. This gives government officials another chance to talk to us in their stern grown-up voices about how this isn’t civics class, and sometimes they have to bend the rules to catch Really Bad People.
On the other hand, this is a genuinely sinister turn of events with a whiff of science-fiction nightmare, one that has sounded loud alarm bells for many people in the mainstream legal world. Nancy Gertner, a Harvard Law professor who spent 18 years as a federal judge and cannot be accused of being a radical, told Reuters she finds the DEA story more troubling than anything in Edward Snowden’s NSA leaks. It’s the first clear evidence that the “special rules” and disregard for constitutional law that have characterized the hunt for so-called terrorists have crept into the domestic criminal justice system on a significant scale. “It sounds like they are phonying up investigations,” she said. Maybe this is how a police state comes to America: Not with a bang, but with a parallel construction.
By Andrew O’Hehir
Saturday, Aug 10, 2013 06:30 PM +0200
Find this story at 10 August 2013
Copyright © 2013 Salon Media Group, Inc.
Exclusive: IRS manual detailed DEA’s use of hidden intel evidence6 september 2013
WASHINGTON (Reuters) – Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.
The practice of recreating the investigative trail, highly criticized by former prosecutors and defense lawyers after Reuters reported it this week, is now under review by the Justice Department. Two high-profile Republicans have also raised questions about the procedure.
A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA’s Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.
An IRS spokesman had no comment on the entry or on why it was removed from the manual. Reuters recovered the previous editions from the archives of the Westlaw legal database, which is owned by Thomson Reuters Corp, the parent of this news agency.
As Reuters reported Monday, the Special Operations Division of the DEA funnels information from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to help them launch criminal investigations of Americans. The DEA phone database is distinct from a NSA database disclosed by former NSA contractor Edward Snowden.
Monday’s Reuters report cited internal government documents that show that law enforcement agents have been trained to conceal how such investigations truly begin – to “recreate” the investigative trail to effectively cover up the original source of the information.
DEA officials said the practice is legal and has been in near-daily use since the 1990s. They have said that its purpose is to protect sources and methods, not to withhold evidence.
NEW DETAIL
Defense attorneys and some former judges and prosecutors say that systematically hiding potential evidence from defendants violates the U.S. Constitution. According to documents and interviews, agents use a procedure they call “parallel construction” to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.
The IRS document offers further detail on the parallel construction program.
“Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS document says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”
The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department “closely guards the information provided by SOD with strict oversight.” While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.
According to the document, IRS agents are directed to use the tips to find new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”
The IRS document makes no reference to SOD’s sources of information, which include a large DEA telephone and Internet database.
CONCERN IN CONGRESS
House Intelligence Committee Chairman Mike Rogers, R-Michigan, expressed concern with the concept of parallel construction as a method to hide the origin of an investigation. His comments came on the Mike Huckabee Show radio program.
“If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” said Rogers, a former FBI agent. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”
Spokespeople for the DEA and the Department of Justice declined to comment.
Sen. Rand Paul, R-Kentucky, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”
“National security is one of government’s most important functions. So is protecting individual liberty,” Paul said. “If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine.”
Officials have stressed that the NSA and DEA telephone databases are distinct. The NSA database, disclosed by Snowden, includes data about every telephone call placed inside the United States. An NSA official said that database is not used for domestic criminal law enforcement.
The DEA database, called DICE, consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged, DEA officials said.
(Research by Hilary Shroyer of West, a Thomson Reuters business. Additional reporting by David Lawder. Edited by Michael Williams)
© Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.
Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
Wed, Aug 7 2013
By John Shiffman and David Ingram
Find this story at 7 August 2013
© Thomson Reuters
DEA and NSA Team Up to Share Intelligence, Leading to Secret Use of Surveillance in Ordinary Investigations6 september 2013
UPDATE: Add the IRS to the list of federal agencies obtaining information from NSA surveillance. Reuters reports that the IRS got intelligence tips from DEA’s secret unit (SOD) and were also told to cover up the source of that information by coming up with their own independent leads to recreate the information obtained from SOD. So that makes two levels of deception: SOD hiding the fact it got intelligence from the NSA and the IRS hiding the fact it got information from SOD. Even worse, there’s a suggestion that the Justice Department (DOJ) “closely guards the information provided by SOD with strict oversight,” shedding doubt into the effectiveness of DOJ earlier announced efforts to investigate the program.
