Archive for the ‘NSA’ Category

The latest NSA leak is a reminder that your bosses can see your every move – Washington Post

The Washington Post's Devlin Barrett explains how an arrest of a government contractor was made so quickly in the NSA document leak to The Intercept. (Whitney Leaming/The Washington Post)

It took just days forauthorities to arrest and charge a federal contractorwithleaking classified intelligence to the media. Court documents explain in detail how the 25-year-old woman suspected in the leak,Reality Leigh Winner, allegedly printed off a copy of a National Security Agency report on Russian tampering in the U.S. elections and mailed it to a news outlet.

What helped federal authorities link Winner to the leak were unrelated personal emails she had sent to the Intercept news site weeks before, which surfaced when investigators searched her computer. But how were officials able to gain access to her personal accounts? The answer, according to some former NSA analysts, is that the agency routinely monitors many of its employees' computer activity.

The case offers a reminder that virtually every American worker in today's economy can be tracked and reported and you don't even have to be the NSA to pull it off.

[What we know about Reality Winner, the contractor accused of leaking an NSA document]

She emailed the Intercept using her work computer, said Michelle Richardson, a privacy expert at the Center for Democracy and Technology, a Washington think tank. They can monitor the traffic on their systems, look at thesix people who printed the doc, and see that she was the one who had contact.

The NSA didn't immediately respond to a request for comment.

Employee monitoring issoextensive in American society that it may be difficult for workers to know just how far they might have to go to avoid it.Itis a $200 million-a-year industry, according toa study last year by 451 Research, a technology research firm, and is estimated to be worth $500 million by 2020.

[How Congress dismantled federal Internet privacy rules]

Monitoringtechniques have become quite sophisticated, enabling employers to track notonly what websitestheir workers visit, but also when they plug in USB storage devices, move or copy files, and what programs theyrun, privacyexperts say. One companyevenallows bosses to play back videos of what took place on a user's screen and can collect communications activity both on traditional email programs as well as popular webmail services.

Employee monitoringrecently came tolight in ahigh-profile lawsuit involving Uber and Waymo, the self-driving car company owned by Google's parent firm, Alphabet. In accusing former Waymo employee Anthony Levandowski of stealing trade secrets and taking them to Uber, Waymo said it was able to determine that Levandowski installed inappropriate software on his company-issued laptop, then downloaded thousands of confidential files before putting them on an external storage device he connected to the machine.

[Supreme Court to decide if a warrant is needed to track a suspect through cellphone records]

Despite Levandowski's attempt to then erase forensic fingerprints by reformatting the laptop's hard drive, Waymo said, the company was nonetheless able to gather the requisite evidence likely using monitoring technology, analysts said.

Even workers who don't report to an office every day are subject to monitoring. The proliferation of GPS devices in smartphones now means that even truck drivers can be tracked. Arecent report from the technology research firm Aberdeen Group found that nearly two-thirds of companies with employees who work in the field were tracking their employees with GPS.

The earliest forms of modern employee monitoring date to the early 1910s, when companies would use mechanical counters to track how quickly workers were typing on their typewriters, according to Jitendra Mishra and Suzanne M. Crampton, who co-wrote a study in 1998 on the topic.Theynotedthatwhat has changed in more recent years is the method of supervision and the extent of information gathering capabilities available. That includes phone and video surveillance, keystroke logging and other forms of monitoring.

[Booz Allen Hamilton employee left sensitive passwords unprotected online]

Since then, numerous court cases have givenemployers a remarkable amount of freedom towatch their workers. In 2010, the Supreme Court heard a case involving two police officers who had been punished at work after it was discovered that they had used their mobile devices to send personal text messages. The officers argued that the police department's search of their devices was unconstitutional under the Fourth Amendment, but the court unanimously ruled against them, saying it was a reasonable search and that the officers should have known that their work devices might be inspected.

Privacy advocates have been pushing for years to have Congress review various communications privacy laws in light of updates to technology. Many argue that the 1986 Electronic Communications Privacy Act does not provide enough protections to consumers today because many emails, text messages and other content can be summoned by law enforcement with little more than a subpoena.

