mykeystrokes.com

"Do or Do not. There is no try."

“Access Granted Vs Access Gained?”: Did Edward Snowden Overstate Claims On National Security Agency Leaks?

Security experts questioned Monday how, three years after Army Pfc. Bradley Manning downloaded a trove of secret material, low-level computer specialist Edward Snowden was able to copy documents that are far more sensitive and walk them out of his National Security Agency workplace in Hawaii.

After Manning released hundreds of thousands of classified documents — for which he is now being court-martialed — government officials vowed to curtail the broad access to intelligence that came into being after the Sept. 11 attacks. But Snowden appeared to have access to far more sensitive secrets, including the first order from the Foreign Intelligence Surveillance Court to be leaked in its 35-year history.

“I do think it raises questions about how good our controls are on our system,” said Stewart Baker, a former general counsel for the NSA. “Because anything that he was able to move to a thumb drive to exfiltrate could also be exfiltrated by Russian or Chinese hackers.”

Snowden is almost certainly facing serious charges related to espionage and the conveyance of national defense information, said a former senior FBI official who would not be quoted by name because of the sensitive subject matter.

The FBI is interviewing Snowden’s family members, as it would in any similar investigation, to “gain insight into his motivation and mind-set, to include communications, emails, phone calls, writings,” and also to determine whether he was communicating with a foreign power or had been recruited by an intelligence service, the former FBI official said. He said Snowden’s choice of Hong Kong as a refuge raises questions about possible cooperation with China.

After acquiring a government security clearance when he worked for the CIA, Snowden moved into a contractor job with his clearance still active. Most recently, before decamping for Hong Kong, he was working for government contractor Booz Allen Hamilton in Hawaii.

“The question that a lot of people are asking is why did the CIA grant him a clearance,” said a former senior government official who demanded anonymity because he was not authorized to speak about the case.

Snowden described himself to the Guardian newspaper in London, which first published details of a massive telephone-data collection program, as a computer systems administrator who performed technical rather than operational functions. His job, however, gave him access to a wide swath of secrets.

Baker pointed out that computer network maintenance jobs “are self-taught jobs in some respects, and the guy is clearly an impressive autodidact.”

But analysts said that Snowden seems to have greatly exaggerated the amount of information available to him and people like him.

Any NSA analyst “at any time can target anyone, any selector, anywhere,” Snowden told the Guardian. “I, sitting at my desk, certainly had the authorities to wiretap anyone from you or your accountant to a federal judge to even the president if I had a personal email.”

Robert Deitz, a former top lawyer at the NSA and CIA, called the claim a “complete and utter” falsehood.

“First of all it’s illegal,” he said. “There is enormous oversight. They have keystroke auditing. There are, from time to time, cases in which some analyst is [angry] at his ex-wife and looks at the wrong thing and he is caught and fired,” he said.

NSA analysts who have the authority to query databases of metadata such as phone records — or Internet content, such as emails, videos or chat logs — are subject to stringent internal supervision and also the external oversight of the foreign surveillance court, former NSA officials said.

“It’s actually very difficult to do your job,” said a former senior NSA operator, who also declined be quoted by name because of the sensitive nature of the case. “There are all these checks that don’t allow you to move agilely enough.”

For example, the former operator said, he had go through an arduous process to obtain FISA court permission to gather Internet data on a foreign nuclear weapons proliferator living abroad because some of the data was passing through U.S. wires.

“When he’s saying he could just put any phone number in and look at phone calls, it just doesn’t work that way,” he said. ” It’s absurd. There are technical limits, and then there are people who review these sorts of queries.”

He added, “Let’s say I have your email address. In order to get that approved, you would have to go through a number of wickets. Some technical, some human. An individual analyst can’t just say, ‘Oh, I found this email address or phone number.’ It’s not simple to do it on any level, even for purely foreign purposes.”

The former senior government official said that as a computer expert, Snowden could have gained access on the NSA computer network to some of the documents he purportedly leaked. But other documents he claims that he provided to the Guardian and the Washington Post, such as the FISA order, are in theory supposed to be kept more tightly held, he said.

One of the issues investigators will be examining is “what access was he granted and what access did he gain” himself in order to obtain the documents, the former official said.

 

By: Ken Dilanian and Barbara Demick, Los Angeles Times, Washington Bureau, June 10, 2013

June 14, 2013 Posted by | National Security | , , , , , , , | Leave a comment

“Traitor Or Hero”: He May Think So, But It Seems A Bit Early To Call Edward Snowden A Hero

The fact that former National Security Agency employee Edward Snowden decided to go public with his grievances against the U.S. government is certainly brave and bold.

