Archive for the ‘NSA’ Category

Why the NSA Told Henry Kissinger to Drop Dead When He Tried to Cut Intel Links with Britain – The Daily Beast

LONDONHenry Kissinger once tried to come between the National Security Agency (NSA) and Britains GCHQ, their signals intelligence (SIGINT) brothers from the other side of the pond, and the response from the U.S. intelligence agency was short and swift.

The NSA simply said, Drop dead, says the author of a new authorized history of GCHQ, who explains that the two intelligence agencies have a closer relationship with each other than they do with their own governments.

The worlds two leading signals intelligence agencies are so tightly bound together that they share virtually all of the material they gather with no questions asked. Over the years, GCHQ (Government Communications Headquarters) has frequently protected the NSA from rivals within the U.S. including the CIA and Naval intelligence unitsand even their respective presidents and prime ministers come second in the hierarchy of loyalty, according to Behind the Enigma: The Authorized History of GCHQ, Britains Secret Cyber-Intelligence Agency by John Ferris.

I say in the bookand both GCHQ and NSA allowed me to say itthat at some point or another, every director of GCHQ and NSA colludes with each other in order to do something which their own national authority might try to impede, Ferris told The Daily Beast.

One such clash arose in 1973 when Kissinger, who was President Nixons national security adviser at the time, ordered the NSA to stop sharing signals intelligence with Britain in order to pressure London to support Nixons Israel policy.

The NSA refused to comply, challenging Kissingers authority despite his key role at the White House. Ironically, under the shared intelligence agreement between the agencies, Kissingers move would have left the U.S. flying blind in the Middle East because collecting signals intelligence in the region was entirely the domain of the British who funnelled the intel back to Fort Meade.

One of the most bizarre aspects of this unparalleled intelligence sharing partnership is that it is not enshrined in any treaty; its a subnational, totally non-binding agreement, which makes the NSAs willingness to stand up to Kissinger even more extraordinary.

If Jeremy Corbyn had been elected with a majority, I think he would have broken it and he could have done so. And if Donald Trump wanted to break it, he could do so. Any British prime minister or American president is free to choose. The problem is theyre so closely intertwined that it would cause massive immediate problems, or huge amounts of expenditure to overcome. That wouldnt have bothered Corbyn, said Ferris.

The relationship was also entirely secret for 25 years after World War II. It wasnt until 2010 that the documents behind the agreement were put into the public domain. This comprehensive book uses unprecedented access to GCHQ files to chart the full history of the agreement, which is called UKUSA (pronounced yoo-kusa, a bit like the Japanese mafia, by those in the know).

The only organization I can think of which in any way comes close is NORAD, the North American air defense system where the Canadian and American air defense systems are integrated. But thats much more narrow and specific than UKUSA, but thats the only other thing that comes close. So, yes, this is really unique, said Ferris, who is a professor of history at the University of Calgary in Canada.

At the end of the Cold War, during which British expertise on intercepting Russian communications had been instrumental, there was a fear that GCHQs influence would wane, but the agency, which is based in Cheltenham, southwest England, bucked expectations and repositioned itself as a trailblazer in modern signals intelligence.

With the resources freed from exhaustively covering the Soviet Union, GCHQ was able to start doing what its really good at, which is exploring new territoriesin this case, the early days of the internet, mapping it out for themselves and the Americans and then coming up with new methods of interception and cryptography to suit the new environment.

British paymasters recognized the outsized diplomatic clout they maintained in Fort Meade and in Washington, where GCHQ intel product remains highly respected, so long as the intelligence agency was allowed to thrive, and so investment in the agency remained relatively high despite the end of the Cold War.

Ferris was not allowed to detail current intel methods in the book for obvious reasons, but the documents published by Edward Snowden, who was employed by a contractor to work at an NSA facility, give an unmistakable insight into the current balance of the relationship between GCHQ and the NSA.

If Im judging simply by material which has been leaked, mostly by Snowden in the past five or six years, my sense is that the British are relatively much more significant than they were at any point since the 1960s, said Ferris. If you go through the Snowden material, youll find that a huge number of the technical innovations clearly are British, and, in fact, the Americans pay GCHQ to develop them.