A startling new Reuters story shows one of the biggest dangers of the surveillance state: the unquenchable thirst for access to the NSA’s trove of information by other law enforcement agencies.
As the NSA scoops up phone records and other forms of electronic evidence while investigating national security and terrorism leads, they turn over “tips” to a division of the Drug Enforcement Agency (“DEA”) known as the Special Operations Division (“SOD”). FISA surveillance was originally supposed to be used only in certain specific, authorized national security investigations, but information sharing rules implemented after 9/11 allows the NSA to hand over information to traditional domestic law-enforcement agencies, without any connection to terrorism or national security investigations.
But instead of being truthful with criminal defendants, judges, and even prosecutors about where the information came from, DEA agents are reportedly obscuring the source of these tips. For example, a law enforcement agent could receive a tip from SOD—which SOD, in turn, got from the NSA—to look for a specific car at a certain place. But instead of relying solely on that tip, the agent would be instructed to find his or her own reason to stop and search the car. Agents are directed to keep SOD under wraps and not mention it in “investigative reports, affidavits, discussions with prosecutors and courtroom testimony,” according to Reuters.
“Parallel construction” is really intelligence laundering
The government calls the practice “parallel construction,” but deciphering their double speak, the practice should really be known as “intelligence laundering.” This deception and dishonesty raises a host of serious legal problems.
First, the SOD’s insulation from even judges and prosecutors stops federal courts from assessing the constitutionality of the government’s surveillance practices. Last year, Solicitor General Donald Verilli told the Supreme Court that a group of lawyers, journalists and human rights advocates who regularly communicate with targets of NSA wiretapping under the FISA Amendments Act (FAA) had no standing to challenge the constitutionality of that surveillance. But Verrilli said that if the government wanted to use FAA evidence in a criminal prosecution, the source of the information would have to be disclosed. When the Supreme Court eventually ruled in the government’s favor, finding the plaintiffs had no standing, it justified its holding by noting the government’s concession that it would inform litigants when FAA evidence was being used against them.
Although the government has been initially slow to follow up on Verrilli’s promises, it has begrudgingly acknowledged its obligation to disclose when it uses the FAA to obtain evidence against criminal defendants. Just last week DOJ informed a federal court in Miami that it was required to disclose when FAA evidence was used to build a terrorism case against a criminal defendant.
Terrorism cases make up a very small portion of the total number of criminal cases brought by the federal government, counting for just 0.4 percent of all criminal cases brought by all U.S. Attorney offices across the country in 2012. Drug cases, on the other hand, made up 20 percent of all federal criminal cases filed in 2012, the second most prosecuted type of crime after immigration cases. If the government acknowledges it has to disclose when FAA evidence has been used to make a drug case—even if it’s a tip leading to a pretextual traffic stop—the number of challenges to FAA evidence will increase dramatically.
SOD bypasses the Constitution
Even beyond the larger systemic problem of insulating NSA surveillance from judicial review, criminal defendants whose arrest or case is built upon FISA evidence are now deprived of their right to examine and challenge the evidence used against them.
Taken together, the Fifth and Sixth Amendments guarantee a criminal defendant a meaningful opportunity to present a defense and challenge the government’s case. But this intelligence laundering deprives defendants of these important constitutional protections. It makes it harder for prosecutors to comply with their ethical obligation under Brady v. Maryland to disclose any exculpatory or favorable evidence to the defense—an obligation that extends to disclosing evidence bearing on the reliability of a government witness. Hiding the source of information used by the government to initiate an investigation or make an arrest means defendants are deprived of the opportunity to challenge the accuracy or veracity of the government’s investigation, let alone seek out favorable evidence in the government’s possession.
Courts must have all the facts
The third major legal problem is that the practice suggests DEA agents are misleading the courts. Wiretaps, search warrants, and other forms of surveillance authorizations require law enforcement to go to a judge and lay out the facts that support the request. The court’s function is to scrutinize the facts to determine the appropriate legal standard has been met based on truthful, reliable evidence. So, for example, if the government is using evidence gathered from an informant to support its request for a search warrant, it has to establish to the court that the informant is reliable and trustworthy so that the court can be convinced there is probable cause to support the search. But when law enforcement omits integral facts—like the source of a tip used to make an arrest—the court is deprived of the opportunity to fulfill its traditional role and searches are signed off without the full knowledge of the court.
