What's new

This is why you can't trust the NSA. Ever

kamrananvaar

FULL MEMBER
Joined
Dec 2, 2011
Messages
698
Reaction score
1
The notion that the National Security Agency could police its own internet dragnet program with minimal oversight from a secret court has long drawn scoffs from observers. Now it appears that skepticism was completely justified, following the release of a bunch of documents on the program earlier this month by the office of Director of National Intelligence James Clapper (ODNI), which came in response to a Freedom of Information Act request filed by the Electronic Privacy Information Center.
Exhibit A is a comprehensive end-to-end report that the NSA conducted in late summer or early fall of 2009, which focused on the work the agency did in metadata collection and analysis to try and identify people emailing terrorist suspects.
The report described a number of violations that the NSA had cleaned up since the beginning of that year — including using automatic alerts that had not been authorized and giving the FBI and CIA direct access to a database of query results. It concluded the internet dragnet was in pretty good shape. "NSA has taken significant steps designed to eliminate the possibility of any future compliance issues," the last line of the report read, "and to ensure that mechanisms are in place to detect and respond quickly if any were to occur."
But just weeks later, the Department of Justice informed the FISA Court, which oversees the NSA program, that the NSA had been collecting impermissible categories of data — potentially including content — for all five years of the program's existence.
The Justice Department said the violation had been discovered by NSA's general counsel, which since a previous violation in 2004 had been required to do two spot checks of the data quarterly to make sure NSA had complied with FISC orders. But the general counsel had found the problem only after years of not finding it. The Justice Department later told the court that "virtually every" internet dragnet record "contains some metadata that was authorized for collection and some metadata that was not authorized for collection." In other words, in the more than 25 checks the NSA's general counsel should have done from 2004 to 2009, it never once found this unauthorized data.
The following year, Judge John Bates, then head of FISC, emphasized that the NSA had missed the unauthorized data in its comprehensive report. He noted "the extraordinary fact that NSA's end-to-end review overlooked unauthorized acquisitions that were documented in virtually every record of what was acquired." Bates went on, "t must be added that those responsible for conducting oversight at NSA failed to do so effectively."
Nevertheless, in the very same document, Bates would go on to authorize restarting the program (his colleague, Judge Reggie Walton, had shut it down after learning of the illegal collection in late 2009). Not only that: Bates's reauthorization permitted the NSA to collect all the data it had been unauthorized to collect before; expanded the number of NSA analysts who could access the data to pretty much anyone with training; unmoored the collection from specific switches more likely to carry terrorist traffic; and expanded the volume of collection by 11 to 24 times.
In other words, Bates decided it was a good idea to let those who, in his judgment, failed to effectively conduct oversight at the NSA to dramatically expand the program.
While a sketchy outline of this story was revealed when the government first released Bates's 2010 reauthorization memo last year, a clearer picture emerged following ODNI's document dump.
Those documents also show how lawyers from the Justice Department secretly told FISC Judge Colleen Kollar-Kotelly in 2004 that they couldn't get Congress to pass a law to expand the executive's spying authority — which they admitted was what the White House normally did when it came across a law it found too restrictive — because "seeking legislation would inevitably compromise the secrecy of the collection program the government wishes to undertake."
The documents show that when Attorney General Alberto Gonzales briefed the Senate Intelligence Committee in 2005 on programs authorized by the internet dragnet law, he made no mention of what the NSA was doing under it. They show how Judge Walton correctly guessed, in early 2009, that he might find the same violations with the internet dragnet as the Justice Department had previously disclosed about the NSA's phone-tapping program.
And of course, they show that roughly six months of close review of the internet dragnet program did not lead the NSA to discover — or if it did discover, to admit — that it had been illegally collecting data within the U.S. for five whole years. It took something else to get NSA to admit to that.
Clapper's office maintains that these documents demonstrate "the oversight regime of internal checks over the program." Perhaps, though they reflect favorably only on Walton's decision to shut the program down in 2009.
But there's a lot Clapper's office isn't saying. First, his office is hiding almost all the dates on these documents (it took matching these with many other public documents to come up with the estimates in this article). Perhaps that's to shield the government from liability for this illegal spying.
Also, ODNI claims that the FISC-authorized internet dragnet has been shut down. "As previously stated, this internet communications metadata bulk collection program has been discontinued." But during precisely the same weeks when NSA's general counsel was busy not finding the illegal data in virtually every internet dragnet record, NSA piloted a new program to permit its analysts to do the same kind of analysis on the metadata of U.S. persons collected under an executive order (Executive Order 12333). NSA expanded the program to all of NSA in early 2011, before NSA shut down the internet dragnet program.
That means there is a related dragnet program out there with nowhere near the level of oversight as the old one — the one that managed to compile five years of serious violations that the NSA never detected.

