The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer

Total Page:16

File Type:pdf, Size:1020Kb

The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer (This is the first of three Guest Contributions by US-based Jim Farmer [biography, email jfx "AT" immagic "DOT" com]. Jim has contributed occasionally to Fortnightly Mailing over the years.) Several months after National Security Agency (NSA) documents were revealed by Edward Snowden, the impact on higher education remains unclear clear. Some differences between the explanations from the intelligence establishment and observations from the Washington “think tank” writers and scholars are emerging. On Friday, 6 September 2013 Guardian reporter James Ball and cryptology expert Bruce Schneier answered reader questions. Three questions are key to better understanding the extent of the public awareness of the intelligence community’s practices, and its likely impact. Here the responses of the Guardian are compared to those of the intelligence establishment and “think tank” scholars in recent Washington DC presentations. All presentations were scheduled before and held after Glenn Greenwald’s 5 June report about NSA’s collection of phone records. The answers provide some insight into the U.S. government’s position. The questions and answers Question 1. Reader SteppenHerring asked: How hard do you think it will be to get people to take security seriously when people are willing to type so much personal data into Facebook/Google+ etc? The Guardian’s James Ball answers: I think we need more awareness of privacy and security generally, and I think as generations grow up net-native (as today’s teens are), that’s taking care of itself. I don’t think people who volunteer information to a strictly-controlled network on Facebook (or webmail, etc) are automatically willing to share that same information with their governments. That’s a large part of what the whole privacy and security debate the NSA files are fuelling is about, I think. In Washington: From fm.schmo ller.net/2013/10/the-us-surveillance-state-part-1.html 16 October 2013 Robert C. Litt, General Counsel of the U.S. Office of the Director of National Intelligence (DNI) posed the same question in his presentation at the Brookings Institution on 19 July. His answer: And this leads me to what I consider to be the key question. Why is it that people are willing to expose large quantities of information to private parties, but don’t want the government to have that same information? Why, for example, don’t we care very much if the telephone company keeps records of all of our phone calls, but we feel very differently about the prospect of the same information going to NSA? This actually is not a very difficult question to answer. We care because of what the government could do with the information. Unlike a phone company, the government has the power to audit our tax returns, to prosecute and imprison us, to grant or deny licenses to do business, and many other things. And so, there’s an entirely understandable concern that the government might abuse this power. I don’t mean to say that private companies don’t also have a lot of power over us. Indeed, the growth of corporate privacy policies and the strong public reaction to the inadvertent release or commercial use of personal information by those companies reinforces my belief that our primary privacy concern today is less with who has information than what they can and do with it. But there is no question that the government, because of its powers, is properly viewed in a different light. A transcript of Litt’s full presentation is available here [PDF immagic.com/eLibrary/ARCHIVES/GENERAL/BROOK_US/B130719L.pdf]. It is surprising that Litt would suggest a citizen’s view of their data on social network sites was different from government intercept practices. This view contradicts other government statements. Litt’s reason for the difference was rarely included in subsequent press reports. Sceptical questions from the audience suggest the government’s legal interpretation was not judged to be credible by this Washington-based audience. Question 2. Reader dellcam asked: Your article states: “$250m-a-year US program works covertly with tech companies to insert weaknesses into products.” I don't see tech industry and their lobbyists rallying to put a stop to this. Won't this revelation -- that the US government is undermining the quality of their products damaging their reputation with consumers -- as well as affect the ability of the US tech industry to export their products around the world? The Guardian’s James Ball: I think this is a serious risk of what the NSA has been doing: if I ran a US security company, I’d be concerned about my reputation (maybe deservedly so, though) – and I’m From fm.schmo ller.net/2013/10/the-us-surveillance-state-part-1.html 16 October 2013 sure overseas competition will be stressing their ability to refuse US government requests in their advertising (though maybe their own government have similar programs). That does seem to have been a concern of