People can and will accuse Snowden of many things. But no one will ever accuse him of not having the guts to stand up for what he believes.

Whether or not Snowden should be regarded as a “hero” for exposing what he believes is horrible intelligence gathering abuse by the U.S. government, however–as some are already suggesting he should be–remains to be seen.

Snowden has certainly made some startling claims about the scope of the U.S. intelligence and surveillance programs.

Most notably, Snowden claims that, as a 29 year-old security contractor, he had both the legal authority and the technological ability to “wiretap anyone — from you or your accountant, to a federal judge, to even the President.

If that’s true, that is indeed very startling.

Snowden also claims that the National Security Agency now intercepts and records almost all global communications, and that these recorded communications can be easily accessed:

“…the vast majority of human communications are automatically ingested [by the NSA] without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.”

Now, the NSA–or FBI, DOJ, or even your local police department–have always been able to get access to all of this information for U.S. citizens, provided they have a warrant from a judge allowing them to do so and provided you or your service providers have retained these records. But what seems new, based on Snowden’s description, is that the government is now maintaining its own records of all this information and, if I understand Snowden correctly, can now access and use any of it without a warrant.

If that’s true, it’s certainly worth asking whether we really want the government to be able to do that. It’s also worth asking whether the the government really does have the legal authority to do that–or whether it has gone way beyond what the lawmakers intended.

But, I, for one, would like some confirmation that what Snowden is saying is true before I denounce the government.

And some of the other things that Snowden has said have certainly made me wonder whether he isn’t just viewing all this from a perspective that mainstream Americans might consider, well, extreme.

Asked why he decided to leak classified information to the media, for example, Snowden said the following:

“I don’t want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.”

Asked whether surveillance might help deter or prevent terrorism, Snowden appeared to suggest that we shouldn’t pay so much attention to terrorism:

“We have to decide why terrorism is a new threat. There has always been terrorism. Boston was a criminal act. It was not about surveillance but good, old-fashioned police work. The police are very good at what they do.”

Asked whether he sees himself as “another Bradley Manning,” the U.S. Army private who sent a boatload of classified U.S. documents to Wikileaks, Snowden expressed nothing but admiration for Manning:

“Manning was a classic whistleblower. He was inspired by the public good.”

To address these statements in reverse order…

Bradley Manning may have been “inspired by” his own personal view of the “public good.” But, personally, I’m not convinced that what Bradley Manning did was actually good for the public. I don’t think it was terrible for the public. And it was certainly interesting to read some of those diplomatic communications. But I didn’t see anything in them that made me think they were so important that they were worth Manning breaking the law and risking a lifetime in jail to make them public.

(And, for what it’s worth, I do think that some things should be classified.)

I also confess that I am happy that there has not been another 9/11 since 9/11, and I wish the FBI had stopped the deranged Tsarnaev brothers before they allegedly killed four innocent people in Boston and maimed a few dozen others. I understand that the authorities will never be able to eliminate terrorism entirely, but I am glad that they’ve limited it as much as they have.

And, lastly, although I don’t relish the thought of having the government intercept and record all of my communications, I want to find out whether it’s actually true that the government is doing this before I freak out about it. Also, because I am not a terrorist, because this country has a well-developed legal system, and because I do not instinctively regard all government employees as evil power-hungry scumbags, I would also like to believe that, even if the government is recording all of my communications, this won’t necessarily wreck my life.

All of which is to say…

I’m not yet ready to pronounce Edward Snowden a “hero.”

I understand that he means well.

And I understand that he may think he’s a hero.

But he hasn’t persuaded me of that yet.

By: Henry Blodget, Business Insider, June 9, 2013

June 12, 2013 Posted by | National Security | , , , , , , | Leave a comment

“Non-Factual Facts”: Washington Post Hedges Claim That Google, Facebook, Gave The Government Direct Access To Their Servers

Yesterday, the Washington Post reported a shocking story about how the FBI and National Security Agency had partnered with Google, Facebook, and many other tech companies to spy on the tech companies’ hundreds of millions of users.

The government agencies, the Post said, were “tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.”

This surveillance program, the Post reported, had been “knowingly” facilitated by the tech companies, which had allowed the government to tap directly into their central servers.

The Post story described a “career intelligence officer” as being so horrified by the power and privacy intrusion of this surveillance system that the officer was helping to leak the news to expose it.

“They quite literally can watch your ideas form as you type,” the officer reportedly told the Post.

