Archive for the ‘NSA’ Category

Waukesha County Sheriff appointed to NSA national board – Lake Country Now

Subscribe today for full access on your desktop, tablet, and mobile device.

Let friends in your social network know what you are reading about

Waukesha County Sheriff Eric Severson has been appointed to the National Sheriffs Association (NSA) Board of Directors.

Try Another

Audio CAPTCHA

Image CAPTCHA

Help

CancelSend

A link has been sent to your friend's email address.

A link has been posted to your Facebook feed.

Lake Country 11:09 a.m. CT Jan. 19, 2017

News and events from our local communities.(Photo: Matt Colby/Now Media Group)

Waukesha County Sheriff Eric Severson has been appointed to the National Sheriffs Association (NSA) Board of Directors.

Severson, along with three others, was appointed to fill vacant positions on the board, and will stand for reelection to the position at the NSA Conference in June. The NSA board of directors represents all 3,080 sheriffs across the country. The NSA routinely provides testimony on law enforcement, correctionsand court security issues before Congress.

Read or Share this story: http://www.lakecountrynow.com/story/news/local/living-sunday/2017/01/19/waukesha-county-sheriff-appointed-nsa-national-board/96775920/

0) { %>

0) { %>

Continued here:
Waukesha County Sheriff appointed to NSA national board - Lake Country Now

Now It’s Much Easier for Government Agencies to Get NSA Surveillance Data – Slate Magazine (blog)

A supporter of President-elect Donald Trump takes a photo at a get-out-the-vote rally on Dec. 9, in Baton Rouge, Louisiana.

Don Emmert/AFP/Getty Images

Just days before Donald Trump takes office, the director of national intelligence and attorney general have issued new procedures that undermine Americans right to privacy and Fourth Amendment constitutional protections. These procedures will allow the NSA to share with other intelligence agencies raw intelligence that it collects while conducting mass surveillance under Executive Order 12333, which has been in effect since 1981. Raw intelligence just what it sounds likeemails and phone calls and anything else that the NSA collects during its daily surveillance. These records arent minimized or redacted to mask identifying information.

The previous procedures allowed for the NSA to share this information with other intelligence agencies, but only after it had been minimized to protect individuals privacy, and only if it was pertinent to their mission.

These new, more lax procedures are extremely troubling because thanks to legal loopholes, EO 12333 is used to scoop up billions of communications around the world every day, including those of Americans, without a warrant or any judicialor even congressionaloversight. The idea behind EO 12333 was that it govern NSA collection of purely foreign communications. That collection didnt need judicial or congressional oversight because if all the people in those communications were abroad, they werent entitled to the protections of our laws.

That all made sense when President Reagan signed the order, but today, the NSA uses EO 12333 to tap the cables that connect the internet across the world. An email I send from my office to a colleague just one floor down could travel between servers in Japan and Brazil before getting to its destination, and could get picked up by the NSA along the way as a foreign communication. Accordingly, the NSA has a virtually unchecked authority to warrantlessly collect Americans communications.

All of this is troubling in and of itself, but it becomes even more concerning in light of the new procedures that allow the NSA to share the information it collects with other intelligence agencies, without first trying to screen out Americans communications or identifying information. The procedures say that a high-level official at an agency like the FBI could make an application to the NSA for the communications that state the specific authorized foreign intelligence or counterintelligence missions that are the basis for the request.

This may seem reasonable, until you realize that foreign intelligence is really a catch all that can include most anything happening abroad. EO 12333 defines it as information relating to the capabilities, intentions and activities of foreign powers, organizations or persons. Dont let the organizations or persons part of that definition hide behind the more important-seeming term foreign powers.

That definition means that foreign intelligence includes communications about political and human rights activities, like if you send an email as part of an Amnesty International campaign to free a political prisoner. It can include anything impacting the economyeven a mom-and-pop coffee shops email about a business trip to Europe to procure the finest French chocolate for their cookies. It can even be stretched to include social plans you make for your vacation abroad.

Now, is the FBI likely to ask to see the chocolate emails when it requests raw foreign intelligence information under these procedures? No. But despite some process-oriented protections built into the procedures, with no external oversight or transparency, it would be hard to know if abuse did happen.

Even without abuse, these procedures can serve as yet another work-around for the warrant requirement of our Constitution. If the communications the agency accesses only involve Americans, the procedures require that they be destroyed unless they have foreign intelligence or counterintelligence value. But they can be kept and disseminated if the agency thinks they include evidence of a crime. In that case, the communications could be shared, for example, with the Department of Justice or the FBI and used in a criminal investigation that would have otherwise required a warrant from a judge to obtain the same information.