the NSA and GCHQ. I find that quite telling: if companies are just doing what the government requires, and no more, why such a need for secrecy around it? Why can’t they level? I think the efforts some of the silicon valley firms seem to be making are a good start – though what seems to be happening with Lavabit (a secure email company that shut down) are concerning. Finally: this could be a boost to the free software / open source movement, too. That would be no bad thing. In Washington: More broadly to include cloud computing, David Castro, Senior Analyst, Information Technology and Innovation Foundation—sponsored in part by the technology industry—led a panel discussion of this question on 24 July. He summarized [PDF www2.itif.org/2013-cloud- computing-costs.pdf] the panel discussion thus: The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence Surveillance Act (FISA) and USA PATRIOT Act to obtain electronic data from third parties will likely have an immediate and lasting impact on the competitiveness of the U.S. cloud computing industry if foreign customers decide the risks of storing data with a U.S. company outweigh the benefits. Castro then estimates: Thus we might reasonably conclude that given current conditions U.S. cloud service providers stand to lose somewhere between 10 and 20 percent of the foreign market in the next few years. Using Castro’s 20%, the U.S. cloud computing industry stands to lose $22 to $35 billion over the next three years. Castro’s estimates were widely reported in the technology press. Because of the close relationship between NSA and GCHQ (UK Government Communications Headquarters), this will likely also affect British suppliers. Forrester analyst James Staten wrote that Castro should also have included U.S. customers that would bypass U.S. cloud providers for their international and overseas business and Non-U.S. cloud providers will lose as much as 20% because of other governments taking similar actions. Add it all up and you have a net loss for the service provider space of about $180 billion by 2016 which would be roughly a 25% decline in the overall IT services market by that final year, using From fm.schmo ller.net/2013/10/the-us-surveillance-state-part-1.html 16 October 2013 Forrester market estimates. All from the unveiling of a single kangaroo-court action called PRISM. (The PRISM program collects stored Internet communications based on demands made to Internet companies such as Google Inc. Currently a request for PRISM data does not require court approval; the decision is made by a NSA analyst.) This is certainly a scary picture even if business takes some action to ameliorate their losses. Separately the Cloud Security Alliance’s July survey - before the compromised hardware and software revelations - reported 10% of non-US residents responding had cancelled a project to use US-based cloud providers and 56% are less likely to use US-based cloud providers. 36% of US residents responding said the Snowden incident made it more difficult for their company to conduct business outside the US. 86% of the respondents believe the US’s Patriot Act should be repealed or modified to tighten oversight and to provide greater transparency. The world market for routers and switches is estimated to be US$ 81.4 billion in 2015. Using Castro’s 20%, this means a US$16.2 billion decrease in the market for U.S. firms. The European Market is 31.7% of the world market, that is, say, US$ 26 billion). Thus the increased sales from the U.S. market loss might be as much as US$5.1 billion for European countries. The revelation that NSA is building or paying for compromised hardware and software designs was reported in The Guardian on 5 September. In a Wired Magazine interview on 7 September David Castro said: This just further erodes the competitiveness of U.S. tech companies. In particular, I think this enlarges the scope of companies that will suffer backlash since cryptographic standards are often embedded in hardware. So the answer to dellcam’s question is yes, there will be a major, and growing, economic impact of the NSA revelations on the market for U.S. Internet software and hardware, with a similar gain for China, Russia and the EU. But US law prevents the manufacturers from admitting or denying their collaboration.
Recommended publications
  • How US and UK Spy Agencies Defeat Internet Privacy and Security James Ball , Julian Borger and Glenn Greenwald Theguardian.Com
    Revealed: how US and UK spy agencies defeat internet privacy and security James Ball , Julian Borger and Glenn Greenwald theguardian.com US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. This story has been reported in partnership between the New Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper York Times, the Guardian and Pempel/Reuters ProPublica based on documents obtained by the Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald 1. For the New York Times: Nicole Perlroth, Scott Shane For ProPublica: Jeff Larson Read the New York Times story here The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.
