Archive for the ‘NSA’ Category

Word Games: What the NSA Means by Targeted Surveillance …

We all know that the NSA uses word games to hide and downplay its activities. Words like "collect," "conversations," "communications," and even "surveillance" have suffered tortured definitions that create confusion rather than clarity.

Theres another one to watch: "targeted" v. "mass" surveillance.

Since 2008, the NSA has seized tens of billions of Internet communications. It uses the Upstream and PRISM programswhich the government claims are authorized under Section 702 of the FISA Amendments Actto collect hundreds of millions of those communications each year. The scope is breathtaking, including the ongoing seizure and searching of communications flowing through key Internet backbone junctures,[1]the searching of communications held by service providers like Google and Facebook, and, according to the government's own investigators, the retention of significantly more than 250 million Internet communications per year.[2]

Yet somehow, the NSA and its defenders still try to pass 702 surveillance off as "targeted surveillance," asserting that it is incorrect when EFF and many others call it "mass surveillance."

Our answer: if "mass surveillance" includes the collection of the content of hundreds of millions of communications annually and the real-time search of billions more, then the PRISM and Upstream programs under Section 702 fully satisfy that definition.

This word game is important because Section 702 is set to expire in December 2017. EFF and our colleagues who banded together to stop the Section 215 telephone records surveillance are gathering our strength for this next step in reining in the NSA. At the same time, the government spin doctors are trying to avoid careful examination by convincing Congress and the American people that this is just "targeted" surveillance and doesnt impact innocent people.

PRISM and Upstream surveillance are two types of surveillance that the government admits that it conducts under Section 702 of the FISA Amendments Act, passed in 2008. Each kind of surveillance gives the U.S. government access to vast quantities of Internet communications.[3]

Upstream gives the NSA access to communications flowing through the fiber-optic Internet backbone cables within the United States.[4] This happens because the NSA, with the help of telecommunications companies like AT&T, makes wholesale copies of the communications streams passing through certain fiber-optic backbone cables. Upstream is at issue in EFFs Jewel v. NSA case.

PRISM gives the government access to communications in the possession of third-party Internet service providers, such as Google, Yahoo, or Facebook. Less is known about how PRISM actually works, something Congress should shine some light on between now and December 2017.[5]

Note that those two programs existed prior to 2008they were just done under a shifting set of legal theories and authorities.[6] EFF has had evidence of the Upstream program from whistleblower Mark Klein since 2006, and we have been suing to stop it ever since.

Despite government claims to the contrary, heres why PRISM and Upstream are "mass surveillance":

(1) Breadth of acquisition: First, the scope of collection under both PRISM and Upstream surveillance is exceedingly broad. The NSA acquires hundreds of millions, if not billions, of communications under these programs annually.[7] Although, in the U.S. governments view, the programs are nominally "targeted," that targeting sweeps so broadly that the communications of innocent third parties are inevitably and intentionally vacuumed up in the process. For example, a review of a "large cache of intercepted conversations" provided by Edward Snowden and analyzed by the Washington Post revealed that 9 out of 10 account holders "were not the intended surveillance targets but were caught in a net the agency had cast for somebody else."[8] The material reviewed by the Post consisted of 160,000 intercepted e-mail and instant message conversations, 7,900 documents (including "medical records sent from one family member to another, resumes from job hunters and academic transcripts of schoolchildren"), and more than 5,000 private photos.[9] In all, the cache revealed the "daily lives of more than 10,000 account holders who were not targeted [but were] catalogued and recorded nevertheless."[10] The Post estimated that, at the U.S. governments annual rate of "targeting," collection under Section 702 would encompass more than 900,000 user accounts annually. By any definition, this is "mass surveillance."