ECPA was first passed in 1986 before Congress could imagine the wealth of personal information that would be stored on third-party servers rather than private hard drives, the Electronic Frontier Foundation, a technology advocacy group, has said.

Congresstook a step toward updating the country's digital privacy laws in February, when the Housevoted to approve the Email Privacy Act. While the bill has largely stalled, it proposes requiring a warrant for searching emails that have been sitting in an account for more than 180 days.

Still, given the other case law surrounding employee surveillance, it's important to note that changes to the ECPA mightnot putan end to routine employer monitoring. Soyou might still want to be careful with what you do on your devices at work.

Read the original:
The latest NSA leak is a reminder that your bosses can see your every move - Washington Post

Accused NSA leaker may have worked at secretive listening post – New York Post

The 25-year-old contractor accused of leaking classified NSA documents may have used her linguistics skills to gain access to a government listening post that collects intelligence signals from the Middle East and Europe, according to a report Tuesday.

Reality Winner who allegedly leaked a classified intelligence report containing Top Secret Level defense info likely worked at the Sweet Tea outpost, a 604,000-square-foot NSA post in Fort Gordon, Ga., according to The Daily Beast.

The sprawling facility, which opened 2012, can house up to 4,000 specialists working to translate and analyze intercepted communications from Europe, North Africa and the Middle East, according to The Daily Beast.

Winner speaks at least four languages and served as a linguistics specialist for in the Air Force. She speaks Farsi, Pashto, and Dari, her mother told The Guardian.

What she did is very common among former military personnel, especially people who, like her, were trained in the military with linguistic skill sets, Bradley Moss, an attorney specializing in national security told The Daily Beast. She was already vetted and cleared by the Air Force for at least top secret clearance, if not top secret clearance with sensitive compartmented information access eligibility. It transfers over to her contract wherever she goes, in this case apparently the NSA.

Winners rsum notes she worked at the Georgia Cryptologic Center as a contractor for Pluribus International Corporation, the news site reported. An Army spokesperson for Fort Gordon claimed Winner was contractor who was not in Fort Gordon.

An NSA spokesperson wouldnt confirm whether Winner had worked at Sweet Tea. Winners employer, Pluribus International, did not return a request for comment.

Inside, behind barbed-wire fences, heavily armed guards, and cipher-locked doors, earphone-clad men and women secretly listen in as al-Qaeda members chat on cell phones along the Afghan border, and to insurgents planning attacks in Iraq, journalist James Bamford wrote about the site in 2008.

Original post:
Accused NSA leaker may have worked at secretive listening post - New York Post

Senator blasts NSA chief: ‘What you feel isn’t relevant, admiral’ – The Hill

Sen. Angus KingAngus KingGOP chairman admonishes intel chiefs Senator blasts NSA chief: What you feel isnt relevant, admiral The Hill's 12:30 Report MORE (I-Maine) snapped at the head of the National Security Agency (NSA) in a contentious moment of a Senate hearing on Wednesday that delved into questions over Russias meddling in the 2016 presidential election.

King, known as one of the Senates more genial members, reached a breaking point more than an hour into the hearing after Michael Rogers repeatedly refused to answer questions about whether President Trump tried to interfere in the FBIs investigation into Russias actions and possible collusion with his campaign.

Rogers declined to answer questions about reports of his interactions with Trump throughout the morning, telling a visibly frustrated King that he didnt feel it was appropriate.

What you feel isnt relevant, admiral, King said back at the NSA chief.

Later, when Rogers said he did not mean for his answer to King's question to sound confrontational, King said he did mean to sound confrontational.

Why are you not answering these questions? Is there an invocation of executive privilege? King demanded. Im not satisfied with, I do not believe its appropriate or I do not believe I should answer.

Im not sure I have a legal basis, Coats said at one point, adding that he would provide as much information as he was able behind closed doors.

Rogers indicated that while he and Coats have had conversations with the White House about a potential claim of executive privilege, he said that they had not gotten a definitive answer.