The book argues that regular NSA efforts to subsidize GCHQ, which has a much smaller budget and staff, is a sign not of GCHQs weakness but of its strength. The British SIGINTers are seen as valuable scouts and innovators who routinely deliver a good return on investment. As the former director of GCHQ, David Omand, once joked, We have the brains. They have the money.

This is not to say, the NSA is not filled with brilliant people in itself, and their capacity for intelligence gathering is unparalleled. The Americans have this raw power, which once focused is overwhelming, said Ferris. I would personally say that NSA is one of the most technologically disruptive organizations in history. So, the two of them together are very formidable.

The relationship between the American and British signals intelligence communities blossomed during World War II, when U.S. pioneers were invited over to Bletchley Park, the legendary home of the codebreakers who cracked Germanys secret wartime communications.

Genuinely, they were astounded by the quality of every branch of British SIGINT and, in fact, came to understand that what the British were doing was very ahead of us in every single way, said Ferris.

NSA could trust GCHQ to have its back in a way that it cannot trust any other American agency to have its back.

John Ferris

Anglo-American relations were complicated during the course of the war, with Washington initially reluctant to become embroiled in another predominantly European conflict. After the war, American SIGINTers, with the help of GCHQ input, succeeded in convincing President Harry Truman that a large-scale peacetime SIGINT operation was necessary to ensure there was never a Nuclear Pearl Harbor.

UKUSA was established in 1946, linking American and British SIGINT efforts ever since. The agreement also took in Britains recent Dominions; Canada, New Zealand, and Australia. Together they formed a global network which is now known as Five Eyes.

The relative merits of NSA and GCHQ have fluctuated over the decades. In the 50s and even early 60s, GCHQ was still seen as the more impressive intelligence producer. American internal memos bemoaned the supremacy of GCHQs final product, which was often deemed better written and more fully analysed.

In the latter decades of the 20th century, big American investments in supercomputing and expensive advances, including satellite technology, ensured NSA was in the ascendancy.

The agreement was founded on individual personal relationships between SIGINTers, and sometimes those were rocky. There were complaints that GCHQ was hogging the most prestigious roles; British assessments of American product were sometimes deemed too rude to share; and in the mid-80s NSA Director William Odom complained that GCHQ did not carry out its share of the work given how much authority it demanded.

The British clearly cant accept happily their own loss of pre-eminence in this business, Odom wrote in his remarkably frank diary. Socially I no longer find the British amusing, merely a pain in the ass.

But throughout it all, NSA and GCHQ, two largely civilian organizations, maintained their togetherness. All of the Five Eyes countries would send senior liaison officers and up-and-coming integrees to work at the other agencies, sharing intel techniques and honing each others skills. A no-poach policy ensures that the agencies are willing to let their best and their brightest take part in the exchanges. In Behind the Enigma, Ferris writes:

In one legendary moment, an American integree at Cheltenham and a British one at Fort Meade conducted negotiations between GCHQ and NSA on behalf of their adopted services; in another, every member of a Sigint conference between Australia, Britain, Canada and the United States held a British passport.

GCHQ is also part of American decision-making. There are lots of interagency meetings and important issues where GCHQ representatives are part of the decision-making process right on U.S. soil. On Sept. 12, 2001, the head of GCHQ was on the only aircraft allowed into the United States immediately after 9/11. General Michael Hayden, former director of the NSA, has since said it was decided in the aftermath that GCHQ would assume command of all American SIGINT if Fort Meade was compromised.

NSA could trust GCHQ to have its back in a way that it cannot trust any other American agency to have its back. And GCHQ and NSA provide each other with state secrets, which only a handful of other people would see. It is one of the most unusual arrangements Ive ever seen, Ferris said.

If the agreement does eventually collapse it will cost the U.S. billions of dollars to replace the input from Britain.

General Hayden, who was director of both the NSA and CIA, was an exception, but there has often been a rivalry between the two agencies which dates back to the 1950s when NSA was created: CIA operatives around the world had previously been responsible for foreign SIGINT collection.