This is why you can't trust the NSA. Ever.
 
.
The notion that the National Security Agency could police its own internet dragnet program with minimal oversight from a secret court has long drawn scoffs from observers. Now it appears that skepticism was completely justified, following the release of a bunch of documents on the program earlier this month by the office of Director of National Intelligence James Clapper (ODNI), which came in response to a Freedom of Information Act request filed by the Electronic Privacy Information Center.
Exhibit A is a comprehensive end-to-end report that the NSA conducted in late summer or early fall of 2009, which focused on the work the agency did in metadata collection and analysis to try and identify people emailing terrorist suspects.
The report described a number of violations that the NSA had cleaned up since the beginning of that year — including using automatic alerts that had not been authorized and giving the FBI and CIA direct access to a database of query results. It concluded the internet dragnet was in pretty good shape. "NSA has taken significant steps designed to eliminate the possibility of any future compliance issues," the last line of the report read, "and to ensure that mechanisms are in place to detect and respond quickly if any were to occur."
But just weeks later, the Department of Justice informed the FISA Court, which oversees the NSA program, that the NSA had been collecting impermissible categories of data — potentially including content — for all five years of the program's existence.
The Justice Department said the violation had been discovered by NSA's general counsel, which since a previous violation in 2004 had been required to do two spot checks of the data quarterly to make sure NSA had complied with FISC orders. But the general counsel had found the problem only after years of not finding it. The Justice Department later told the court that "virtually every" internet dragnet record "contains some metadata that was authorized for collection and some metadata that was not authorized for collection." In other words, in the more than 25 checks the NSA's general counsel should have done from 2004 to 2009, it never once found this unauthorized data.
The following year, Judge John Bates, then head of FISC, emphasized that the NSA had missed the unauthorized data in its comprehensive report. He noted "the extraordinary fact that NSA's end-to-end review overlooked unauthorized acquisitions that were documented in virtually every record of what was acquired." Bates went on, "t must be added that those responsible for conducting oversight at NSA failed to do so effectively."
Nevertheless, in the very same document, Bates would go on to authorize restarting the program (his colleague, Judge Reggie Walton, had shut it down after learning of the illegal collection in late 2009). Not only that: Bates's reauthorization permitted the NSA to collect all the data it had been unauthorized to collect before; expanded the number of NSA analysts who could access the data to pretty much anyone with training; unmoored the collection from specific switches more likely to carry terrorist traffic; and expanded the volume of collection by 11 to 24 times.
In other words, Bates decided it was a good idea to let those who, in his judgment, failed to effectively conduct oversight at the NSA to dramatically expand the program.
While a sketchy outline of this story was revealed when the government first released Bates's 2010 reauthorization memo last year, a clearer picture emerged following ODNI's document dump.
Those documents also show how lawyers from the Justice Department secretly told FISC Judge Colleen Kollar-Kotelly in 2004 that they couldn't get Congress to pass a law to expand the executive's spying authority — which they admitted was what the White House normally did when it came across a law it found too restrictive — because "seeking legislation would inevitably compromise the secrecy of the collection program the government wishes to undertake."
The documents show that when Attorney General Alberto Gonzales briefed the Senate Intelligence Committee in 2005 on programs authorized by the internet dragnet law, he made no mention of what the NSA was doing under it. They show how Judge Walton correctly guessed, in early 2009, that he might find the same violations with the internet dragnet as the Justice Department had previously disclosed about the NSA's phone-tapping program.
And of course, they show that roughly six months of close review of the internet dragnet program did not lead the NSA to discover — or if it did discover, to admit — that it had been illegally collecting data within the U.S. for five whole years. It took something else to get NSA to admit to that.
Clapper's office maintains that these documents demonstrate "the oversight regime of internal checks over the program." Perhaps, though they reflect favorably only on Walton's decision to shut the program down in 2009.
But there's a lot Clapper's office isn't saying. First, his office is hiding almost all the dates on these documents (it took matching these with many other public documents to come up with the estimates in this article). Perhaps that's to shield the government from liability for this illegal spying.
Also, ODNI claims that the FISC-authorized internet dragnet has been shut down. "As previously stated, this internet communications metadata bulk collection program has been discontinued." But during precisely the same weeks when NSA's general counsel was busy not finding the illegal data in virtually every internet dragnet record, NSA piloted a new program to permit its analysts to do the same kind of analysis on the metadata of U.S. persons collected under an executive order (Executive Order 12333). NSA expanded the program to all of NSA in early 2011, before NSA shut down the internet dragnet program.
That means there is a related dragnet program out there with nowhere near the level of oversight as the old one — the one that managed to compile five years of serious violations that the NSA never detected.