McCabe and Rosenstein both cited the ongoing federal investigation, led by special counsel Robert Mueller, arguing that it is longstanding Justice Department procedure not to discuss anything that might be under active investigation.

I dont understand why the special counsels lane takes precedence over the lane of the United States Congress, King said.

At issue was whether any of the officials had any evidence that Trump may have inappropriately attempted to curtail the FBI's investigation.

The Washington Post reported on Tuesday that Trump had asked Coats to intervene with then-FBI Director James Comey to limit the probe.

Both Coats and Rogers deniedfeeling pressured by Trump to intervene in the handling of intelligence in any inappropriate way but refused to answer specific questions about their interactions with the president.

Im willing to come before the committee and tell you what I know and dont know, Coats said. What Im not willing to do is share information I think ought to be protected in an opening hearing.

In a clear sign of the level of frustration in the room, Democrats repeatedly interrupted and talked over officials claims that they couldnt respond to certain lines of questioning. The argumentative exchanges on more than one occasion prompted Sen. John McCainJohn McCainSenator blasts NSA chief: What you feel isnt relevant, admiral Senate trying to insert Russia sanctions into popular Iran bill OPINION: Why President Trump should fear John McCain MORE (R-Ariz.) to grab his microphone and request that witnesses be allowed to answer.

In a previous and equally tense moment, Sen. Martin HeinrichMartin HeinrichSenator blasts NSA chief: What you feel isnt relevant, admiral Unemployment rate hits 16-year low as just 138K jobs added Intel chief has not talked with Trump about reported disclosure of classified info MORE (D-N.M.) cut off Rosenstein by saying, At this point you filibuster better than most of my colleagues.

Chairman Richard BurrRichard BurrWarren encourages Kamala Harris after shes scolded in hearing GOP senator threatens to subpoena Comey GOP chairman admonishes intel chiefs MORE (R-N.C.), clearly aggravated, eventually intervened. The committee is on notice, he snapped, pointing a finger and demanding that members provide the witnesses the courtesy to respond.

Comey is set to testify before the Senate Intelligence panel on Thursday in what may be the most highly anticipated congressional hearing since the Senate Judiciary Committee heard from Anita Hill, who had accused then-Supreme Court nominee Clarence Thomas of sexual harassment.

View post:
Senator blasts NSA chief: 'What you feel isn't relevant, admiral' - The Hill

NSA leak proves nothing about possible Russian hacking – New York Post

The publication that revealed a classified National Security Agency report on alleged Russian attempts to hack US election-related systems treats the report as possible evidence that Russia tried to rig the vote. More likely, however, the Kremlin expected the vote to be rigged in favor of Hillary Clinton.

According to the leaked report, the Russian military intelligence, GRU, ran a spear-phishing campaign targeting the employees of VR Systems, a voting hardware and software producer. At least one of its employee accounts apparently was compromised. Then the hackers used the harvested credentials to trap local government officials in charge of organizing elections. Emails, coming credibly from a VR Systems employee, contained malware that would have allowed the GRU (although the report provides no clues as to how the attribution was made) to control the computers of these local officials. The NSA doesnt seem to have determined whether the hackers managed that with any of their targets.

Reality Winner, 25, the NSA contractor accused of leaking the report to the Intercept, an online news organization, had an apparent motive: Her Twitter feed (under the name Sara Winners) shows she was disappointed when Donald Trump won the election.

So far, Russias alleged help to Trump in the 2016 election has amounted to Russian sources stealing and publishing emails and documents related to the Clinton campaign. Thats not particularly dangerous to Trump unless it can be shown that his campaign colluded with the hackers or that Russia tried to influence the actual vote count. The report appears to imply just that.

In reality, even if the allegedly GRU-affiliated hackers got into the computers of local officials in the states where VR Systems technology was used, they couldnt have changed the election outcome.