Ultimately, if you build it, they will come. There’s no doubt that once word got out about the breadth of data the NSA was collecting and storing, other law enforcement agencies would want to get their hands in the digital cookie jar. In fact, the New York Times reported on Sunday that other agencies have tried to get information from the NSA to “curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement.”
Teaming up to play fast and loose with criminal defendants and the court, the DEA and NSA have made a mockery of the rule of law and the legal frameworks intended to curb abuses.
August 6, 2013 | By Hanni Fakhoury
Find this story at 6 August 2013
© www.eff.org
A Domestic Surveillance Scandal at the DEA? Agents Urged to Cover Up Use of NSA Intel in Drug Probes6 september 2013
The U.S. Department of Justice has begun reviewing a controversial unit inside the Drug Enforcement Administration that uses secret domestic surveillance tactics — including intelligence gathered by the National Security Agency — to target Americans for drug offenses. According to a series of articles published by Reuters, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence, not only from defense lawyers, but also sometimes from prosecutors and judges. “We are talking about ordinary crime: drug dealing, organized crime, money laundering. We are not talking about national security crimes,” says Reuters reporter John Shiffman. Ethan Nadelmann, executive director of the Drug Policy Alliance, says this is just the latest scandal at the DEA. “I hope it is a sort of wake-up call for people in Congress to say now is the time, finally, after 40 years, to say this agency really needs a close examination.”
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: The Justice Department has begun reviewing a controversial unit inside the U.S. Drug Enforcement Administration that uses secret domestic surveillance tactics, including intelligence gathered by the National Security Agency, to target Americans for drug offenses. According to a series of articles published by the Reuters news agency, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence—not only from defense lawyers but also sometimes from prosecutors and judges. DEA training documents instruct agents to even make up alternative versions of how such investigations truly begin, a process known as “parallel construction.”
On Monday, White House Press Secretary Jay Carney was asked about the Reuters investigation.
PRESS SECRETARY JAY CARNEY: It’s my understanding, our understanding, that the Department of Justice is looking at some of the issues raised in the story. But for more, I would refer you to the Department of Justice.
AMY GOODMAN: The unit of the DEA that distributes the secret intelligence to agents is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. The unit was first created two decades ago, but it’s coming under increased scrutiny following the recent revelations about the NSA maintaining a database of all phone calls made in the United States. One former federal judge, Nancy Gertner, said the DEA program sounds more troubling than recent disclosures that the NSA has been collecting domestic phone records. She said, quote, “It is one thing to create special rules for national security. Ordinary crime is entirely different. It sounds like they are phonying up investigations.”
For more, we’re joined by the reporter who broke this story, John Shiffman, correspondent for Reuters, which published his exclusive story Monday, “U.S. Tells Agents to Cover Up Use of Wiretap Program.”
Welcome to Democracy Now!, John. Why don’t you start off by just laying it out and what exactly this cover-up is.
JOHN SHIFFMAN: Thanks very much for having me.
Well, my colleague Kristina Cooke and I spoke with about a dozen or two dozen agents and obtained some internal documents that showed that what federal agents, not just DEA agents but other agents who work with the DEA and do drug investigations—what they’re doing is, is they are starting—they are claiming that their investigations start, say, at step two. They are withholding step one from the investigations. And, I should say, it’s not just NSA intercepts. It’s informant information, information obtained from court-ordered wiretaps in one case, and using those for information in a second case. They also have a large database of phone records. Whenever the DEA subpoenas or does a search warrant and gets phone records for someone suspected of involvement in drugs or gang involvement, they put all those numbers into one giant database they call DICE, and they use that information to compare different cases. All of the collection is—seems perfectly legitimate, in terms of being court-ordered. What troubles some critics is the fact that they are hiding that information from drug defendants who face trial. The problem with that is that—is that these defendants won’t know about some potentially exculpatory information that may affect their case and their right to a fair trial.
AMY GOODMAN: So explain exactly how this information is being hidden from judges, prosecutors and sometimes defense attorneys, as well.