There was a huge amount of blood on the floor, said Ferris, and relations were often tough over the decades to come. There are moments when CIAfor good reasons or badis not doing what NSA would like. And GCHQ helps NSA avoid some of those problems. GCHQ has perfectly civil relations with CIA. So, its actually easier for GCHQ to get CIA to help NSA than it is for NSA to get CIA to help NSA.

Many SIGINTers believe UKUSA will eventually fall apart now that the unifying threat of the Cold War has faded away and there is no guarantee that new generations of political leaders will share common foreign policy goals. The strength of the agreement was tested in the Middle East in the 70s when British and American governments disagreed over Israel, and similarly two decades before when Washington did not support British policy during the 1956 Suez crisis. On that occasion GCHQ actually hampered British government policy by refusing to cooperate with French intelligence.

If the agreement does eventually collapse it will cost the U.S. billions of dollarsFerris believes the NSA budget would have to increase by around a thirdto replace the input from Britain. But even more than that, one of the greatest intelligence-gathering partnerships the world has ever seen would be permanently damaged.

Here is the original post:
Why the NSA Told Henry Kissinger to Drop Dead When He Tried to Cut Intel Links with Britain - The Daily Beast

After Rajnath, NSA Ajit Doval warns China, says ‘will fight where threat emerges, will fight for greater good’ – Times Now

NSA Ajit Doval 

New Delhi:After Defence Minister Rajnath Singh asserted that he is confident that Indian Army will not let anyone take even an inch of country's land, NSA Ajit Doval issued a stern warning to China saying India will fight where the threat emerges and will fight for the greater good, not for self.

RSS chief Mohan Bhagwat also warned China and expressed confidence in the Indian troops saying, We must be prepared and the Indian Troops responded well to Chinas misadventure.

We don't secure our Rashtra, we only try to secure our Rajya, Doval said adding that Rashtra is created by India's saint and that Rajya can end but Rashtra can never end.

After performing Shastra Puja at the Sukna-based headquarters of the Indian Army's 33 Corps in Darjeeling district of West Bengal the Defence Minister said that India wants an end to the ongoing border tension with China and restoration of peace.

This is our objective. But at times, some nefarious incidents keep happening," Singh said after performing the 'puja'.

The tension between India and China escalated after the Galwan incident in which twenty Indian soldiers laid down their lives in an ambush by PLA soldiers.

In retaliation Indian forces also attacked the PLA leading to significant casualties on their side, however, China is yet to disclose the number of its soldiers killed and injured in the clash.

According to Indian officials, China suffered heavy casualties in the incident.

Indian forces also thwarted Chinese intrusion in Pangong Tso and occupied a number of strategic heights in the Mukhpari, Rezang La and Magar hill areas around the southern bank of the lake in eastern Ladakh.

Both sides held a series of diplomatic and military talks to resolve the row that began on May 5, however, no breakthrough has been achieved till now.

Read the original:
After Rajnath, NSA Ajit Doval warns China, says 'will fight where threat emerges, will fight for greater good' - Times Now

China govt uses United Front to gather intel on citizens abroad, says US dy NSA – The Indian Express

Written by Kaunain Sheriff M | New Delhi | Updated: October 25, 2020 7:14:37 amThe Indian Express investigation, China is Watching, was published in September.

Referring to revelations in a series of investigative reports by The Indian Express and other global publications on how a private technology firm in Shenzhen, with links to the Chinese government and Communist Party of China (CPC) uses big data tools for hybrid warfare, a top US Security official has said that the Chinese foreign ministry handles a United Front, which includes powerful tech firms that gather intelligence to influence private citizens overseas.

Pointing to the database of Zhenhua Data, which targets individuals and institutions in politics, government, business, technology, media, and civil society, US Deputy National Security Advisor Matt Pottinger has said that the CPC is compiling digital dossiers on millions of foreign citizens around the world, with the aid of new tools of digital surveillance.

Pottinger made the remarks from White House on Thursday during a video conference hosted by Policy Exchange in London.

