Report: Hackers ‘Likely’ Compromised UK Energy Control Systems – Silicon UK

A warning reportedly sent by the NCSC warns of attacks on British energy firms, following last months hack of a US nuclear plant

The National Cyber Security Centre (NCSC), GCHQs computer security organisation, has acknowledged it is investigating a broad wave of attacks on organisations that have reportedly targeted companies in the British energy and manufacturing sectors.

Those attacks are likely to have compromised some industrial control systems in the UK, according to a warning reportedly sent out by NCSC, which hasnt been made public.

We are aware of reports of malicious cyber activity targeting the energy sector around the globe, the NCSC said in a statement. We are liaising with our counterparts to better understand the threat and continue to manage any risks to the UK.

The attacks are part of a broader campaign targeting energy companies in countries including the US, Ireland and Turkey, according to computer security firm FireEye.

While authorities in the US and the UK have stopped short of identifying who they suspect to be behind the hacking activity, a report over the weekend by The Times cited unnamed sources as attributing the attacks to a group backed by Russias GRU intelligence agency.

In its alert, the NCSC reportedly makes reference to a similar warning sent by the US government in Juneindicating attacks on more than a dozen energy companies, including at least one nuclear plant.

The US Department of Energy (DOE) acknowledged those attacks earlier this month but said only administrative systems, and not industrial control systems, had been targeted.

The NCSC alert says the attack infrastructure used indicates an unspecified state government.

The NCSC is aware of connections from multiple UK IP addresses to infrastructure associated with advanced state-sponsored hostile threat actors, who are known to target the energy and manufacturing sectors, reads a section of the message, according to a report by Motherboard.

Unlike the DOE, the NCSC reportedly warned that industrial control systems were involved in the British attacks.

Some of those control systems, including ones that may have remote access to critical infrastructure, are likely to have been successfully compromised, the NCSC reportedly warned.

NCSC believes that due to the use of wide-spread targeting by the attacker, a number of Industrial Control System engineering and services organisations are likely to have been compromised, the document states.

The wave of hacking activity began around 8 June and focuses on the engineering, industrial control and water sectors, in addition to energy companies, according to the NCSC document.

The attack infrastructure uses the SMB and HTTP protocols and the attacks appear to be aimed at trying to capture users passwords.

Like the US government warning, it suggests mitigations including the use of multi-factor authentication.

Motherboard didnt indicate who provided it with the message, but said it had verified the alerts authenticity with two other sources.

The US report, issued by the FBI and the Department of Homeland Security (DHS) to US businesses, said the hackers were using targeted malicious emails to deliver Word documents infected with malware.

The hackers reportedly obtained users credentials and attempted to map out their network drives.

FireEye analyst John Hultquist said earlier this month that the attacks on energy companies in the US, Ireland, Turkey and possibly other countries are believed to have been carried out by the same group.

The groups activities stretch back as far as 2015, with the latest campaign including watering hole attacks aimed at infecting computers used by electrical engineers and control systems operators, Hultquist said.

Security experts monitoring the wave of attacks said that although there was no indication they had created a serious risk, they were a warning of the increasing vulnerability of critical infrastructure due to the broad use of Internet-connected computer systems in the energy sector and elsewhere.

Security firm Sophos said recent incidents such as the Petya or NotPetya and WannaCry malware campaigns, both of which spread using an exploit called EternalBlue allegedly developed by the NSA, show how damaging infrastructure attacks could become.

As with Petya and WannaCry, the private worry about Nuclear 17 is that the unfolding EternalBlue leak of alleged NSA spying tools and vulnerabilities might be feeding attacks that are starting to manifest in all sorts of sectors, Sophos said in an advisory.

Nuclear 17 is the code name given to last months attempted intrusion at the Wolf Creek nuclear plant in Kansas.

One of the most serious infrastructure attacks to date occurred in December 2015 when an incident at a Ukraine power company left parts of western Ukraine, including regional capital Ivano-Frankivsk, without power.

Security experts later said that a sophisticated Trojan horse called Black Energy was used in the hack, with the Ukraine blaming the incident on Russia. Security firms have as yet made no direct link between that attack and the more recent hacking campaign.

Do you know all about security in 2017? Try our quiz!

Continue reading here:
Report: Hackers 'Likely' Compromised UK Energy Control Systems - Silicon UK

Data Center Security: How Cloud Services Keep Your Files Safe – Cloudwards

Cloud technology has changed the way we use computers, moving our software and data to the cloud instead of installed on our own devices. We worry less about our files knowing they are stored safely in a data center, encrypted and secure, spread across multiple drives for redundancy.

But what about the data centers themselves? Many people are concerned about privacy ever since Edward Snowden lifted the veil on NSA spying, let alone the threat of cybercrime, so how are cloud services protecting your data?

To answer that question, lets first take a look at what data centers are. You probably imagine a room full of computers and though thats not incorrect, its likely a little different than you might imagine.

Thats one of Googles many data centers. The company is very transparent when it comes to their data centers, revealing as much as they can without compromising security. They have such centers across the world to both ensure redundancy in the case of an outage and also to provide reliable connections to users irrespective of geographical location.

A data center is a centralized location for IT infrastructure, whether privately owned, for a companys internal IT needs, or whether it provides public services and infrastructure, such as Amazons Web Services. As you can imagine, centralizing all this equipment is risky without the proper precautions.