While its a big step forward in transparency that these procedures were made public in the first place, we still wont know enough information about how much information will get shared, how often, and when it will be used for non-foreign intelligence investigations or prosecutions. We may simply never know the full impact these new procedures will have on our privacy.

View post:
Now It's Much Easier for Government Agencies to Get NSA Surveillance Data - Slate Magazine (blog)

NSA records allege dozens of cases of workers ripping agency off – Baltimore Sun

A group of five National Security Agency contractors falsified their time sheets to claim they had worked almost 200 days that agency investigators concluded they in fact had not, according to the agency's inspector general.

The incident was one of more than 100 in which the NSA's internal watchdog found that civilian employees and contractors claimed falsely that they'd been at work incidents that a spokesman said cost the surveillance outfit based at Fort Meade almost $3.5 million.

The NSA disclosed the cases in response to a Freedom of Information Act request filed by the Baltimore Sun. The records cover five years ending in 2014, when The Sun request was originally filed.

A handful of cases were prosecuted in federal court. But the newly released records show the problems were far more widespread.

Investigators in the agency's inspector general's office reported they substantiated allegations in 44 "civilian time and attendance cases" and 68 "contractor labor mischarging cases."

In some cases, they concluded, workers lied about working hundreds of hours before being caught.

In the case of the five contractors, their employers were unaware of the falsifications, the investigators wrote in an internal memo.

The worst offender, James Edward Jackson, claimed he worked 834 hours that he hadn't. He was convicted and sentenced to 30 days in prison in 2009.

Michael T. Halbig, an NSA spokesman, said the agency takes steps to uncover fraud, and shares substantiated cases of misconduct with its workforce to serve as a deterrent.

The agency has recovered 80 percent of the money lost to the fraud, he said.

Some of the documents mention a special initiative the inspector general's office set up to pursue cases of overcharging.

That program no longer exists, Halbig said, and an effort to analyze data to catch fraud had mixed results.

But he said the agency has recently expanded its efforts to spot indications that fraud is taking place.

"We continually evaluate how we identify, evaluate and investigate potential fraud," Halbig said.

Neil Gordon, who studies misconduct by government contractors at the Project on Government Oversight, said the secrecy surrounding the NSA and other intelligence agencies might make the problems worse.

"Contractor time sheet fraud may be rampant among intelligence programs due to a lack of transparency and insufficient contract oversight," he said. "But the investigative documents also give us hope that the intelligence community watchdog takes its role seriously, and doggedly pursues and punishes allegations of wrongdoing."

The NSA has moved to tighten up oversight of its workers in recent years, following the theft of reams of classified documents by agency contractor Edward Snowden and other leaks.

The effectiveness of those efforts was called into question after federal prosecutors in Baltimore filed charges against another contractor. Harold T. Martin III is accused of stealing vast amounts of sensitive information and stashing it at his Glen Burnie home.

iduncan@baltsun.com

twitter.com/iduncan

Visit link:
NSA records allege dozens of cases of workers ripping agency off - Baltimore Sun

NSA Gets More Latitude to Share Intercepted Communications – New York Times


New York Times
NSA Gets More Latitude to Share Intercepted Communications
New York Times
Attorney General Loretta E. Lynch signed the new rules, permitting the N.S.A. to disseminate raw signals intelligence information, on Jan. 3, after the director of national intelligence, James R. Clapper Jr., signed them on Dec. 15, according to a 23 ...
Obama Opens NSA's Vast Trove of Warrantless Data to Entire Intelligence Community, Just in Time for TrumpThe Intercept
The NSA can now share unfiltered surveillance data with other intelligence agenciesTechCrunch
NSA reportedly to share intercepted communications with other agenciesCNBC
Gizmodo -Engadget -WIRED -DocumentCloud
all 67 news articles »

Read more here:
NSA Gets More Latitude to Share Intercepted Communications - New York Times

Obama administration signs off on wider data-sharing for NSA – Naked Security

The Obama Department of Justice (DOJ) has signed off on new rules to let the National Security Agency (NSA) share globally intercepted personal information with the countrys other 16 intelligence agencies, before it applies privacy protection to or minimizes the raw data.

Or, as Patrick Toomey, a lawyer for the American Civil Liberties Union (ACLU), put it in an interview with the New York Times, 17 intelligence agencies are now going to be rooting through Americans emails with family members, friends and colleagues, all without ever obtaining a warrant.

The new rules mean that the FBI, the CIA, the DEA, and intelligence agencies of the US militarys branchesand more, will be able to search through raw signals intelligence (SIGINT): intercepted signals that include all manner of peoples communications, be it via satellite transmissions, phone calls and emails that cross network switches abroad, as well as messages between people abroad that cross domestic network switches.