The Indian Express, using big-data tools, investigated metadata from Zhenhuas operations to extract Indian entities from the massive dump of log files that constituted what the company called Overseas Key Information Database (OKIDB). The investigation, published in September, had revealed the firm is monitoring over 10,000 Indian individuals, including President Ram Nath Kovind, Prime Minister Narendra Modi, Congress president Sonia Gandhi and their families.

The exposure last month of a Chinese database on at least 2.4 million people around the world, including many of us on this call, speaks to the Partys (CPCs) sheer ambition to wed traditional Leninist techniques with powerful new tools of digital surveillance, Pottinger said.

He claimed Chinas United Front Work system is handled by the countrys foreign ministry and gathers intelligence about, and works to influence, private citizens overseas. He said, The focus is on foreign elites and the organizations they run. Think of a United Front worker as a cross between an intelligence collector, a propagandist, and a psychologist.

Pottinger said while Zhenhua isnt a particularly large or sophisticated actor in the United Front world, it may even be acting opportunistically, because it thinks the Party will reward it.

He said, Far more powerful tech firms, including famous Chinese app developers, play a much bigger role in this kind of work. The dossiers Zhenhua is compiling include people in virtually every country, no matter how small. They include members of royal families and members of Parliament, judges and clerks, tech mavens and budding entrepreneurs, four-star admirals and crew members of warships, professors and think-tankers, and national and local officials. They also include children, who are fair game under Beijings rules of political warfare. No one is too prominent or too obscure.

Pottinger said the United Front Work is a serious business, and the focus is on foreign elites and organisations they run. He said, the United Front Work Department alone has four times as many cadres as the US State Department has foreign-service officers.the United Front gathers intelligence about, and works to influence, private citizens overseas.

Read The Indian Express investigative series China is Watching

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest India News, download Indian Express App.

The Indian Express (P) Ltd

View original post here:
China govt uses United Front to gather intel on citizens abroad, says US dy NSA - The Indian Express

PRISM and privacy: Ways to avoid being spied on by the government – TechGenix

We live in a world of a beehive of online activities, with many individuals happily sharing their private information on the Internet. Unfortunately, Uncle Sam is constantly looking over your shoulder. Unknown to most people, a lot of data is collected via the U.S. National Security Agency (NSA) PRISM surveillance program. Once youre the target, a massive amount of data about you can be collected and forwarded to the government. Whenever the government is caught with its hands in the privacy jar, two platitudes are always given: If you have not done something wrong, youve nothing to hide, and you have to trust the government it has your best interests at heart.

Basically, the governments nothing-to-hide notion implies that its only criminals who may want to hide. But is that true? Besides, we all have something that we want to hide. Just ask anybody to show you their credit card bill or even their emails what would be the response?

If theres nothing that should be hidden and you can trust the government with your data, think about this scenario: What will happen if someone gains access into the governments database? Since you are here, we assume you are one of those folks who want to escape NSA spying. If so, it is time for you to be smart and be a ghost!

Online activities should be private, but unfortunately, thats not the case. In 2013, the NSA outlined how data can be collected via the PRISM program. The technology is merely based on the optical fiber wiretaps. PRISM is meant to track the activities of potential foreign terrorists. Just like in criminal investigations, the NSA is probably not intentionally spying on you, but the fact that they can when they want to is a breach of privacy.

There are several ways you stay out of the omnipresent eyes of the government and the NSAs PRISM. Below are some simple measures to minimize the likelihood of the NSA PRISM program monitoring your Internet activities.

One of the surest ways of beating the NSAs PRISM surveillance trap is by encrypting your Internet traffic. Its simply that all the encrypted data is useless to the PRISM program without the decryption key. Your conversations may not be private unless you encrypt. First, you can encrypt the hard drive and all the existing files. All the data stored on the cloud should be encrypted before being submitted to Internet service providers. The last thing you want is entirely trusting Google, Microsoft, or Apple to encrypt data for you. As an individual, avoid storing unencrypted personal data in clouds like OneDrive, Dropbox, and Google Drive.