Data centers typically require at least the following to keep data safe:

Environmental controls: these are necessary to keep equipment cool, since a room full of high-powered technology generates an incredible amount of heat. Excess heat can lead to equipment failures and shorten the lifespan of server components.

Uninterruptible Power Supplies (UPS): in the event of a power outage, servers and other equipment must keep running to meet the data centers SLA, or service-level agreement. UPS units and backup generators can keep servers running until power is restored.

Security systems: to ensure the security and privacy of customers, data centers employ a wide range of security measures to prevent unauthorized access, including biometric access measures, locked server cages, surveillance systems, multiple forms of identification and some go so far as using mantraps a small room that connects an unsecured area to the secure data center.

Though those first two are worthy of their own respective articles, let us focus on security for now.

Though compiling a full list is practically impossible, these are the most common security measures you can find in any given secure data center.

One of the first lines of defense in any security plan is adequate surveillance. For starters, cameras installed around the perimeter of a data center are used to watch for suspicious activity. Inside, video surveillance acts as a record in the event of a security incident, while metal detectors ensure that hardware is not snuck into or out of the facility.

Most data centers will employ security guards inside the facility, but some such as Google and Apple have security guards that routinely patrol both the interior and exterior of their facilities.

Though it is unlikely that anyone will try and take a data center by storm, some companies arm their guards, further securing the premises.

Data centers are typically one of two styles depending on function and the needed security: single-purpose, or multipurpose. Multipurpose data centers are less secure, as they have other employees on site besides those responsible for the data center itself. They may contain adjacent offices for the business and arent usually used for sensitive data or infrastructure.

Secure data centers are built strictly for the purpose of housing IT infrastructure and are designed accordingly. Typically they are removed from the road, keeping a buffer zone around the site, including crash-proof barriers and security patrols.

Most do not have exterior windows and if they do they are typically made of bulletproof glass. Fire exits open strictly to the outside and there are a limited number of entry points, usually a front entrance and a loading area.

The interior is designed to separate the main data center area from any other rooms, such as a break room, entrance lobby or restrooms. Security increases the closer you get to the heart of the data center, requiring multiple forms of identification or access control.

Only authorized personnel should be allowed in these secured areas, where the servers, routers and other equipment live. To prevent unauthorized individuals from waltzing in and out with customer data or installing malicious hardware, data centers employ a wide array of access controls throughout a data center.

Google, for example, uses custom-designed electronic access cards and the closer you get to the data center floor the more sophisticated the authorization protocols get. The heart of the data center is only accessible via a security corridor that uses multifactor access control with badges and biometrics, with less than one percent of Google employees ever stepping foot inside the data center.

Mantraps are often employed to limit access to authorized individuals and prevent an criminals from tailgating, the practice of following someone closely to gain unauthorized entry to a secure area. Typically, a mantrap is a set of two doors with an airlock in the middle.

Both doors of a mantrap require authentication, such as a biometric lock or keycard, and only one door can open at a time. The area is kept under surveillance so that guards can identify any issues or stop someone from proceeding further.

Scales are used to measure visitors, and are sensitive enough to weigh someone and determine if someone leaving is heavier than they were upon entering, indicating they might be sneaking out stolen hardware. If the scale detects a difference, the door refuses to open and requires a security guard to bypass the locking mechanism.

For sensitive servers and equipment, separate rooms and cages or cabinets are used to segregate sensitive equipment from non-sensitive servers. Companies such as Iron Mountain allow customers to request CCTV cameras in the cage as well as custom fencing materials and other features, if needed.

This is just a few of the many countermeasures employed by data centers. Google goes so far as to build their own custom servers from the ground up, removing unnecessary hardware or features to reduce the attack surface. No one else has the servers that Google uses.

Other data centers may employ similar custom solutions, and dont disclose other security systems or countermeasures they employ to reduce the possibility of compromise. Security is, after all, serious business.

Hacking, malware and spyware are the obvious threats to your data, but few people stop to think of the physical aspect of IT security. Data centers take security to a whole new level. They are costly businesses to run and their entire purpose is to keep IT infrastructure up and running 24/7, secured from any and all possible threats.

Sign up for our newsletter to get the latest on new releases and more.

Now that you know the measures companies take to protect their servers, you can worry a little less about storing data in the cloud. The biggest weak spot in cloud computing is user errors, so take some time to learn how to create a strong password and learn how to encrypt your data, including texts and emails.

Thank you for reading and please let us know your thoughts in the comments below.

Originally posted here:
Data Center Security: How Cloud Services Keep Your Files Safe - Cloudwards

Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah – Salt Lake Tribune

Drake continued, "The new mantra to intercepting intelligence was 'just get it' regardless of the law."

Shameful.

It is becoming clear that such a lack of candor from our government officials has become a feature of our post-9/11 surveillance state, and not a bug. Perhaps the infringements of our freedoms necessitate an end to the entire post-9/11 project. But with the billion dollar Utah Data Center sitting right-smack in Salt Lake County, it's doubtful we could successfully kill the beast that is the surveillance industry.

Perhaps we, too, like Jonathan Swift, need "A Modest Proposal." It would be a shame to let the texts, emails, phone records and Google searches of Utah's most popular citizens go to waste. We paid for these records, let's make them public.