(2) Indiscriminate full-content searching. Second, in the course of accomplishing its so-called "targeted" Upstream surveillance, the U.S. government, in part through its agent AT&T, indiscriminately searches the contents of billions of Internet communications as they flow through the nations domestic, fiber-optic Internet backbone. This type of surveillance, known as "about surveillance," involves the NSA's retention of communications that are neither to nor from a target of surveillance; rather, it authorizes the NSA to obtain any communications "about" the target.[11] Even if the acquisition of communications containing information "about" a surveillance target could, somehow, still be considered "targeted," the method for accomplishing that surveillance cannot be: "about" surveillance entails a content search of all, or substantially all, international Internet communications transiting the United States.[12] Again, by any definition, Upstream surveillance is "mass surveillance." For PRISM, while less is known, it seems the government is able to search throughor require the companies like Google and Facebook to search throughall the customer data stored by the corporations for communications to or from its targets.

To accomplish Upstream surveillance, the NSA copies (or has its agents like AT&T copy) Internet traffic as it flows through the fiber-optic backbone. This copying, even if the messages are only retained briefly, matters under the law. Under U.S. constitutional law, when the federal government "meaningfully interferes"with an individuals protected communications, those communications have been "seized" for purposes of the U.S. Constitutions Fourth Amendment. Thus, when the U.S. government copies (or has copied) communications wholesale and diverts them for searching, it has "seized" those communications under the Fourth Amendment.

Similarly, U.S. wiretapping law triggers a wiretap at the point of "interception by a device," which occurs when the Upstream mechanisms gain access to our communications.[13]

Why does the government insist that its targeted? For Upstream, it may be because the initial collection and searching of the communicationsdone by service providers like AT&T on the governments behalfis really, really fast and much of the information initially collected is then quickly disposed of. In this way the Upstream collection is unlike the telephone records collection where the NSA kept all of the records it seized for years. Yet this difference should not change the conclusion that the surveillance is "mass surveillance." First, all communications flowing through the collection points upstream are seized and searched, including content and metadata. Second, as noted above, the amount of information retainedover 250 million Internet communications per yearis astonishing.

Thus, regardless of the time spent, the seizure and search are comprehensive and invasive. Using advanced computers, the NSA and its agents can do a full-text, content search within a blink of an eye through billions, if not trillions of your communications, including emails, social media, and web searches. Second, as demonstrated above, the government retains a huge amount of the communicationsfar more about innocent people than about its targetsso even based on what is retained the surveillance is better described as "mass" rather than "targeted."

So it is completely correct to characterize Section 702 as mass surveillance. It stems from the confluence of: (1) the method NSA employs to accomplish its surveillance, particularly Upstream, and (2) the breadth of that surveillance.

Next time you see the government or its supporters claim that PRISM and Upstream are "targeted" surveillance programs, youll know better.

[1] See, e.g., Charlie Savage, NSA Said to Search Content of Messages to and From U.S., N.Y. Times (Aug 8, 2013) (The National Security Agency is searching the contents of vast amounts of Americans e-mail and text communications into and out of the country[.]). This article describes an NSA practice known as about surveillancea practice that involves searching the contents of communications as they flow through the nations fiber-optic Internet backbone.

[2] FISA Court Opinion by Judge Bates entitled [Caption Redacted], at 29 (NSA acquires more than two hundred fifty million Internet communications each year pursuant to Section 702), https://www.eff.org/document/october-3-2011-fisc-opinion-holding-nsa-surveillance-unconstitutional (Hereinafter, Bates Opinion). According to the PCLOB report, the current number is significantly higher than 250 million communications. PCLOB Report on 702 at 116.

[3] Bates Opinion at 29; PCLOB at 116.

[6] First, the Bush Administration relied solely on broad claims of Executive power, grounded in secret legal interpretations written by the Department of Justice. Many of those interpretations were subsequently abandoned by later Bush Administration officials. Beginning in 2006, DOJ was able to turn to the Foreign Intelligence Surveillance Court to sign off on its surveillance programs. In 2007, Congress finally stepped into the game, passing the Protect America Act; which, a year later, was substantially overhauled and passed again as the FISA Amendments Act. While neither of those statutes mention the breadth of the surveillance and it was not discussed publicly during the Congressional processes, both have been cited by the government as authorizing it.