Using a good VPN will help keep the NSA from sniffing around your personal space and your business. A VPN merely helps establish a private network thats private to the Internet and allows you to surf anonymously (although there are many caveats here). It conceals the user identity by masking the devices IP address and then directing traffic via VPN servers in a location that you may choose.

However, a VPN should not be just a VPN but should be a VPN that doesnt keep logs. A VPN without logs means that the VPN provider cannot reveal your identity even if it gets a court order. Thats because it wont be recording any of your web activities details in the first place. Moreover, a VPN will ensure that you easily bypass Internet restrictions, as well as getting access to blocked websites.

Each time you visit a new site, a trail of footprints are left behind that can tell so much about you. Most advertising networks use those digital footprints for targeted ads, meaning that the NSA is most probably watching every keystroke you make.

Therefore, to ensure that you block web tracking, simply visit your browsers settings and then disable third-party cookies so that they do not load on the current web page.

Secondly, you need to privately search the web by activating private incognito mode in the browser. Alternatively, you can opt to use browser extensions like Ghostery that prevent ad agencies and search engines from tracking web pages.

Furthermore, you can disable JavaScript from the browser setting to help avoid web tracking. And masking your IP address via a VPN is another excellent way of staying out of the radar of tracking cookies.

Sometimes connecting to free hotspots can prove to be a channel through which someone can access your device. However, wandering from the library to the coffee shop and the free caf down the street can provide a security protection layer. Why? Because your IP address keeps on varying by location. However, you should be very careful about such hotspots as they are the real hotspots of malware invasion.

After doing everything right, youll also want to tie all your encrypted services with hard-to-crack passwords. You need to find the best password manager and then create your unique password.

The NSA can tap into all cellular networks across the globe. Therefore, theres every reason to protect your communications. Your instant messaging services can be protected from the NSA surveillance program using an Off-the-Record (OTR) chat extension. It helps in encrypting all messages on IM networks.

Another reigning king for anonymous browsing is the Onion Router (TOR). It allows you to browse anonymously as it conceals user identity by encrypting and bouncing communications over a plethora of servers. Therefore, it makes it difficult for spy agencies to trace the traffic source or the recipient easily. All they see is traffic originating from a plethora of random nodes and not your PC.

Ultimately, keeping off the NSAs PRISM is not a walk in the park. While all these tips do not mean that youre entirely PRISM-proof, theyll minimize the risk of NSA snooping on your online activities. You just have to pray that you dont give them enough evidence to suspect you because then all privacy bets are off.

Featured image: Shutterstock

Post Views: 62

Home Articles PRISM and privacy: Ways to avoid being spied on by the government

Originally posted here:
PRISM and privacy: Ways to avoid being spied on by the government - TechGenix

How the NSA built its offensive computer warfare unit – The Market Mail

In a long (long) portrait dedicated to the NSA and US Cyber Command boss General Paul Nakasone, Wired revealed that in two years, it authorized more cyber attacks than before. NSA since its inception.

The NSA has long monitored and spied on its targets abroad. Wired describes how he did not initiate what would become his cyber command responsible for defending American systems and attacking his adversaries and enemies until 2009. Russia had indeed entered its classified computer network and disconnected from the Internet, possibly via a broken USB key.

Nakasone was then appointed as the head of a group nicknamed the Four Horsemen (four horsemen including a woman), who were responsible for explaining what the NSAs Cyberdefense Division would be, but raising it from 100 to 2000 Also for cyber fighters.

Unlike France, which refuses to attribute the attacks that identify the countries launching them and does not officially recognize its offensive computer warfare (LIO) operations, Nakasone was convinced that it It was necessary to communicate. Wanting to leave the private sector to join their units, not only to gain more resources and powers from the authorities, but to create hackers, and finally to demonstrate their expertise to reject their rivals.

Launched in 2010, USCYBERCOM today has more than 6,000 cyber-fighters, in addition to 38,000 and 20,000 private intelligence contractors working for the NSA.

Read more here:
How the NSA built its offensive computer warfare unit - The Market Mail