Just think, no one would need private investigators to catch husbands texting old girlfriends. You could easily recover your mom's old meatloaf recipe she emailed years ago.

And all those public officials who, when under investigation, manage to lose thousands of emails, as one-time IRS official Lois Lerner did. And former Utah Attorney General John Swallow, who just happened to leave his tablets on airplanes. Call up the NSA. Problem solved!

Think of the money newspapers and community watchdogs would save in GRAMA / FOIA requests. And how would life be different if police, prosecutors, legislators and other government officials knew their communications would be discoverable?

Deception begets deception, poison begets poison. The Fourth Amendment means what it says, and the government should not have power to spy on Americans without a warrant. In this current case, U.S. Department of Justice officials have until March to disclose relevant documents. Let's hope they can do so honestly.

Continue reading here:
Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah - Salt Lake Tribune

How Trump’s infuriating secrecy could backfire and lead to long-needed transparency reforms – Vox

Outside contributors' opinions and analysis of the most important issues in politics, science, and culture.

For people who care about good government, its been a bleak six months. Transparency has rarely been part of the ruling ethos in Washington, but secrecy has seldom been so en vogue. Information that politicians typically disclose tax returns, lists of White House visitors, draft legislation have disappeared. On-camera press briefings, presidential press conferences, answers to basic questions about administration positions these have dried up, too.

In both Congress and the White House, officials have violated transparency norms with such regularity, and so little pushback, that its a wonder those norms were effective as long as they were.

It may feel pointless to push for openness in a Washington that is so invested in secrecy. But there are reasons to be hopeful. Stonewalling by the Trump administration has already infuriated Congress. Why are you not answering these questions? Democratic Sen. Angus King barked in a testy exchange with Trumps NSA director, Adm. Michael Rogers, in a recent hearing probing whether President Donald Trump has tried to slow or stop the investigation into his administrations possible ties with Russia. What is classified about a conversation involving whether or not should you should intervene in the FBI investigation?

And Democrats arent the only ones fuming. Jason Chaffetz, a Republican congressman who built his career investigating the Obama administration, recently threw his hands up over obstructionism from the Trump White House. After years of hounding the Obama administration for information about various controversies (and pseudo-controversies), hed expected the Trump administration to be more open. In many ways, its almost worse, he said.

In the past, aggressive secrecy has led to a reformist backlash, triggering leaks, hearings, and ultimately government change. As Americans lost faith in their government in the 1960s and 1970s, they supported new legislation to ensure transparency, including the Freedom of Information Act and the Sunshine Law and to create ethical rules. How they did so can provide a roadmap to transparency advocates seeking to wrench open the window of reform today.

When people trusted government, secrecy flourished. The new national security state, formalized by the 1947 National Security Act, built up an intelligence regime that thrived on tightly held information. The press colluded with this secrecy in large ways and small, covering up illnesses and affairs, obsequiously deferring to government officials. Kennett Love, a reporter for the New York Times stationed in Iran during the 1953 coup, admitted that his bureau chief told him soon afterward that the CIA had helped to overthrow the democratically elected government in Tehran, but neither ever wrote about it.

Reporters and news executives didnt just keep state secrets in the 1950s and 1960s they collected them. At least 22 American news organizations employed journalists who reported to the CIA, like Austin Goodrich, a stringer at CBS News who was a journalist-spy, working undercover for the agency while filing reports about Scandinavia, including pieces on Soviet influence in the region.

In 1951, Harry Truman issued an executive order that created the system for classifying government information that exists to this day. It allowed the government to label information confidential, secret, or top secret, thereby creating an incentive to pull more and more information out of the public domain. Today, some 77 million documents are classified every year, although experts believe the majority of those documents should be available to the public.

But even by the late 1950s, some government officials worried that far too much information was being made secret.

The leader in that early fight for more transparency was Rep. John Moss, a California Democrat who entered office in 1953. Moss was particularly concerned about the way President Dwight D. Eisenhowers executive branch was refusing to answer questions from reporters, or even Congress

Moss, who sat on the Civil Service Committee, wanted to investigate charges made by Republicans that Harry Truman had turned a blind eye to the problem of subversive government employees. He wanted to dispel the innuendo, but when he asked for information from the Civil Service Commission, the agency denied his request. He was stunned. How could one part of the government deny a legitimate request for information from another part?

When John F. Kennedy was president, Moss was no less fierce in his criticisms about secrecy, arguing that Kennedy built on the practices the Eisenhower administration had pioneered. Early in the Kennedy administration, Moss challenged the restrictions placed on pool reporters during the Cuban Missile Crisis. A year later, frustrated with the practice of government officials claiming executive privilege in order to withhold information, he pressured Kennedy to issue a statement clarifying that only the president could invoke executive privilege. (Intelligence officials in the recent Russia investigation nearly reverted to the practice Moss complained about, refusing to answer questions about conversations with President Trump even as they stopped short of explicitly claiming executive privilege.)

The legislation that emerged from Mosss efforts, the Freedom of Information Act, met fierce opposition from federal agencies when it was proposed in 1966, but had strong backing from journalists and from Congress. The bill passed the House 307-0. It affirmed that any person had the right to request information and records from federal agencies, and that the agencies had to disclose that information. It was a powerful statement of the publics right to know: Anyone could ask, for any reason, and the burden was on the government to show cause for withholding information.