[11] Bates Opinion at 15.

[12] PCLOB report at 119-120.

[13] See 18 U.S.C 2511(1)(a); U.S. v. Councilman, 418 F.3d 67, 70-71, 79 (1st Cir. 2005) (en banc).

Originally posted here:
Word Games: What the NSA Means by Targeted Surveillance ...

Sheriff Page, NSA leaders, meet with President Trump at White House – Greensboro News & Record

WASHINGTON There is a new sheriff in charge of the United States of America who is more than willing to listen to law enforcement leaders about the issues they face in the communities that span far and wide across the country.

On Tuesday, one of those prominent voices at the nations capital was a man who has dedicated the last 30 years to protecting and serving the residents of North Carolinas North Star.

The invitation was part of a week-longtrip to the nations capital to attend the association's winter conference, where Page also met with fellow members of the NSA Immigration and Border Security Commission for a convened meeting.

Rockingham County Sheriff Sam Page was one of nearly a dozen sheriffs from the executive committee of the National Sheriffs Association on Feb. 7 that joined President Donald Trump in the White House to discuss immigration, border security and the leadership direction of the executive branch of government.

Vice President Mike Pence was also in attendance.

An NSA spokesperson told the Huffington Post on Saturday that the group who spoke with Trump wasa combination of leadership chosen by the association and certain elected officers who were requested by the White House.

The meeting was the first of its kind between the National Sheriffs Association and a sitting president. Members of the meeting were also invited into the Oval Office following the roundtable talk with the president.

Page also presented Trump with a red hat in the president's office, with white lettering that read, Sheriffs for Trump.

We appreciate you being where you are at, said Page to President Trump during the open discussion that focused on several topics, including the opioid epidemic across the nation, border security and illegal immigration.

The first responsibility of government is to protect its people as we are elected by the people and you are elected by the people, we got that. When you said there is a new sheriff in town, we relate to that. You are about the rule of law we haven't seen that in many years and we appreciate that.

Page has been a vocal leader over the last six years in regards to advocating that the U.S. Government enforces existing federal law to protect national borders specifically to help eliminate illegal drug trade.

The Sheriff also shared with the President his appreciation for John F. Kelly, who was named the fifth United States Secretary of Homeland Security on Jan. 20.

He went to the border, Page said. He looked at the assets and he asked the law enforcement down there whats going on and what can we do to help fix this situation down here. Youve got a good team and youre putting together a good team and you have the support of sheriffs from across the country and we appreciate what you are doing.

Page, who was elected as sheriff of Rockingham County in 1998, also served as the President of the North Carolina Sheriffs Association during the 2010-11 term.

The former Eden Police officer planned to stay in Washington DC until Feb. 9.

The sheriff also has scheduled meetings with Rep. Mark Walker and Sen. Richard Burr during his visit to the capital.

Contact Joe Dexter at (336) 349-4311, ext. 6139and follow @DexterJoe_RCN on Twitter.

Go here to see the original:
Sheriff Page, NSA leaders, meet with President Trump at White House - Greensboro News & Record

Former NSA contractor indicted in stolen data case – CNN

Harold Thomas Martin III, 52, faces 20 counts of willful retention of national defense information.

The indictment alleges Martin removed classified documents from 1996 to 2016. He is accused of keeping documents in his home or car.

The documents include highly classified materials from the National Security Agency, the US Cyber Command, the CIA and the National Reconnaissance Office. Among the documents are ones that reveal US military gaps, capabilities and operations, as well as ones that contained foreign intelligence collection methods, targeting information and technical user materials.

Martin's attorney had no comment when contacted by CNN.

FBI investigators haven't concluded what Martin's motivation was for stealing the documents. At a hearing in late October a public defender representing Martin said his client was a hoarder who was "completely out of control."

Before his arrest in August, Martin worked as a contractor to the National Security Agency through consulting firm Booz Allen Hamilton, which fired him after he was charged. He has a long history working with sensitive government intelligence, and served in the US Navy and Naval Reserves for more than 10 years, reaching the rank of lieutenant.