This is why you can't trust the NSA. Ever.

Snowden on cyberwar: 'We have more to lose than any other nation on Earth'



Russell Brandom

The Verge




As the digital attacks between states become more common and more destructive, NSA whistleblower Edward Snowden is sounding the alarm. Speaking with PBS's Nova Next from a hotel room in Moscow, the former NSA contractor detailed the often-ignored risks of taking sabotage and espionage into the digital space. "With every internet enabled operation that we’ve seen so far, all of these offensive operations, we see knock on effects. We see unintended consequences," Snowden said. "When we put the little evil virus in the big pool of all our private lives, all of our private systems around the internet, it tends to escape and go Jurassic Park on us. And as of yet, we’ve found no way to prevent that."

It's a crucial topic on the heels of the Sony Pictures hack, which has led to an ongoing US retaliation against North Korea, but as Snowden points out, many countries' digital capabilities were developed in direct response to US cyberattacks. "We really started this trend in many ways when we launched the Stuxnet campaign against the Iranian nuclear program," Snowden said. "It actually kicked off a response, sort of retaliatory action from Iran, where they realized they had been caught unprepared." A recent attack on Las Vegas Sands computer systems was traced back to Iran after causing $40 million in damage. As Snowden pointed out, escalating digital attacks will inevitably leave the US as a tempting target: "We have more to lose than any other nation on Earth."
 
.
5c4.jpg
 
.
US 'penetrated North Korea computer systems' in 2010
Washington (AFP) - The United States secretly penetrated North Korea's computer systems four years ago -- a breach that allowed Washington to insist Pyongyang was to blame for the recent cyberattack on Sony Pictures, the New York Times reported Monday.
Citing former US officials and a newly released National Security Agency (NSA) document, the Times detailed how the US spy agency in 2010 "penetrated directly" into the North's systems via Chinese networks and connections in Malaysia favored by North Korean hackers.

Primarily aimed at gathering information on the reclusive nation's nuclear program, the NSA's clandestine operation switched focus to the growing threat posed by North Korea's hacking capabilities following a destructive cyberattack on South Korean banks in 2013.

Hidden US software provided an "early warning radar" for North Korean activities, and provided the evidence that persuaded President Barack Obama that Pyongyang was behind the Sony hack, the Times said, citing an anonymous official familiar with the NSA mission.