FOIA was the result of a 12-year fight against a system that Americans inherently trusted. As trust in government collapsed, journalists and activists began to wield it more aggressively especially after the law was amended in 1974 to give the act more teeth.

A government official used a FOIA request to gain access to summaries of FBI Director J. Edgar Hoovers secret files, which revealed that Hoover kept extensive records about the sex lives of prominent figures and government officials including himself (he tracked rumors that he was gay). The CIA quickly became a target of FOIA requests, and newspapers were soon thick with stories about the agencys often bizarre work.

A 1977 report revealed that the CIA had been pursuing mind-control efforts, with goals ranging from eliciting information to changing peoples sexual habits and desires. Thanks to FOIA, Americans began to learn details of CIA-backed coups in Latin America and the Middle East.

Two early-1970s revelations of government misdeeds in particular drove the modern push for more transparent government: news of domestic spying by intelligence agencies and the Watergate scandal.

In the 1960s, the NSA had launched Project Minaret, a program for monitoring, without a warrant, the communications of high-profile Americans like Martin Luther King Jr. and Muhammad Ali, as well as journalists and politicians. Another NSA program, Project Shamrock, scooped up every foreign telegram sent to the United States. Meanwhile, FBI and CIA agents were infiltrating the civil rights movement, the womens liberation movement, the anti-war movement.

Regimes of secrecy inevitably spring leaks, either because government workers feel important information is being withheld from the public (as when Daniel Ellsberg leaked the Pentagon Papers), or because they see corruption behind closed doors. That was what led Christopher Pyle, a former Army intelligence officer, to publish details of domestic surveillance in 1970.

Pyle penned an explosive expos for the Washington Monthly about the close monitoring of American activists by the Army. Domestic spying, he wrote, jeopardizes individual rights, democratic political processes, and even the national security it seeks to protect.

These revelations led Sen. Sam Ervin, an arch-segregationist and privacy crusader, to press for more details about the program. Frustrated by stonewalling from the Pentagon and the Nixon White House, Ervin decided to hold public hearings. They produced no dramatic disclosures, but they did inspire reporters like Seymour Hersh of the New York Times to start digging.

The result was Hershs groundbreaking, leak-filled story for the New York Times in December 1974, which detailed a massive, illegal domestic intelligence operation by the CIA, in direct violation of its charter (which restricts it to spying abroad).

Hershs article led to the Church Committee hearings, which laid bare abuses of power within the intelligence agencies including their targeting of groups like the Black Panthers, and anti-war activists. They also uncovered the CIAs role in assassination plots against foreign leaders, including efforts to kill Fidel Castro using poisoned cigars and exploding seashells.

And, in turn, the Church Committee hearings inspired institutional reforms: the creation of intelligence committees to provide congressional oversight over the FBI, CIA, and NSA , and the creation of courts through the Foreign Intelligence Surveillance Act to provide judicial oversight. (Intelligence officials are required to obtain warrants from FISA courts for any wiretaps or surveillance.)

In the wake of Watergate, Democrats swept the 1974 midterms, filling the Congress with new officeholders dubbed Watergate babies, who pushed hard for major open-records legislation: the expansion of FOIA, an Ethics in Government Act to require financial disclosures, and the Presidential Records Act to preserve all government documents. New laws checked the presidents war-making powers (in theory, at least) and empowered Congress and the courts to appoint special prosecutors.

No reform lasts forever. The FISA courts became rubber-stamp formalities and, after the September 11 attacks, intelligence agencies wrested back power. Intelligence agencies grew quickly the Defense Intelligence Agency went from 7,500 employees in 2002 to 16,500 by 2010. Meanwhile, President George W. Bush signed off on NSA spying without a warrant, sidestepped disclosure requirements, and authorized torture.

Again, the drift toward secrecy was bipartisan. The Obama administration aggressively prosecuted leakers and whistleblowers. It used the 1917 Espionage Act to prosecute government employees for leaking information to the media more than any administration since its passage. Journalists were caught up in these investigations as well.

And now the Trump administration appears intent on walling off as much information as possible, working assiduously to conceal the presidents visitors, his business and financial entanglements, and even details of executive orders and policies until they go into effect (like the travel ban, which is still being litigated).

Anti-secrecy reformers have been hard at work over the past decade or so, pushing for whistleblower protections (some of which they gained in the 2012 Whistleblower Protection Enhancement Act) and transparency laws while calling attention to the massive overclassification problem. And more and more Americans are coming to realize that norms like the decades-old tradition of presidents releasing their financial records arent worth much in the face of resistance.

Much of that current activism is happening at the state and local level, but ultimately federal reforms are required to crack the secrecy of the federal government. Now is the time to step up the public campaign against secrecy while also working out the nuts and bolts of reform legislation, so that when a new generation of Mar-a-Lago babies arrive in Washington, they will be able to move quickly to not only restore the norms that have been shredded in recent years, but to harden those norms into laws.

Nicole Hemmer, a Vox columnist, is the author of Messengers of the Right: Conservative Media and the Transformation of American Politics. She is an assistant professor at the University of Virginias Miller Center and co-host of the Past Present podcast.

The Big Idea is Voxs home for smart discussion of the most important issues and ideas in politics, science, and culture typically by outside contributors. If you have an idea for a piece, pitch us at thebigidea@vox.com.