JOHN SHIFFMAN: Sure. Well, just to give an example, through any of these four different ways, including the NSA intercepts, the DEA’s Special Operations Division will send the information to a DEA agent in the field or a FBI agent or an ICE agent or state policeman, and they’ll give him the information. Then they’ll say, “Look, you know, we understand that there will be a truck going to a certain park in Texas at a certain time. It’s a red truck. It’ll be two people involved.” And the state trooper or the DEA will find you reason to pull the truck over, say for a broken tail light or for speeding, that sort of thing. And, lo and behold, inside the trunk they’ll find, you know, a kilo of cocaine. The people who have been arrested will never know that—why the police or the DEA pulled them over. They’ll think it’s just luck. And that’s important because if those people try to go to trial, there are pieces of information about how that evidence was obtained and what it shows and what other pieces of it show—might affect their trial.
AMY GOODMAN: On Monday, I spoke with Guardian columnist Glenn Greenwald just after your story broke about how the DEA is using material gathered in part by the NSA in its surveillance of Americans. Glenn Greenwald has, of course, broken several major stories about the NSA’s domestic activity. This was his response.
GLENN GREENWALD: So this should be a huge scandal for the following reason. The essence of the Constitution is that the government cannot obtain evidence or information about you unless it has probable cause to believe that you’ve engaged in a crime and then goes to a court and gets a warrant. And only then is that evidence usable in a prosecution against you. What this secret agency is doing, according to Reuters, it is circumventing that process by gathering all kinds of information without any court supervision, without any oversight at all, using surveillance technologies and other forms of domestic spying. And then, when it gets this information that it believes it can be used in a criminal prosecution, it knows that that information can’t be used in a criminal prosecution because it’s been acquired outside of the legal and constitutional process, so they cover up how they really got it, and they pretend—they make it seem as though they really got it through legal and normal means, by then going back and retracing the investigation, once they already have it, and re-acquiring it so that it looks to defense counsel and even to judges and prosecutors like it really was done in the constitutionally permissible way. So they’re prosecuting people and putting people in prison for using evidence that they’ve acquired illegally, which they’re then covering up and lying about and deceiving courts into believing was actually acquired constitutionally. It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained.
AMY GOODMAN: John Shiffman, if you could elaborate on that and also talk about the differences between what the DEA is doing and what Glenn Greenwald exposed around the NSA?
JOHN SHIFFMAN: Sure. These are two very—I think they’re different topics, for one main reason, which is that the NSA revelations by Mr. Greenwald and Mr. Snowden are related to terrorism—or at least that’s what we’re told by the government. And the DEA, what the DEA is doing is only—very rarely do they get involved in terrorism. I mean, they do some narcoterrorism, but inside the United States we’re talking about ordinary crime. We’re talking about drug dealing, organized crime, money laundering. We’re not talking about national security crimes.
The one thing I would say is that the defense analysts I’ve spoken with, meaning defense attorney analysts, they emphasize less the probable cause aspect of it than they find—they don’t find that as troubling. What they find really troubling is the pretrial discovery aspects of this and a prosecutor’s, you know, obligation to turn over any exculpatory evidence. What they really have a problem with is that this program systematically excludes or appears to systematically exclude all evidence obtained, you know, that’s hidden from view, so the defense doesn’t know to request it. They find that a lot more troubling than the probable cause aspects of it. The Supreme Court has given a pretty wide pro-police interpretation of when probable cause can be obtained, and there are a variety of exceptions. But it’s really the pretrial discovery part of it that seems to trouble a lot of the former judges and defense attorneys and prosecutors.
AMY GOODMAN: One of the two slides Reuters obtained that were used to train agents with the Drug Enforcement Agency instructs them in the use of parallel construction. According to the slide, this is, quote, “the use of normal investigative techniques to recreate the information provided by the [Special Operations Division],” such as subpoenaed domestic telephone calls. A second slide instructs agents that such evidence, quote, “cannot be revealed or discussed.” The slide is titled “Special Operations Division Rules.” Describe what you uncovered about those rules and this concept of parallel construction, which until now had not been publicly discussed in writing.