    [Show full text]
  • DEFENCE STRATEGIC COMMUNICATIONS the Official Journal of the NATO Strategic Communications Centre of Excellence
    Volume 3 | Autumn 2017 DEFENCE STRATEGIC COMMUNICATIONS The official journal of the NATO Strategic Communications Centre of Excellence Overwriting the City: Graffiti, Communication, and Urban Contestation in Athens Putting the Strategy Back into Strategic Communications Japanese Strategic Communication: Its Significance As a Political oolT ‘You Can Count On Us’: When Malian Diplomacy Stratcommed Uncle Sam Strategic Communications, Boko Haram, and Counter-Insurgency Fake News, Fake Wars, Fake Worlds Living Post-Truth Lives … But What Comes After? ‘We Have Met The Enemy And He Is Us’ Defence Strategic Communications | Volume 3 | Autumn 2017 1 ISSN 2500-9478 Defence Strategic Communications Editor-in-Chief Dr. Neville Bolt Managing Editor Linda Curika Editor Anna Reynolds Editorial Board Professor Mervyn Frost Professor Nicholas O’Shaughnessy Professor Žaneta Ozoliņa Professor J. Michael Waller Professor Natascha Zowislo-Grünewald Dr. Emma Louise Briant Dr. Nerijus Maliukevicius Dr. Agu Uudelepp Matt Armstrong Thomas Elkjer Nissen Defence Strategic Communications is an international peer-reviewed journal. The journal is a project of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for scholars, policy makers and practitioners around the world. It does not represent the opinions or policies of NATO or the NATO StratCom COE. The views presented in the following articles are those of the authors alone. © All rights reserved by the NATO StratCom COE. These articles may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE and the academic journal Defence Strategic Communications. NATO Strategic Communications Centre of Excellence Riga, Kalnciema iela 11b, Latvia LV1048 www.stratcomcoe.org Ph.: 0037167335463 [email protected] Living Post-Truth Lives … But What Comes After? 191 LIVING POST-TRUTH LIVES … BUT WHAT COMES AFTER? A review essay by Kevin Marsh Post-Truth: The New War on Truth and How to Fight Back Matthew D’Ancona.
    [Show full text]
  • IN the EUROPEAN COURT of HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS
    IN THE EUROPEAN COURT OF HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS ORGANIZATIONS AND OTHERS – v – THE UNITED KINGDOM THIRD PARTY INTERVENTION OF THE ELECTRONIC PRIVACY INFORMATION CENTER Introduction 1. The Electronic Privacy Information Center (“EPIC”) welcomes the opportunity to submit these written comments pursuant to leave granted on February 26, 2016, by the President of the First Section under Rule 44 §3 of the Rules of the Court. These submissions do not address the facts or merits of the applicants’ case. 2. EPIC is a public interest, non-profit research and educational organization based in Washington, D.C. 1 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues and to protect privacy, freedom of expression, and democratic values in the information age. EPIC routinely files amicus briefs in U.S. courts, pursues open government cases, defends consumer privacy, coordinates non- profit participation in international policy discussions, and advocates before legislative and judicial organizations about emerging privacy and civil liberties issues. EPIC is a leading privacy and freedom of information organization in the US with special expertise in government surveillance related legal matters. 3. The matter before the Court in 10 Human Rights Organizations and Others v. the United Kingdom impacts the human rights to privacy, data protection and freedom of expression of people around the world, which is reflected also by the variety of the applicants’ affiliations. The matter before the Court is an issue of broad international importance because it involves arrangements to transfer personal data between the United States and European countries.
    [Show full text]
  • On 26 September 2014, the NCP Asked Reprieve to Split Its Complaint
    Complaint to the UK National Contact Point under the Specific Instance Procedure of the OECD Guidelines for Multinational Enterprises: British Telecommunications plc 10 October 2014 Contents 1. Summary of Complaint 2. Introduction 3. BT Plays Key Role in Mass Surveillance by Intelligence Agencies 4. Mass Surveillance and Drone Strikes 5. Breaches of the OECD Guidelines 6. Objectives 7. Supporting documentation 1. Summary of Complaint 1.1. Reprieve submits that British Telecommunications plc (BT) has breached the OECD Guidelines by: • Facilitating the US drone programme by providing the Government Communications Headquarters (GCHQ) and the National Security Agency (NSA) with mass surveillance infrastructure. In exchange for tens of millions of pounds from these intelligence agencies, BT installs wiretaps on the United Kingdom’s telecommunication cables and operates compromised optical fibre networks to enable the mass surveillance of global internet and phone traffic. Intelligence agencies openly acknowledge they rely upon this type of data to choose targets for drone strikes. • Failing to provide evidence of due diligence mechanisms undertaken by the company to prevent the mass surveillance data from being used for targeting by unlawful US drone strikes in non-war zones. 1 2. Introduction 2.1. Reprieve is an international NGO that works to safeguard the human rights of people impacted by the counter-terrorism operations of the US and other governments. 2.2. BT is a major provider of global telecommunications networks and services in more than 170 countries. The company is headquartered at 81 Newgate Street, London EC1A 7AJ. 2.3. Reprieve brings this complaint on behalf of its clients Mohammed al-Qawli and Faisal bin Ali Jaber, who have both lost family members to drone strikes guided by analysis of mass surveillance data.