See the article here:
How Trump's infuriating secrecy could backfire and lead to long-needed transparency reforms - Vox

A Tribute to Edward Snowden – BestVPN.com (blog)

21 June is Edward Snowdens 34th birthday. Here at BestVPN.com we think this is a great opportunity to re-examine who this self-depreciating, 34-year old all-American hero is, and what he did to make the world a better place.

Born in 1983 in North Carolina, Edward Joseph Snowden came from a family with a strong military and federal government background. He was fully expected to pursue the same path.

It therefore came as no surprise when, in 2004, following a brief period in which he dropped out of formal education, Snowden enlisted in the United States Army Reserve as a Special Forces candidate.

I wanted to fight in the Iraq war because I felt like I had an obligation as a human being to help free people from oppression.

This was not to be. After only five months of training, Snowden was discharged after breaking both his legs. It seems that during this time, however, Snowden became rather disillusioned with the military:

Most of the people training us seemed pumped up about killing Arabs, not helping anyone.

After leaving the army, Snowden served a short stint as security guard at a top-secret facility owned by the NSA. This required a very high security clearance, for which he underwent stringent background checks and passed a polygraph examination.

It was not long before Snowden was offered a job by the CIA, where he quickly established a reputation for being the go-to computer wizard, despite having no formal qualifications. In 2007 he was posted to Switzerland, where he was considered the top technical and cybersecurity expert.

Disturbed by the cynical nature of events he witnesses in Geneva, Snowden resigned from the CIA in 2009. According to a friend, he was already experiencing a crisis of conscience of sorts.

His history of working with spooky types, however, was far from over. Snowden accepted a job with Dell, managing government computer systems most notably the NSAs Hawaii regional operations center. It was during this time that Snowden started to collect evidence of unconstitutional mass surveillance by the US government.

The breaking point, however, came when Snowden watched the Director of National Intelligence, James Clapper, directly lie under oath to Congress. Snowden quit Dell and began working for Booz Allen Hamilton, a government-services company.

Still working at the NSAs Hawaii base, this provided Snowden the opportunity he was now actively seeking to collect evidence of the NSAs abuses of power.

During this period, Snowden claims to have raised his concerns at the scale of the NSAs surveillance program with superiors and colleagues. Although many expressed concern and dismay at what he told them, no-one was willing to take matter further.

In December 2012 Snowden made contact with Guardian journalist Glenn Greenwald. When Greenwald found the security measures demanded by Snowden too complicated to employ properly (notably PGP), Snowden also contacted Laura Poitras, a documentary filmmaker who had written an influential article on NSA whistleblower William Binney.

During early 2013, Snowden supplied Greenwald and Poitras with his store of documents. On 20 May he flew to Hong Kong in preparation for the publication of the first documents, on 5 June.

Snowden had hoped hiding out among refugees in Hong Kong would provide some protection against extradition back to the USA on treason charges. It soon because clear, however, that this position was untenable.

How Snowden ended up in Russia under the protection of Vladimir Putin remains somewhat unclear. It is thought that Russia agreed to help Snowden escape Hong Kong and reach asylum in Ecuador, via Moscow and Cuba.

It seems that under US pressure, Cuba changed its mind, and refused Snowden permission to land in Havana. Following a bizarre incident in which a plane carrying Bolivian president Evo Morales, who had been visiting Russia, was grounded when trying to pass through Europe, it became clear that Snowden was stuck in Russia.

Luckily for Snowden, Putin offered him refuge. He has been there ever since.

Nobody is exactly sure how many compromising documents Snowden obtained from the NSA, but Snowden says he examined every one of them to ensure they did not contain information that would compromise US security.

Current estimates claim that some 1.7 million documents were obtained. Important in his defense against treason charges after receiving asylum in Russia, Snowden insists that he had handed all documents over to reporters before fleeing Hawaii. This means that he had no information to hand over to Putin.

Edward Snowdens revelations showed the world the sheer scale of the United States NSA spying ambitions. It showed that the NSA is spying on just about everything everyone is doing online. Despite numerous Constitutional protections to the opposite, this includes US citizens.

The NSA used emergency legislation brought in following 9/11, plus numerous legal loopholes, to spy on just about everything every US citizen does online.

Its PRISM program co-opted the USAs tech giants into spying on their customers. This includes the likes of Microsoft, Apple, Google, Yahoo, and Facebook.

It performed bulk, warrantless, daily searches on telephone records belonging to US citizens, undermined international encryption standards that all internet users need to keep our data safe, monitored some 80%of the worlds internet traffic, infected thousands of computers with malware, and even resorted to extracting metadata from mobile apps such as Angry Birds.

The XKeyscore search and analysis tool provided a means to easily sort through this ocean of information in order to find almost anything done on the internet.

Snowden was prepared to lay down everything he had in order alert fellow Americans to such abuse of power. This makes him a hero. For a democracy to call itself such, there must be transparency. Citizens must know and understand what is being done in their name.

After all, if a government hides its actions from the people, then it cannot be accountable to them and a government that is not accountable is not democratic.

If a government acts against the best interest of its own citizens, should a moral individuals loyalty be to their government or their people? Snowden showed that he is both a very moral and very brave individual.

His revelations have, at the least, provided some transparency and provoked debate about the limits that can and should be placed on privacy in the nebulous name of national security.