JOHN SHIFFMAN: Well, what really surprised me was talking to agents, current and former agents, who said, “Sure, we do that.” They—half of them said, “Yeah, you know, I could see how people might have a problem with that.” The other half said, “You know, look, this is a hard job that we do, and we’re going after criminals and drug dealers.” The people that got the most offended, I think, were the lawyers, the prosecutors and the—you know, and the judges and the former judges. One current prosecutor told me that he had a case where—in Florida, where a DEA agent came to him with a case and said that it began with an informant. So they were proceeding with the case, and the prosecutor asked the DEA agent more information. He said, you know, “I need to know more about your informant.” Turns out, ultimately, that he found out that there was no informant. It was an NSA wiretap. And what—overseas. And that really upset the prosecutor, because he said that it really offended his sense of fair play and honesty. And he said, “It’s just a bad way of starting an investigation, if you’re going to start with a lie.”
AMY GOODMAN: I wanted to bring Ethan Nadelmann into this discussion, executive director of the Drug Policy Alliance. Ethan, why is—are the revelations by Reuters, John Shiffman’s investigation, so significant for your work?
ETHAN NADELMANN: Well, I think what it plays into, Amy, is that there’s been this remarkable lack of oversight of DEA by Congress, by other federal oversight agencies, for decades now. I mean, this year marks the 40th anniversary of the DEA, which Nixon created as a merger of police agencies, of drug enforcement agencies, back during the—one of the earlier drug wars. And what you see is an organization with a budget of over $2 billion. You see an organization getting involved in all sorts of shenanigans, hiring informants who land up to be tied up with murderers, you know, locking up some poor drug—you know, I don’t think even drug dealer, drug—low-level offender, and forgetting about him in a prison cell in this case of Daniel Chong, who was left in a prison cell for five days and forgotten. But beyond that, you have the agency serving as a propaganda agency, with no—with none of its statements being compared or held to any sort of scientific standards. You have an administrator who testifies before Congress and is almost a laughing stock when it comes to talking about drugs. So I think that this report by Reuters and by John Shiffman—I hope it’s a sort of wake-up call for people in Congress to say, “Now is the time, finally, after really 40 years, to say this agency really needs a close examination.”
AMY GOODMAN: Ethan, the Drug Enforcement Administration has agreed to pay $4.1 million in a settlement to a San Diego college student who nearly lost his life after being left handcuffed in his cell for more than four days without food or water. He ultimately drank his urine as he lay there, yelling out to agents right outside. His name was Daniel Chong. He was arrested for a 420 celebration of marijuana culture. He was never charged with any crime, and ultimately he was released.
ETHAN NADELMANN: You know, I think—I mean, that’s the case I was mentioning before. I mean, part of—you know, one can say, “Oh, this is just an accident, and accidents happen.” But, of course, accidents like that should never happen when you’re talking about a police agency, much less a federal police agency, being allowed to just sort of forget about somebody. And in the end, what happens? The taxpayers bail out the DEA for almost killing somebody for no cause whatsoever. So, you know, each year the DEA goes through its own little, you know, appropriations hearings in Congress. Each year it gets approved. And each year they just sort of get a ride. I think these things are piling up in a way that can no longer be sustained—should no longer be sustained.
AMY GOODMAN: So what has been, John Shiffman, the response to your investigation by the DEA, by the NSA, by the FBI and others?
JOHN SHIFFMAN: Well, they say it’s perfectly legal, what they do. And they say that—one DEA official told us that, you know, “This is a bedrock principle, parallel construction. We use it every day.” They’re pretty unabashed about it and said that—you know, that they’ve been doing this since the late ’90s, and there’s really nothing wrong with it. Yesterday the Justice Department said they are going to review it. But DEA has said, you know, there’s no problem with this.
AMY GOODMAN: How many people does this impact?
JOHN SHIFFMAN: Well, it would impact—I would think it would impact everyone, because, you know, it’s—we’re talking about a principle of law here. Not to get too legal, but, I mean, if you’re arrested, one of the fundamental rights that you have is to see the evidence against you. You know, when I was at the DEA and doing the interview, they cited the Ted Stevens case, which involved prosecutorial misconduct, which had—in which the senator’s charges were thrown out, because evidence was concealed. They said that after that there had been a review of all of the discovery procedures throughout the Justice Department, including at Special Operations Division. But they said that—and so I asked, I said, “Great, can I see a copy of the review?” And they said, “No.”
AMY GOODMAN: So, Ethan Nadelmann, it’s all legal.