Not surprisingly, the Post’s story created an instant explosion of outrage. The ire was directed at both the government and the technology companies.

The story also led to immediate, explicit denials from the technology companies. Google, Facebook, and Yahoo all said that the government did not have “direct access” to any servers. Apple said it had never even heard of the program it was supposedly partnering with.

So The Post’s claim that the companies had voluntarily given the government direct, open, un-monitored access to their servers quickly seemed suspect.

And now, 24 hours later, after more denials and questions, the Post has made at least two important changes to its spying story.

First, the Post has eliminated the assertion that the technology companies “knowingly” participated in the government spying program.

Second, and more importantly, the Post has hedged its assertion that the companies have granted the government direct access to their servers.

The latter change is subtle, but important. In the first version of its story, the Post stated as a fact that the government had been given direct access to the companies’ servers.

Now, the Post attributes the claim to a government presentation–a document that has been subjected to significant scrutiny and skepticism over the past day and that, in this respect, at least, seems inaccurate.

In other words, the Post appears to have essentially retracted the most startling and important part of its story: That the country’s largest technology companies have voluntarily given the government direct access to their central servers so the government can spy on the tech companies’ users in real time.

Specifically, here’s how the Washington Post story has changed…

Here’s the original first paragraph:

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

Here’s the updated paragraph (our emphasis):

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

That change is important. The direct-access claim changes from a fact asserted by the Washington Post to a claim made in a document the Washington Post has seen–a document that might be wrong.

The idea that Google, Facebook, Apple, et al, had voluntarily given the government direct unfettered access to their servers always seemed far-fetched.

This behavior would justifiably trigger the wrath of the companies’ hundreds of millions of users worldwide and exacerbate already existing concerns that these companies routinely trample all over their users’ privacy.

Furthermore, the government’s assertions that its spying programs are directed primarily at foreigners, not US citizens, would not be viewed as comforting to Google, Facebook, et al.

Why not?

Because the vast majority of the users of these companies’ services are foreigners.

If the international users of Facebook, Google, et al, were to feel that the companies were opening their data centers in this way, the international users might revolt. So it’s hard to imagine that these companies would just voluntarily open their servers to the U.S. government (or, for that matter, any other government).

The Washington Post also broke the news about the existence of the vast government program Internet spying called PRISM, which other outlets have since confirmed. And the story illustrated how extensively the government uses Internet communications in its intelligence efforts and how important these communications are to national security.

But, a day after the Post story appeared, it seems likely that the following claims are wrong or at least need major qualification:

  • that the NSA and FBI are “tapping directly into the central servers” of Facebook, Google, et al, and,
  • that the government can “quite literally watch your ideas form as you type.”

 

By: Henry Blodget, Business Insider, June 7, 2013

June 9, 2013 Posted by | National Security | , , , , , , , , | Leave a comment

“Hidden In The Footnotes”: IRS Cases Included Organizations Of All Political Views

USA Today had an item today on the IRS controversy, which seemed to reinforce much of what we already know: conservative groups seeking tax-exempt status faced unfair and unreasonable scrutiny. But deep in the article, in the 18th paragraph, USA Today added seven unexpected words: “Some liberal groups did get additional scrutiny.”

They did? Actually, yes.

The Internal Revenue Service, under pressure after admitting it targeted anti-tax Tea Party groups for scrutiny in recent years, also had its eye on at least three Democratic-leaning organizations seeking nonprofit status.

One of those groups, Emerge America, saw its tax-exempt status denied, forcing it to disclose its donors and pay some taxes. None of the Republican groups have said their applications were rejected.

Progress Texas, another of the organizations, faced the same lines of questioning as the Tea Party groups from the same IRS office that issued letters to the Republican-friendly applicants. A third group, Clean Elections Texas, which supports public funding of campaigns, also received IRS inquiries.

In fact, it’s worth emphasizing that the IRS, which has acknowledged making mistakes in this area and offered an awkward apology for agency missteps, noted yesterday that the “organizations of all political views” were affected by the scrutiny.

This certainly seems relevant to the larger controversy, doesn’t it? Up until now, the story has been pretty straightforward: conservative groups were subjected to unfair treatment when applying for tax-exempt 501(c)4 status. The IRS must remain politically neutral at all times and the right was fully justified in complaining that the agency fell far short of this standard.

But if several liberal groups were subjected to the same treatment, it reinforces a larger, less-partisan arc to the story: the IRS struggled to enforce ambiguous tax laws and was beset by bureaucratic bungling. The ratios certainly matter — if only a handful of left-leaning groups faced tough scrutiny, while right-wing leaning groups fared far worse, that would point to a more systemic problem — but we don’t yet know that for sure.