    [Show full text]
  • Making Or Breaking News?
    Making or breaking news? A paper considering the use of Twitter by journalists during the 2011 UK riots, completed for the Robert Bell Travelling Scholarship, University of Canterbury John Hartevelt BA (Hons) GradDipJ [email protected] March 2013 CONTENTS 1. INTRODUCTION - “An explosion of violence” - A turning point for Twitter in the UK media 2. TWITTER AS A NEWS GATHERING TOOL - Where news breaks - Finding eyewitnesses - Verifying content - Crowd sourcing - Who are these people? - Trend recognition 3. TWITTER AS A NEWS MEDIUM - Where people get their news - Mainstream media in the box-seat - User-generated content, re-packaged - What to tweet? - Tweeting with personality - A richer narrative - Safe tweeting 4. CONCLUSION - Part of the jigsaw - News gathering first, broadcast second 5. BIBLIOGRAPHY 1. INTRODUCTION “An explosion of violence” It was a quiet evening on the news desk at the Sunday Telegraph. Working his regular Saturday night late shift, then-reporter Michael Howie had his radar up for anything that might make a late run for tomorrow’s paper. Around 9pm, on August 6, 2011, the picture desk spotted something with potential. Howie recalls: There was a really grainy picture of a burning car on Twitter – it looked quite interesting … It was a terrible picture but I did a search on Twitter and I found a couple of references to things kicking off in Tottenham.1 There were many versions of the picture circulating on Twitter, including this one: charmskil Queen of Sheba New photo: Police car set ablaze during Tottenham, UK riot, via @teakay09 - http://yfrog.com/gzkholrj 08/06/2011 Reply Retweet Favorite It was not immediately apparent that this was a story of national significance that the Sunday Telegraph would make a great show of.
    [Show full text]
  • James Ball Investigative Journalist and Author Media Masters – January 24, 2019 Listen to the Podcast Online, Visit
    James Ball Investigative Journalist and Author Media Masters – January 24, 2019 Listen to the podcast online, visit www.mediamasters.fm Welcome to Media Masters, a series of one-to-one interviews with people at the top of the media game. Today I’m joined by James Ball, investigative journalist and author. Perhaps best known for his involvement in WikiLeaks, he has reported for a wealth of broadcast and print outlets including Channel 4, the BBC, Al Jazeera, ITN, the Guardian, BuzzFeed and the New European. In 2013, after two years on the Guardian’s investigations team, he became their data editor, and reported on the global surveillance scandal prompted by NSA whistleblower Edward Snowden. James has earned a number of accolades throughout his career, including a Pulitzer Prize and a Paul Foot Award. James, thank you for joining me. Thanks for having me. A Pulitzer Prize! That’s amazing. I’ve never won anything. Yes, I was... How do you win one? Well, you’ve got to move to America first! They’re a Bit picky like that. It was a big team of us that got it, but really it was for... But it was your insight, your general genius that was the killer? I think everyone would agree it was that, yes! But no, it was the nice easy matter of spending about 18 months of our lives going through the Edward Snowden files, so it was a doddle, really... Let’s go straight to that then. Tell us about those 18 months. How did the name Edward Snowden come on your radar? One minute you were sitting at a bus stop having never heard of him.