ETHAN NADELMANN: Well, you know, that’s what happens when any agency gets to just do what it wants to do for years and years and years without anybody looking over its shoulder. You know, I mean, Amy, this agency has also done things in the areas of medical marijuana, scientific research, the scheduling process of drugs, whereby they will go through an entirely legal process, through their own administrative law process hearings. It will have an internal judge, an administrative law judge, come down with recommendations that are scientifically based, that are credible, and then they will have the politically appointed head of this agency overrule those recommendations for no purpose whatsoever.
Once again, Congress is not asking any questions. It’s their job to look at the—I mean, obviously, it’s the Obama administration’s job, as well, and Eric Holder’s job, as well, but it’s ultimately Congress, as well, that has to care about these things. And I’m hoping that it’s not just Democrats in the Senate, but also Republicans in the House, who will say, “This agency has gone too far.” Republicans have never been great friends of overextensions of federal police power, and I hope they can find some common cause with Democrats, saying, “Wait a second. Let’s call the DEA in here. Let’s look at what—you know, what John Shiffman has found with his investigative report. Let’s look at all these other patterns of abuse and misbehavior.”
AMY GOODMAN: We want to thank you both for being with us, John Shiffman, for your reporting at Reuters, and Ethan Nadelmann. Thanks so much for joining us. We’ll link to the story at democracynow.org.
JOHN SHIFFMAN: Thanks.
AMY GOODMAN: Ethan Nadelmann, executive director of the Drug Policy Alliance. When we come back, we’re going to Richmond, California, to speak with the mayor. Stay with us.
Tuesday, August 6, 2013
Find this story at 6 August 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
US-Geheimdienst: BND übermittelt afghanische Funkzellendaten an NSA30 augustus 2013
Die Daten können Experten zufolge Hinweise für gezielte Tötungen liefern: Nach SPIEGEL-Informationen stammt ein beträchtlicher Teil der an die NSA übertragenen Daten aus der Funkzellenauswertung in Afghanistan. Der BND wiegelt ab.
Hamburg – Der Bundesnachrichtendienst (BND) übermittelt nach SPIEGEL-Informationen afghanische Funkzellendaten an den US-Geheimdienst NSA. Spionageprogramme wie XKeyscore erstellen daraus Bewegungsprofile. Sie zeigen mit nur wenigen Minuten Verzögerung an, wo sich Handy-Nutzer aufhalten – und spielten womöglich eine wichtige Rolle bei der gezielten Tötung von Qaida-Kämpfern durch US-Drohnen.
Der BND erklärte, Mobilfunkdaten seien für eine zielgenaue Lokalisierung eines Menschen nicht geeignet. Experten gehen aber davon aus, dass Funkzellendaten Hinweise für gezielte Tötungen liefern können. Auch die “Süddeutsche Zeitung” hatte am Samstag einen Experten zitiert, wonach die Daten des BND zur Ortung nützlich seien.
Der Bürgerrechtler Burkhard Hirsch (FDP) hält den Datentransfer, der offenbar jenseits der parlamentarischen Kontrolle stattfindet, für sehr problematisch. “Wenn der BND in solchem Umfang für einen anderen Geheimdienst tätig wird, dann ist das ein politischer Vorgang, der unter allen Umständen im zuständigen Bundestagsgremium hätte behandelt werden müssen”, sagte Hirsch dem SPIEGEL.
BND-Präsident Gerhard Schindler sagte der “Bild am Sonntag”, die Kooperation mit der NSA diene “auch dem unmittelbaren Schutz unserer in Afghanistan eingesetzten Soldatinnen und Soldaten”. Die durch die Fernmeldeaufklärung gewonnenen Erkenntnisse trügen dazu bei, Anschlagsplanungen von Terroristen rechtzeitig erkennen zu können. Dies gehöre zu den “prioritären Aufgaben” eines Auslandsnachrichtendiensts.
Gegenüber dem SPIEGEL erklärte der BND, er habe seit Januar 2011 “maßgebliche Hilfe” bei der Verhinderung von vier Anschlägen auf deutsche Soldaten in Afghanistan geleistet. Bei weiteren 15 verhinderten Anschlägen habe die Datenüberwachung “zu diesen Erfolgen beigetragen”.
11. August 2013, 14:12 Uhr
Find this story at 11 August 2013
© SPIEGEL ONLINE 2013
Berlin Denies Military Knew About Prism30 augustus 2013
A media report on Wednesday alleged that a NATO document proves the German military knew about the NSA’s Prism surveillance program in 2011. But both Berlin and the country’s foreign intelligence agency deny the account, saying there was a NATO program with the same name in Afghanistan.