Read more:
A Tribute to Edward Snowden - BestVPN.com (blog)

NSA spying scandal committee presents controversial final report – Deutsche Welle

More than three years of work went into the report presented by investigative committee chairman Patrick Sensburg to the Bundestag on Wednesday, but in the end, no one washappy with it.

The multi-party parliamentary investigation was sparked by the 2013 revelation by former National Security Agency contractor Edward Snowden that US intelligence services had kept allies under surveillance, even going so faras to eavesdrop on Chancellor Angela Merkel's mobile phone.

"It's not okay for friends to spy on one another," Merkel said in her most famous statement when the affair broke.

But investigators soon found out that Germany's foreign intelligence service, the BND, had cooperated with the NSA and also kept tabs on its allies , for instance, by using so-called selectors - search terms for dragnet surveillance. The investigation was soon expanded to include the question of whether the US had piloted drones used in combat from its bases in Germany - an accusation that was never proven, although the report found that the German government often "looked the other way."

The committee's report contains a head-spinning plethora of minutiae about everything fromthe technical specifications or capabilities of drones to various national and international intelligence operations. But it rarely reaches clear conclusions about what, if anything, was done wrong by whom. That was - as the report admits- down to fighting between political parties.

"Unfortunately, despite the common conviction of all parliamentary groups about the necessity of the investigation when it began, there were substantial disagreements between the governing and opposition groups about the methodology and goals of the committee's work," the report read.

The report was published by the governing coalition of the conservative CDU-CSU and Social Democrats alone, after a row last week about a 450-page dissent written by the opposition Left Party and the Greens. The chairman of the committee refused to publish that document, claiming it revealed classified information, whereupon the Left and Greens refused to sign off on the final version of the report as a wholeand were removed from the committee.

Read: German opposition criticizes BND's illegalespionage

A massive document of dissent

Although the report is critical of both the US and German governments on a number of topics, on the underlying question of whether the US essentially betrayed Germany's trust, it reaches many "surprisingly positive" conclusions.

For example, one such passage read: "The committee is of the opinion that despite all the difference concerning NSA spying in the past there is relatively large agreement about the rigor and establishment of intelligence service oversight by the parliaments in Germany and the US."

Opposition parties would like more oversight of the BND's actions

The opposition Left Party and Greens see the situation entirely differently. In a section that was included in the official report, the two parties make a series of extremely critical recommendations, including subjecting German intelligence services to increased external and parliamentary oversight, strengthening IT security and ending what they call "a secret war in, from and with Germany."

"Germany and facilities located in Germany are not permitted to play any role in drone warfare that violates international law," the opposition parties wrote. "The German government must immediately and forcefully insist that all actions of this sort cease and must monitor it."

"Unprecedented, unparliamentary behavior"

The opposition also criticizes the fact that Snowden, who currently lives in asylum in Russia, was never able to testify in front of the committee because the German government refused to guarantee him safe conduct. In a TV interview on Wednesday morning ahead of the Bundestag debate, Green parliamentarian Konstantin von Notz called Snowden's absence "a damning indictment."

The Left Party and the Greens say they are evaluating whether to legally challenge what Notz called the governing coalition's "unprecedented un-parliamentary behavior."

The committee only succeeded in "scraping free" a part of the "surveillance infrastructure," Notz complained to the Tagesspiegel newspaper.

Opposition committee members like Notz heavily criticized the findings

Members of the governing parties disagree with that assessment and accuse the opposition of trying to create a scandal in an election year.

"There are no indications that Germans were spied upon en masse," conservative committee chairman Sensburg that newspaper.

The Social Democrats' lead figureon the committee, Christian Flisek, accused the opposition of a "complete refusal" to cooperate. But he also aimed a barb at conservatives and Merkel.

"There was a system of the very top of the Chancellery of not wanting to know anything," Flisek told dpa news agency.

The verbal jousting over the NSA investigative committee report will continue as the Bundestag debates it on Wednesday evening.

In Berlin, the revelations that the NSA may have listened to Chancellor Merkel's cell phone have created a wave of protest. During the Cold War, American allies established an elaborate espionage system called Echelon to eavesdrop on communication activities in the Eastern Bloc. Back then the German government was aware of US-spying tactics from places like the Teufelsberg in Berlin.

Teufelsberg, or "Devil's Mountain," offered Americans an ideal vantage point over the divided city of Berlin. After World War II some 25 million tons of war rubble were heaped up in a forest on the edge of Berlin to form the city's largest hill at 120 meters. Underneath the debris lies a never completed Nazi military technical college. Today, all that's left of the spy station is a ruin.

After dumping the debris of some 15,000 war-damaged buildings onto the site, the Berlin government covered the hill in vegetation and turned it into a winter sports paradise. Shortly afterwards, the US military discovered the hill provided a perfect elevation point for monitoring flight paths to West Germany and radio and telephone networks in East Germany.

Part of Teufelsberg was turned into a military zone in October 1964 and the construction of the large listening station began. The project was only referred to as "The Hill" by American soldiers. Several secluded buildings as well as five powerful antenna domes were built. It is estimated that more than 1,000 people worked on the project at its busiest time.

The spy station was part of the global Echelon intelligence gathering network created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War. It was located in the British Sector, but the Brits and Americans didn't trust each other. So they split up the area in two, built everything twice and double-eavesdropped on their enemies.