US investigators concluded that North Korean hackers spent two months mapping Sony's computer systems in preparation for what became the biggest cyberattack in US corporate history.

North Korea denies any involvement, although it had publicly threatened Sony if it released the comedy film "The Interview" about a CIA plot to assassinate leader Kim Jong-Un.

Given that threat and the reported level of US penetration, the Times report raised the question of why the NSA was unable to warn Sony in advance.

According to one US official cited by the newspaper, the intelligence agencies "couldn't really understand the severity" of the attack that was coming.

While North Korea's conventional military hardware is largely outdated and unsophisticated, its cyberwarfare capabilities have long been considered a significant threat.

South Korean intelligence believes North Korea runs an elite cyberwarfare unit with at least 6,000 personnel, trained in secret government and military programs.

A number of experts suggest the North's cybercapacity is heavily reliant on China, in terms of both training and the necessary software and hardware.

They say telecommunications giant China Unicom provides and maintains all Internet links with the North, and some estimate that thousands of North Korean hackers operate on Chinese soil.


According to South Korea's National Intelligence Service, more than 75,000 hacking attempts were made against South Korean government agencies between 2010 and September 2014 -- many of them believed to be from Pyongyang.

The Times interviewed a former North Korean army programmer who said the North began training computer "warriors" in earnest in 1996, despatching many to undergo two years' training in China and Russia.
 
.
This is how the big media machine works. There have already been several reports about the Sony hack being an inside job by an ex employee. However we keep seeing North Korea pounded over and over again in the media. This is nothing more than propaganda driven agenda. Now you have to ask yourself who do you believe, the FBI and NSA

Here is the deal with hacking. Every country in the world does it daily. We hack our allies and our enemies. Our allies and our enemies hack us. It sounds ridiculous but essentially we hack into their computers and activate the webcam to see what is going go. Mean while they are hacking into our system activating our webcam's to see what we are doing. We are aware it is happening just as they are aware. But the problem is proving who it is that is doing the hacking. Take china for example, they hack us and when we realize it. Their excuse? It was a group of criminals unaffiliated with the government and then they dare us to call them liars. Computer security is a complete myth. If your computer is connected to the internet it can be hacked. If it hasn't at this point (you most likely would never know)

Let me get this straight...usa hacked their systems years ago in order to warn them if they attempt to hack their systems. Anyone see the irony and humor here? Anyone believe that usa limited their hack to a warning? Oh sure...lmfao. It's so nice to see that every illegal thing they do is for a righteous reason.
 
. . .
Snowden Refuses to Use iPhone for Security Reasons
According to the Edward Snowden's lawyer, the whistleblower never uses an iPhone due to security issues, as iPhone has special software that can activate itself without the owner and gather information about him.
MOSCOW, January 19 (Sputnik) — Former US National Security Agency (NSA) contractor Edward Snowden never uses an iPhone as this device has software able to collect personal information regarding its owner, the whistleblower’s lawyer said Monday.

“Edward never uses an IPhone, he’s got a simple phone… The iPhone has special software that can activate itself without the owner, having to press a button and gather information about him, that’s why on security grounds he refused to have this phone,” Anatoly Kucherena told RIA Novosti.


Edward Snowden in Citizenfour (2014)

© East News/ CAP/FB

WikiLeaks Says Russia’s Security Service Never Tried to Recruit Snowden

Kucherena added that the decision on whether or not to use an iPhone is a matter of personal choice, but Snowden is approaching this issue from a professional standpoint.

The lawyer also added that on the whole, Snowden is satisfied with his life in Russia.

In June 2013, Edward Snowden leaked information about the extensive surveillance practices, conducted by the US Intelligence. He is wanted in the United States on a number of charges, including espionage and government property theft. On August 1, 2013, he was granted asylum and later a three-year residency permit by Russia.

Ex-CIA Employee Discloses US Secret Surveillance Programs / Sputnik International
 
. .

Pakistan Affairs Latest Posts

Country Latest Posts

Back
Top Bottom