The German government has so far claimed that it knew nothing of the United States’ Prism spying program, revealed by whistleblower Edward Snowden last month. But parts of a confidential NATO document published by daily Bild on Wednesday show that the German military, the Bundeswehr, may have already been aware of the National Security Agency’s operations in 2011, the paper alleged.
The document, reportedly sent on Sept. 1, 2011 to all regional commands by the joint NATO headquarters in Afghanistan, gives specific instructions for working together on a program called Prism, which the paper said was the same as that run by the NSA. According to Bild, the document was also sent to the regional command in northern Afghanistan, for which Germany was responsible at the time under General Major Markus Kneip.
Should the media report be confirmed, Berlin’s claims of ignorance will prove to have been false. But on Wednesday afternoon, Chancellor Angela Merkel’s spokesman Steffen Seibert denied the Bild story, saying that the document referred to a separate program that had been run by NATO troops, and not the US. The programs were “not identical,” he said.
The BND, Germany’s foreign intelligence agency, also weighed in with a statement, saying that the program had not been confidential and was also not the same as the NSA’s Prism operation. “The program called Prism by the Bild report today is a NATO/ISAF program that is not identical to the NSA’s program,” it said. “The BND had no knowledge of the name, range or scope of the NSA program.”
A Separate Prism Program?
According to the document cited by Bild, as of Sept. 15 that year, regional commands were instructed to apply for monitoring telephone calls and e-mails, according to the document, in which Prism is named at least three times. “Existing COMINT (communications intelligence) nominations submitted outside of PRISM must be resubmitted into PRISM IOT,” it reads.
It also states that access to the Prism program is regulated by the Joint Worldwide Intelligence Communications System (JWICS), which is used by various US intelligence services to transmit classified information.
“Coalition RCs (regional commands) will utilize the US military or civilian personnel assigned to their collection management shop ISRLO (Intelligence, Surveillance and Reconnaissance Liaison Officer),” it goes on. In Bild’s assessment, “military or civilian personnel” stands for US intelligence service staff.
Keeping Track of Terrorists
The purpose of all this was to “submit the telephone numbers and email addresses of terrorists into the surveillance system,” the paper reports.
It also claims to have seen documents indicating that the BND, Germany’s foreign intelligence agency, provided such telephone numbers to NATO, where they were ultimately fed into the surveillance system as well.
The reason for the NATO order was that the NSA’s director had tasked the US military with coordinating surveillance in Afghanistan, Bild reported.
The German Defense Ministry told the paper that it had “no information and knowledge of such an order,” but would be looking into the matter.
In response to the report, Green party parliamentarian and defense spokesman Omid Nouripour told SPIEGEL ONLINE that Defense Minister Thomas de Maizière must clarify the situation. “These circumstances destroy the government’s line of defense” on the NSA scandal, he said. Chancellor Angela Merkel’s center-right coalition can “no longer claim it didn’t know anything about Prism.”
As more details emerge about the scope of the NSA’s worldwide spying program and Germany’s alleged role in the surveillance, the scandal is becoming a central issue in the country’s campaign for the upcoming general election. Germans are particularly sensitive about data protection because of their history of state encroachment on civil liberties, first under the Nazis and then in communist East Germany. And if it turns out that Berlin knowingly tolerated and participated in the NSA activities, many would see it as a betrayal by the government.
07/17/2013 12:29 PM
Media Report
Find this story at 17 July 2013
© SPIEGEL ONLINE 2013
Germany backs away from claims NSA program thwarted five attacks30 augustus 2013
German Interior Minister Hans-Peter Friedrich is backing off his earlier assertion that the Obama administration’s NSA monitoring of Internet accounts had prevented five terror attacks in Germany, raising questions about other claims concerning the value of the massive monitoring programs revealed by NSA leaker Edward Snowden.
Friedrich had made the assertion about the number of attacks that the NSA programs – which scoop up records from cellphone and Internet accounts – had helped to avert after a brief visit to the United States last week. But on Tuesday, he told a German parliamentary panel, “It is relatively difficult to count the number of terror attacks that didn’t occur.” And on Wednesday, he was publically referring to just two foiled attacks, at least one and possibly both of which appeared to have little to do with the NSA’s surveillance programs.