Almost the entire Eastern Bloc was under surveillance, from the governing party in Eastern Germany to Soviet military facilities. Conversations in German, Czech, Polish and Russian were meticulously recorded, transcribed and translated. In a three-stage evaluation system only the most important information was forwarded. The surveillance reached up to 700 kilometers to the east.

After the fall of the Berlin Wall, the listening station was abandoned. In 1992, the Americans took their electronic devices and left the radar domes behind as empty shells. The site was used for civil air surveillance for a short time before being bought by private investors. Their plan was to build apartments and hotels on the hill, but nothing resulted from their preparations.

The abandoned spy station soon became a popular target for vandals. Now windows are broken, old computers smashed, the interior is in ruins and even old pipes were stolen to be sold as scrap. With rusty fences and weathered iron gates, it's clearly stated that visitors enter at their own risk. Holes in the ground, missing railings and unsecured stairwells do not make exploring the area any safer.

What was once a major building site for Nazis and then a surveillance center during the Cold War is now a popular spot for enjoying a view over the German capital and surroundings. Since 2011, the site has been open to the public. The Teufelsberg Community of Interest organizes an open-air electro festival on the premises. The only question left is whether the US is still watching.

Author: and photos: Anne-Sophie Brndlin

See original here:
NSA spying scandal committee presents controversial final report - Deutsche Welle

NSA warrantless surveillance (200107) – Wikipedia

The NSA warrantless surveillance controversy ("warrantless wiretapping") concerns surveillance of persons within the United States during the collection of allegedly foreign intelligence by the U.S. National Security Agency (NSA) as part of the touted war on terror. Under this program, referred to by the Bush administration as the terrorist surveillance program,[1] part of the broader President's Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. However, it has been discovered that all U.S. communications have been digitally cloned by government agencies, in apparent violation of unreasonable search and seizure.[citation needed]

Critics claim that the program was an effort to silence critics of the Bush Administration and its handling of several controversial issues during its tenure. Under public pressure, the Bush administration allegedly ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court.[2] Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has allegedly continued operating under the new FISA guidelines despite campaign promises to end warrantless wiretapping.[3] However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.[4]

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al-Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an "apparently accidental" "glitch" resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program remains secret, but the NSA was provided total, unsupervised access to all fiber-optic communications going between some of the nation's largest telecommunication companies' major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such "domestic" intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts were not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13]The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14]Bill Keller, the newspaper's former executive editor, had withheld the story from publication since before the 2004 Presidential Election, and the story that was ultimately published was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004. The delay drew criticism from some in the press, arguing that an earlier publication could have changed the election's outcome.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times.[16] The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.[17]

Gonzales said the program authorized warrantless intercepts where the government had "a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda" and that one party to the conversation was "outside of the United States."[18] The revelation raised immediate concern among elected officials, civil right activists, legal scholars and the public at large about the legality and constitutionality of the program and the potential for abuse. Since then, the controversy has expanded to include the press' role in exposing a classified program, the role and responsibility of the US Congress in its executive oversight function and the scope and extent of presidential powers under Article II of the Constitution.[19]

In mid-August 2007, a three-judge panel of the United States Court of Appeals for the Ninth Circuit heard arguments in two lawsuits challenging the surveillance program. The appeals were the first to reach the court after dozens of civil suits against the government and telecommunications companies over NSA surveillance were consolidated last year[when?] before the chief judge of the Northern District of California, Vaughn R. Walker. One of the cases is a class-action lawsuit against AT&T, focusing on allegations that the company provided the NSA with its customers' phone and Internet communications for a vast data-mining operation. Plaintiffs in the second case are the al-Haramain Foundation Islamic charity and two of its lawyers.[20][21]

On November 16, 2007, the three judgesM. Margaret McKeown, Michael Daly Hawkins, and Harry Pregersonissued a 27-page ruling that the charity, the Al-Haramain Islamic Foundation, could not introduce a key piece of evidence in its case because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret."[22][23]

In an August 14, 2007, question-and-answer session with the El Paso Times which was published on August 22, Director of National Intelligence Mike McConnell confirmed for the first time that the private sector helped the warrantless surveillance program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies".[24] Plaintiffs in the AT&T suit subsequently filed a motion with the court to have McConnell's acknowledgement admitted as evidence in their case.[25]

The program may face an additional legal challenge in the appeal of two Albany, New York, men convicted of criminal charges in an FBI anti-terror sting operation. Their lawyers say they have evidence the men were the subjects of NSA electronic surveillance, which was used to obtain their convictions but not made public at trial or made available in response to discovery requests by defense counsel at that time.[26]

In an unusual related legal development, on October 13, 2007, The Washington Post reported that Joseph P. Nacchio, the former CEO of Qwest Communications, is appealing an April 2007 conviction on 19 counts of insider trading by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified National Security Agency program that the company thought might be illegal. According to court documents unsealed in Denver in early October as part of Nacchio's appeal, the NSA approached Qwest about participating in a warrantless surveillance program more than six months before the Sep 11, 2001, attacks which have been cited by the government as the main impetus for its efforts. Nacchio is using the allegation to try to show why his stock sale should not have been considered improper.[27] According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11.[28]