    [Show full text]
  • Two Years After Snowden
    TWO YEARS AFTER SNOWDEN PROTECTING HUMAN RIGHTS IN AN AGE OF MASS SURVEILLANCE (COVER IMAGE) A student works on a computer that is projecting former U.S. National Security Agency contractor Edward Snowden as he appears live via video during a world affairs conference in Toronto © REUTERS/Mark Blinch 2 TWO YEARS AFTER SNOWDEN JUNE 2015 © REUTERS/Zoran Milich © REUTERS/Zoran “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether.” Ben Emmerson QC, UN Special Rapporteur on counter-terrorism and human rights EXECUTIVE SUMMARY On 5 June 2013, a British newspaper, The exposed by the media based on files leaked by Guardian, published the first in a series Edward Snowden have included evidence that: of revelations about indiscriminate mass surveillance by the USA’s National Security Companies – including Facebook, Google Agency (NSA) and the UK’s Government and Microsoft – were forced to handover Communications Headquarters (GCHQ). their customers’ data under secret orders Edward Snowden, a whistleblower who had through the NSA’s Prism programme; worked with the NSA, provided concrete evidence of global communications the NSA recorded, stored and analysed surveillance programmes that monitor the metadata related to every single telephone internet and phone activity of hundreds call and text message transmitted in of millions of people across the world. Mexico, Kenya, and the Philippines; Governments can have legitimate reasons GCHQ and the NSA have co- for using communications surveillance, for opted some of the world’s largest example to combat crime or protect national telecommunications companies to tap security.
    [Show full text]
  • The Prospect of Extraditing Julian Assange
    NORTH CAROLINA JOURNAL OF INTERNATIONAL LAW Volume 37 Number 3 Article 7 Spring 2012 The Prospect of Extraditing Julian Assange Molly Thebes Follow this and additional works at: https://scholarship.law.unc.edu/ncilj Recommended Citation Molly Thebes, The Prospect of Extraditing Julian Assange, 37 N.C. J. INT'L L. 889 (2011). Available at: https://scholarship.law.unc.edu/ncilj/vol37/iss3/7 This Note is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of International Law by an authorized editor of Carolina Law Scholarship Repository. For more information, please contact [email protected]. The Prospect of Extraditing Julian Assange Cover Page Footnote International Law; Commercial Law; Law This note is available in North Carolina Journal of International Law: https://scholarship.law.unc.edu/ncilj/vol37/iss3/ 7 The Prospect of Extraditing Julian Assange Molly Thebes t I. Introduction .......................... ...... 889 II. Is Julian Assange a Journalist .......... ...... ......... 894 III. The Feasibility of Extraditing Journalists ....... ...... 898 A. Sweden ........................... ..... 899 B. Iceland.............903 1. Libel Tourism .................... ..... 904 2. Source Protection.. ................. ..... 906 3. Whistleblower Protections.....................907 4. International Effect of the Initiative ...... .... 908 5. Limitations of the Initiative .......... ...... 909 C. European Media Laws ................ ..... 911 IV. Conclusion............... ................. 913 I. Introduction The legal battle over the custody of Julian Assange has been well publicized in the media, with both Sweden and the United States vying for authority over the WikiLeaks founder and ex- computer hacker.' While the United States is seeking jurisdiction over Assange for his well-documented involvement in the unauthorized acquisition and dissemination of a quarter of a million diplomatic cables2 and tens of thousands of wartime tB.A.
    [Show full text]
  • Notes from No Place to Hide
    NOTES FROM NO PLACE TO HIDE BUY THE BOOK: E-BOOK GLENNGREENWALD.NET NOTES INTRODUCTION 3 the British government’s surreptitious opening of mail David Vincent, Th e Culture of Secrecy in Britain, 1832– 1998 (Oxford: Oxford University Press, 1998), 1– 14. 3 the US Bureau of Investigation Peter Conolly-Smith, “ ‘Reading Between the Lines’: Th e Bureau of Investigation, the United States Post Offi ce, and Domestic Surveillance During World War I,” Social Justice 36, no. 1 (2009): 7– 24. 4 the British and French empires Daniel Brückenhaus, “Every Stranger Must Be Suspected: Trust Relationships and the Surveillance of Anti- Colonialists in Early Twentieth- Century Western Eu rope,” Geschichte und Gesellschaft 36 (2010): 523– 66. 4 Syria’s Assad regime fl ew in employees Ben Elgin and Vernon Silver, “Syria Crackdown Gets Italy Firm’s Aid with U.S.- Europe Spy Gear,” Bloom- berg News, November 3, 2011. 4 Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, and Matt Bradley, “Mideast Uses Western Tools to Battle the Skype Rebel- lion,” Wall Street Journal, June 1, 2011. 4 “a wall of black refrigerator-size devices” Margaret Coker and Paul 020-58305_ch02_2P.indd 261 5/7/14 7:37 AM 262 NOTES Sonne, “Life Under the Gaze of Gadhafi ’s Spies,” Wall Street Journal, December 14, 2011; Paul Sonne and Margaret Coker, “Firms Aided Libyan Spies,” Wall Street Journal, August 30, 2011. 5 “Th e Internet in China” United States House of Representatives, “Th e Internet in China: A Tool for Freedom or Suppression?” 109th Cong., 2nd sess., February 15, 2006.