The director of national intelligence, James Clapper, signed the rules on December 15. Attorney-general Loretta Lynch followed suit on January 3, according to a 23-page, largely declassified copy of the procedures that the NYT first reported on and released last week.

The new rules significantly weaken longstanding limits on what the NSA may do with the vast troves of information it gathers with its surveillance machinery machinery thats both powerful and largely unregulated by US wiretapping laws.

The changes usher in two sweeping surveillance powers for the-soon-to-be President Trump: Section 702 of the Foreign Intelligence Surveillance Act (FISA), which allows the government to carry out mass surveillance on US soil, including both the so-called PRISM and Upstream programs revealed by Edward Snowden, and Executive Order 12333.

That sounds concerning, but observers point out that Obamas move could in fact limit Trumps ability to compromise peoples privacy. Susan Hennessy, a fellow at Brookings, told The Atlantic:

I think a reasonable observer might assume that while the protections the Obama administration was interested in putting into place increased privacy protectionsor at the very least did not reduce themthat the incoming administration has indicated that they are less inclined to be less protective of privacy and civil liberties. So I think it is a good sign that these procedures have been finalized, in part because its so hard to change procedures once theyre finalized.

Executive Order 12333 is the primary authority under which the NSA conducts surveillance. It covers a dizzying array of warrantless, high-tech spying programs, according to Toomey.

Unlike Section 215 of the Patriot Act, EO 12333 has no protection for US people if the relevant SIGINT occurs outside US borders.

12333 isnt a statute. Its never been subject to meaningful oversight from Congress or any court,according to John Napier Tye, who was working for the State Department during the Reagan era when 12333 was passed.

While 12333 is mostly targeted at foreigners, the NSA has used it to hoover up plenty of Americans information, Toomey points out, including:

The NYT has filed a Freedom of Information Act lawsuit seeking details about how EO 12333 was revised in 2008 under President George W Bush. The case wound up last February, but many questions were left unanswered, the NYT said, including

when analysts would be permitted to use Americans names, email addresses or other identifying information to search a 12333 database and pull up any messages to, from or about them that had been collected without a warrant.

The way critics see it, the newly signed rules relaxing NSA sharing of raw SIGINT are also opening the door to law enforcement searching the data for ordinary criminal cases, allowing military intelligence powers to creep into everyday law enforcement.

The new rules specify that the intelligence agencies access to raw SIGINT comply with the Fourth Amendment, which prohibits unreasonable search and seizures, and that it be done in a manner that protects the privacy of US persons.

And just what are the safeguards being put in place for that? Those concerned with privacy or with the rule of law, or the Constitution, or civil rights have been keen to find out.

Robert Litt, general counsel of the Office of the Director of National Intelligence, has noted that data-sharing will only occur with intelligence agencies (as opposed to state and local law enforcement), and that it can only occur for foreign intelligence and counter-terrorism purposes.

Analysts can also search the data for Americans only if other conditions have been met, including that the American being investigated is an agent of a foreign power. Under the new rules, if analysts find evidence that an American has committed a crime, that evidence will be sent to the Justice Department.

But plenty of questions remain. Jake Laperruque, writing for the Just Security forum, is one of those whove questioned whether law enforcement use of the data will truly be limited, and how, as well as how oversight will be conducted.

Will access be screened or limited to personnel that work exclusively on intelligence operations, who will then be barred from discussing it with personnel who serve law enforcement functions?

If not, how will the government ensure that agencies do not use data from bulk collection for broad law enforcement purposes, and then mask this use through parallel construction, a practice the DEA reportedly has a unit devoted to achieving?

Parallel construction is when an agency secretly uses NSA data when identifying or tracking a criminal suspect, then cooks up a plausible alternative story, with evidence, to give to a court about the investigations origin.

A 2013 Reuters report detailed how the DEAs Special Operations Division, or SOD, teaches agents to cover up vital tips. Reuters obtained a DEA document showing that federal agents are trained to conceal essential intelligence obtained via wiretaps, informants or other surveillance methods by crediting it to another source.

Nate Cardozo, an attorney with the Electronic Frontier Foundation, told Wired that the rule change opens the door to yet more of this type of tactical cover-up.

It used to be that if NSA itself saw the evidence of a crime, they could give a tip to the FBI, and the FBI would engage in parallel construction. Now FBI will be able to get into the raw data themselves and do what they will with it.

Read the original here:
Obama administration signs off on wider data-sharing for NSA - Naked Security