The questions about the programs’ value in thwarting attacks in Germany come as some members of the U.S. Congress have told Obama officials that the programs exceeded what Congress authorized when it passed laws that the administration is arguing allowed the collection of vast amounts of information on cellphone and Internet email accounts.
In Germany, the concern is that the NSA is capturing and storing as many as 500 million electronic communications each month, but Germans are getting little if anything back for what is seen as an immoral and illegal invasion of privacy.
Friedrich spent July 11-12 in the United States for meetings with U.S. officials on the NSA programs that German Chancellor Angela Merkel had requested. The point of the meetings was to gather information that would calm a building German angst over the spy scandal.
Instead of being reassured, however, opposition politicians and commentators now are talking about the arrogance of the U.S. application of “winner’s power” (a reference to the political authority the United States had here during the Cold War, when Germany was divided between east and west, and West Germany leaned heavily on America for support), and how traditionally strong relations between the two countries have been harmed by the scandal.
“German-American relations are at risk,” said Hans-Christian Stroebele, a Green Party member of the influential German intelligence oversight committee in the country’s legislature, the Bundestag, which is dominated by Merkel’s Christian Democratic Union. “The longer it takes to uncover the facts after this long silence, the more problematic it becomes. No one even bothers to deny what’s been said. It could be that German or (European Union) courts will have to deal with this.”
Even as emotions build, NSA plans for expanding a listening station in Germany were revealed this week, raising more questions.
Stroebele spoke Thursday to McClatchy, addressing Friedrich’s official report, delivered behind closed doors to the Bundestag committee. He said Friedrich received little information from the United States in his quick trip to Washington.
“We’re lucky to have had Snowden,” Stroebele said. “Without him, this surveillance that is not permissible under international law would have continued for a long time. In Germany, there are prison terms for such spying.”
Perhaps most troubling was how quickly the government backed down on the claims that the surveillance helped foil terror plots. Gisela Piltz, a Liberal Party member of the Bundestag intelligence committee, said she could not give exact details of what took place in the secret hearing but noted: “There was a clear discrepancy between the previously reported number of foiled terror attacks and the number we talked about.”
And even those cases raised questions. One of them, commonly known as the Sauerland Cell Plot, involved an alleged conspiracy in 2007 to detonate a series of car bombs in crowded places. Piltz was involved in a Bundestag study of what took place. The goal of the would-be bombers was to surpass the death and injured toll from commuter train attacks in Madrid in 2004, which killed 191 and wounded another 1,800.
The conspirators, who allegedly included two Germans, had gathered nearly a ton of liquid explosives.
News reports at the time mentioned an unnamed U.S. intelligence official saying that cellphone calls by the two Germans had been intercepted. But those calls were said to have been made when the Germans were leaving a terror camp in Pakistan – an entirely different scenario from the current monitoring program, which captures data from everyday citizens by casting a worldwide net.
Piltz said even that participation by U.S. intelligence agencies remains unverified.
The other case, involving four men with al Qaida connections arrested in Dusseldorf while allegedly preparing to make a shrapnel bomb to detonate at an undecided location, also raised questions about NSA involvement. During the trial, prosecutors said they were alerted to the cell by an informant, after which they studied emails from the four. But such targeted surveillance is not the issue in the NSA programs, one of which, PRISM, reportedly taps into the computers of users of nine Internet companies, including Facebook, Google and Yahoo.
Defending NSA practices, Friedrich noted that security is a “super fundamental right.” As such it outranks fundamental rights such as privacy. German newspapers were scathing in their assessment, calling Friedrich the “idiot in charge.”
Piltz said that while terrorism is a real threat, the U.S. monitoring programs have done little to prevent it.
“Germans are not safer because of U.S. espionage,” Piltz said. “It is true Germany has been lucky not to have suffered a terror attack, but there has to be a balance. We cannot sacrifice freedom for security, and when in doubt I would always opt for freedom.”
McClatchy special correspondent Claudia Himmelreich in Berlin contributed to this report.
McClatchy Washington Bureau
Posted on Thu, Jul. 18, 2013
By Matthew Schofield | McClatchy Foreign Staff
last updated: July 18, 2013 05:30:07 PM
BERLIN — ]
Find this story at 18 July 2013
© McClatchy Washington Bureau
<< oudere artikelen nieuwere artikelen >>