    [Show full text]
  • CDT Submission OHCHR Consultation on Privacy
    GOVERNMENT SURVEILLANCE AND THE RIGHT TO PRIVACY OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS CONSULTATION ON “THE RIGHT TO PRIVACY IN THE DIGITAL AGE” April 1, 2014 About the Center for Democracy & Technology The Center for Democracy & Technology (CDT) is a U.S.-based civil society organization that works globally to defend human rights and civil liberties online. We are dedicated to keeping the Internet open, innovative, and free, and we are committed to finding forward-looking and technically sound solutions to the medium’s most pressing challenges. For over 20 years, since the Internet’s infancy, CDT has played a leading role in shaping the policies, practices, and norms that have empowered individuals to more effectively use the Internet as speakers, entrepreneurs, and active citizens. CDT brings legal and technical expertise, thought leadership, and coalition-building skills to its work with domestic and global policy institutions, regulators, standards bodies, governance organizations, and courts. I. Overview of Recommendations CDT welcomes the opportunity to provide input for the United Nations High Commissioner for Human Rights’ report following General Assembly Resolution 68/167, “The right to privacy in the digital age.” This submission seeks to highlight specific technological and legal issues relevant to the right to privacy in the context of government surveillance. CDT emphasizes several key points to inform the High Commissioner’s report: ! Human Rights Council member states have affirmed that “the same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice."1 ! The right to privacy is, without question, implicated by government communications surveillance.
    [Show full text]
  • NSA and GCHQ Unlock Encryption Used to Protect Emails
    This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here • NSA and GCHQ unlock encryption used to protect emails, banking and medical records • $250m-a-year US program works covertly with tech companies to insert weaknesses into products • Security experts say programs 'undermine the fabric of the internet' Follow Julian Borger by email BETA James Ball, Julian Borger and Glenn Greenwald theguardian.com, Thursday 5 September 2013 15.00 EDT Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper Pempel/Reuters US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.
    [Show full text]
  • Secret Government Searches and Digital Civil Liberties
    Secret Government Searches and Digital Civil Liberties By Neil Richards* Perhaps surprisingly, the most compelling moment in Oliver Stone’s “Snowden” biopic is the sex scene. Halfway through this movie about government surveillance and whistleblowing, the audience is shown a graphic and seemingly gratuitous sexual encounter involving Edward Snowden (played by Joseph Gordon Levitt) and his girlfriend Lindsay Mills (played by Shailene Woodley). In the midst of their passion, Snowden’s eyes rest on Lindsay’s open laptop, the empty eye of its camera gazing towards them. In a flash, he recalls an earlier event in which NSA contractors hacked laptop cameras to secretly spy on surveillance subjects in real time. Edward and Lindsay’s mood was ruined, to say the least, by the prospect of government agents secretly watching their intimate activities. The scene evokes George Orwell’s famous warning about telescreens, the omnipresent surveillance devices in Big Brother’s Oceania, by which the Thought Police could secretly watch anyone at any time.1 It also has grounding in reality. The use of millions of hacked webcams as monitoring devices was a program known as “Optic Nerve,” which was part of the Snowden revelations.2 Another program leaked by Snowden involved the surveillance of the pornography preferences of jihadi radicalizers (including at least one “U.S. person”), with the intention being the exposure of their sexual fantasies to discredit them in the Muslim world.3 Snowden himself famously appeared on John Oliver’s HBO show “Last Week Tonight,” humorously but effectively reducing unchecked government surveillance to the basic proposition that secret surveillance allowed the government, among other things, to “get your dick pics.”4 * Thomas & Karole Green Professor of Law, Washington University School of Law; Affiliate Scholar, The Center for Internet and Society at Stanford Law School; Affiliated Fellow, Yale Information Society Project.
    [Show full text]