VR doesnt actually make voting machines. It makes electronic poll books that make paper voter rolls unnecessary. They allow an election worker to check a voters personal data against the rolls and issue a ballot. By messing with such a system, hackers could produce confusion, making it difficult for voter names to be verified. They could even enable ineligible people to vote but for such a ploy to work, there would need to be large numbers of such ineligible people available for a massive fraud operation on voting day.

The Intercept story suggests the same local officials who handle the electronic voter rolls also manually install updates on the voting machines. If so, they could inadvertently infect the voting equipment with malware. But even if that happened, it didnt swing any states Trumps way.

Results in the states that use VR equipment and software Florida, Illinois, Indiana, New York, North Carolina, Virginia and West Virginia were not challenged. They yielded no surprises compared with polling data. The big surprises came in Pennsylvania, Michigan and Wisconsin, where VR Systems isnt present.

I have written that its not impossible to rig a US presidential election (and was ridiculed for saying so). The rigging, however, would require a vast conspiracy spanning the entire country and involving local election officials the kind that exists in Russia.

Trump, with his cheap, hastily thrown together campaign infrastructure, could have achieved nothing of the kind, but as the campaign drew to a close, he appeared to fear such an effort from the Obama administration.

Experts pooh-poohed this conspiracy talk, pointing out how disparate the US election system was and what a massive clandestine effort would be required to subvert it. In Moscow, there were people telling President Vladimir Putin that Clinton had all the levers (financial and intelligence service contacts) to falsify a vote.

In other words, hacking VR Systems and the local officials would have been much more useful to the GRU if it had been conducting an intelligence operation to detect pro-Clinton fraud than if it had been planning to rig the election.

The NSA report at best provides additional evidence of Putins skepticism of Trumps ability to beat the US establishment, not of his meddling with vote results.

Bershidsky is a Bloomberg View columnist. He was the founding editor of the Russian business daily Vedomosti and founded the opinion website Slon.ru.

Link:
NSA leak proves nothing about possible Russian hacking - New York Post

Suspect in NSA leak being held in Lincolnton jail – Atlanta Journal Constitution

Lincolnton -- The Augusta woman who has been arrested in the National Security Agency leak investigation is being held at a small county jail here, about 40 miles northwest of Augusta.

An Atlanta Journal-Constitution reporter spotted Reality Leigh Winner Wednesday afternoon as she was standing in an outdoor area of the Lincoln County Jail. She was pacing in the fenced-in area, wearing an orange jumpsuit.

Winner, 25, is receiving three meals a day and has access to a phone to call her family, said Sheriff Bruce Beggs. A doctor is on call and a nurse comes twice a day, partly to dispense medication.

As far as I know, she is fine, Beggs said. We have not had any problems.

Winner has been charged with sending to the news media a classified government report about Russias meddling in the 2016 presidential election. The U.S. Justice Department announced her arrest Monday, about an hour after The Intercept reported that it had obtained a top-secret NSA report about Russias interference. The intelligence report, according to The Intercept, says Russian military intelligence officials tried to hack into the U.S. voting system just before last Novembers election.

Beggs would not permit The AJC to see the inside the jail, citing security concerns. But he gave an AJC reporter a tour of the brick facility from the outside.

Originally built in 1991, the jail can hold up to 90 detainees. Of the 50 who were being held there Wednesday, fewer than 15 were women, Beggs said. Men and women are separated from each other in the jail, which includes medium and maximum security wings. The federal government reimburses the jail for holding and transporting its detainees. On average, two-thirds of those being held there are facing federal charges.

They get served decent meals, said Beggs, a Lincolnton native and a veteran of the Lincoln Sheriffs Office. They get adequate medical care.

Beggs said he has received up to 20 phone calls from reporters from across the country about Winners case.

I dont know anything about her background, he said, or really what she is charged with.

Gary Davis, stepfather of Reality Leigh Winner, says the depiction of Winner through social media is not an an accurate portrayal of my daughter." Winner, who lives in Augusta, Ga., is accused of leaking national security information on Russia hac

See the rest here:
Suspect in NSA leak being held in Lincolnton jail - Atlanta Journal Constitution