It would appear, then, that what’s needed is a detailed accounting. The inspector general’s report filled in many of the blanks, and I suspect we’ll get a more thorough examination with the FBI looking into the case and congressional hearings on the way.

 

By: Steve Benen, The Maddow Blog, May 15, 2013

May 16, 2013 Posted by | Internal Revenue Service | , , , , , , , | Leave a comment

“A Ticket To Long Term Love”: The Liberal Media’s Gift To Mitch McConnell

After a recording of an opposition research strategy meeting was leaked to Mother Jones, Mitch McConnell is demanding that the FBI investigate the bugging of his office by the “political left.” This is silly. McConnell knows it’s silly. The meeting was almost certainly recorded by an attendee, not by “bugs” planted by liberal spies.

But the point isn’t really to catch the perpetrator. The point is this ridiculous splash on his campaign website, in which visitors are told that McConnell’s office was “wiretapped” by “liberals” and are encouraged to respond by sending all of their contact information, along with some money, to Mitch McConnell’s reelection campaign.

A good “victim of liberal persecution” story is a ticket to long-term love — and cash — in the persecution-fixated conservative movement. That’s why Fox hired Juan Williams and why people gave money to Michele Bachmann and Allen West. Mitch McConnell, who is among the least popular humans on the planet, especially in Kentucky, needs to get conservatives excited to support him, and a fantastical tale of wiretapping by leftist thugs will help.

He shouldn’t actually need this, though. The weird thing about Mitch McConnell is that he’s easily the best friend the conservative movement has in Washington, and yet the activist right-wing base hates him.

No one has done more to thwart Barack Obama than McConnell. But the CPAC rabble reserve their affection for loudmouthed clowns like Louie Gohmert, who has never accomplished anything. McConnell operates quietly, but more effectively than almost any other major conservative elected official in Washington. He is keeping liberal (or, more often, moderate) judges from being confirmed, he’s hobbling the Consumer Financial Protection Bureau and effectively stopping the National Labor Relations Board from carrying out its mandate. If Senate Republicans were led by a squishier, more moderate senator, one who actually took seriously the “tradition” and “civility” bullshit the chamber’s old men pretend to hold dear, they might not have been willing or able to carry out four straight years of delay and filibuster on every single piece of Senate business. Despite that, McConnell is derided as a squishy moderate. In fact, it’s only through McConnell’s considerable political skill that he’s managed to avoid a serious right-wing primary challenger.

That’s why McConnell needs this battle with “the political left.” His very bright campaign manager — Jesse Benton, whom you may know from the Rand Paul and Ron Paul campaigns — clearly knew that the smart move was to immediately hype the fact that The Liberals are Attacking Mitch McConnell. While Tea Party types distrust McConnell, they loathe all liberals. That’s why McConnell kept repeating that the “bugging” of his office was carried out by “the political left,” and that’s why he broadly attempted to associate that phrase — though not assign responsibility for the taping — to the Kentucky liberal group that recently made headlines for a racist attack on McConnell’s wife. (A racist attack that much of “the political left” criticized as racist.)

If you want proof that this is working, check out this column by the National Review’s Michael Walsh, a man who used to write under a pseudonym as a parody of Hollywood liberalism, and who now writes under his own name as a much funnier and more cutting (if unintentional) parody of hysterical right-wing ranting. Walsh is pleased that Sen. McConnell has recognized the essential truth of modern politics: That the Left is vicious and unrelenting.

Good to see that Senator Mitch McConnell has finally figured out what some of us have been shouting for years: The Left plays to win and they don’t much care how they do it. When they say, “by any means necessary,” they mean it.

He goes on:

As the Mother Jones story ripples through the rest of the compliant, complicit media, the takeaway won’t be the substance of the story, or lack of it. It will be: Those mean Republicans, blah, blah, blah. In other words, it’s not a story in the old journalistic sense. It’s a meme-reinforcer. And that’s how the Democrat-Media Complex plays the game; even a nothing-burger story like this can be used as a club with which to pound the opposition, with the ultimate goal of delegitimizing them completely.

The only people here exploiting the appetite of a portion of the political press for simplistic “memes” are the Mitch McConnell campaign, who know that easily riled-up dopes like Walsh will freak out in a grand style when presented with any excuse to.

Once the FBI has finished its investigation, McConnell should send David Corn a fruit basket.

By: Alex Pareene, Salon, April 10, 2013

April 13, 2013 Posted by | Politics | , , , , , , , , | 1 Comment