The information he had digitally in his car, the feds said, was equivalent to approximately 50,000 gigabytes, enough to store 500 million documents containing images and text.

The government said Martin had a document "regarding specific operational plans against a known enemy of the United States and its allies." That document was not only classified but marked need-to-know only, and Martin should not have been privy to that information, prosecutors said in court filings.

Also found were files containing personal information of government employees, and an email chain with "highly sensitive information" on the back of which were handwritten notes "describing the NSA's classified computer infrastructure and detailed descriptions of classified technical operations."

Among the documents the FBI believes Martin stole were some detailing a hacking tool that the NSA developed to break into computer systems in other countries, law enforcement sources said when he was arrested. Documents detailing the tools were posted on the Internet in recent months, though no connection to Martin has been offered.

Martin's attorneys have argued previously in court that he is not a flight risk because he does not have his passport and has a wife and home in Maryland. They noted his military service.

Martin will make his next appearance in court on February 14.

CNN's Steve Almasy contributed to this report.

See more here:
Former NSA contractor indicted in stolen data case - CNN

NSA Withholding Intelligence From ‘Untrustworthy’ Trump Administration, Former Analyst Claims – Haaretz

John Schindler claims NSA fears Trump administration cannot be trusted with sensitive information. 'Since January 20, we've assumed that the Kremlin has ears inside the SITROOM,' he cites Pentagon official as saying.

The National Security Agency has been withholding information from the White House, fearing that President Donald Trump and his staff cannot be trusted not to leak sensitive information, a former NSA analyst claims.

In a column written by John R. Schindler for The Observer, the security expert and former professor at the U.S. Naval War College claims that the NSA has stopped its decades-old practice of preparing special reports for U.S. presidents since Trump took office.

Schindler added that the NSA's concerns were shared across the American intelligence community, and it appears that other agencies are withholding intelligence from the White House as well.

According to Schindler, the intelligence community's fears were prompted by the ties of senior members of the Trump administration to the Kremlin, as well as "nagging questions about basic competence regarding Team Trump."

"Since January 20, weve assumed that the Kremlin has ears inside the SITROOM," Schindler cites a senior Pentagon official as saying, meaning the White House Situation Room where the president is briefed on intelligence matters.

Schindler's claims echo a January report on Yedioth Ahronoth by Israeli journalist Ronen Bergman, which said that Israeli intelligence officials are concerned that the exposure of classified information to their American counterparts under a Trump administration could lead to their being leaked to Russia and onward to Iran.

According to Bergman, the American intelligence officials implied that Israel should be careful when transferring intelligence information to the White House and the National Security Council (NSC) following Trump's inauguration at least until it is clear that Trump does not have inappropriate connections with Russia.

Want to enjoy 'Zen' reading - with no ads and just the article? Subscribe today

Read more:
NSA Withholding Intelligence From 'Untrustworthy' Trump Administration, Former Analyst Claims - Haaretz

Will Edward Snowden Return To The US? NSA Leaker ‘Not Afraid’ If Russia Hands Him Over To Washington – Yahoo News

Will Edward Snowden Return To The US? NSA Leaker Not Afraid If Russia Hands Him Over To Washington

Edward Snowden tweeted Sundaythat he is not afraid of being handed over to the U.S. after a report stated that Russia is consideringsending the whistleblower to his home country as a gift to President Donald Trump. In his tweets, Snowden implied that these rumors are a result of his criticism of Russian governments new law that allows surveillance in a bid to counter terrorism in the country. Snowden has dubbed it the Big Brother law. On Friday, NBC News reported, citing two senior U.S. officials, Russia is mulling over the idea to send the former National Security Agency (NSA) contractor to the U.S. to curry favor with Trump. The U.S. president, on his part,has been looking to establishbetter

More:
Will Edward Snowden Return To The US? NSA Leaker 'Not Afraid' If Russia Hands Him Over To Washington - Yahoo News