On August 17, 2007, the Foreign Intelligence Surveillance Court said it would consider a request filed by the American Civil Liberties Union which asked the intelligence court to make public its recent, classified rulings on the scope of the government's wiretapping powers. Judge Colleen Kollar-Kotelly, presiding judge of the FISC, signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing."[29] The FISC ordered the government to respond on the issue by August 31, saying that anything involving classified material could be filed under court seal.[30][31] On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion with the court.[32]

In previous developments, the case ACLU v. NSA was dismissed on July 6, 2007 by the United States Court of Appeals for the Sixth Circuit.[33] The court did not rule on the spying program's legality. Instead, its 65-page opinion declared that the American Civil Liberties Union and the others who brought the case including academics, lawyers and journalists did not have the legal standing to sue because they could not demonstrate that they had been direct targets of the clandestine surveillance.[34] Detroit District Court judge Anna Diggs Taylor had originally ruled on August 17, 2006 that the program is illegal under FISA as well as unconstitutional under the First and Fourth amendments of the United States Constitution.[35][36][37]Judicial Watch, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case."[38] On February 19, 2008, the U.S. Supreme Court, without comment, turned down an appeal from the American Civil Liberties Union, letting stand the earlier decision dismissing the case.[39]

On September 28, 2006 the U.S. House of Representatives passed the Electronic Surveillance Modernization Act (H.R. 5825).[40] That bill now has been passed to the U.S. Senate, where three competing, mutually exclusive, billsthe Terrorist Surveillance Act of 2006 (S.2455) (the DeWine bill), the National Security Surveillance Act of 2006 (S.2455) (the Specter bill), and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) (the Specter-Feinstein bill) were themselves referred for debate to the full Senate by the Senate Judiciary Committee on September 13, 2006.[41] Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISA court oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).

On January 17, 2007, Attorney General Alberto Gonzales informed U.S. Senate leaders by letter that the program would not be reauthorized by the President.[2] "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.[42]

On September 18, 2008, the Electronic Frontier Foundation (EFF), an Internet-privacy advocacy group, filed a new lawsuit against the NSA, President George W. Bush, Vice President Dick Cheney, Cheney's chief of staff David Addington, former Attorney General and White House Counsel Alberto Gonzales and other government agencies and individuals who ordered or participated in the warrantless surveillance. They sued on behalf of AT&T customers to seek redress for what the EFF alleges to be an illegal, unconstitutional, and ongoing dragnet surveillance of their communications and communications records. An earlier, ongoing suit by the EFF may be bogged down by the recent changes to FISA provisions, but these are not expected to impact this new case.[43][44]

On January 23, 2009, the administration of President Barack Obama adopted the same position as his predecessor when it urged U.S. District Judge Vaughn Walker to set aside a ruling in Al-Haramain Islamic Foundation et al. v. Obama, et al.[45] The Obama administration also sided with the former administration in its legal defense of July 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the eavesdropping program, according to testimony by Attorney General Eric Holder.[46]

On March 31, 2010, Judge Vaughn R. Walker, chief judge of the Federal District Court in San Francisco, ruled that the National Security Agency's program of surveillance without warrants was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable to pay them damages.[47]

In 2012, the Ninth Circuit vacated the judgment against the United States and affirmed the district court's dismissal of the claim against Mueller.[48]

The Trailblazer Project, an NSA IT project that began in 2000, has also been linked to warrantless surveillance. It was chosen over ThinThread, which had included some privacy protections. Three ex-NSA staffers, William Binney, J. Kirke Wiebe, and Ed Loomis, all of whom had quit NSA over concerns about the legality of the agency's activities, teamed with Diane Roark, a staffer on the House Intelligence Committee, to ask the Inspector General to investigate. A major source for the IG report was Thomas Andrews Drake, an ex-Air Force senior NSA official with an expertise in computers. Siobhan Gorman of The Baltimore Sun published a series of articles about Trailblazer in 20062007.

The FBI agents investigating the 2005 The New York Times story eventually made their way to The Baltimore Sun story, and then to Binney, Wiebe, Loomis, Roark, and Drake. In 2007 armed FBI agents raided the houses of Roark, Binney, and Wiebe. Binney claimed they pointed guns at his head. Wiebe said it reminded him of the Soviet Union. None were charged with crimes except for Drake. In 2010 he was indicted under the Espionage Act of 1917, as part of Obama's unprecedented crackdown on leakers.[49][50] The charges against him were dropped in 2011 and he pleaded to a single misdemeanor.

The 1978 Foreign Intelligence Surveillance Act (FISA) regulates U.S. government agencies' carrying out of physical searches, and electronic surveillance, wherein a significant purpose is the gathering of foreign intelligence information. "Foreign intelligence information" is defined in 50 U.S.C.1801 as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power, sabotage or international terrorism. FISA defines a "foreign power" as a foreign government or any faction(s) of a foreign government not substantially composed of US persons, or any entity directed or controlled by a foreign government. FISA provides for both criminal and civil liability for intentional electronic surveillance under color of law except as authorized by statute.

FISA provides two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the Foreign Intelligence Surveillance Court (FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant for the electronic cameras if "there is probable cause to believe that the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. 1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. 1802(a)(1).[51]

Soon after the September 11, 2001 attacks U.S. President George W. Bush issued an executive order that authorized the National Security Agency (NSA) to conduct surveillance of certain telephone calls without obtaining a warrant from the FISC as stipulated by FISA (see 50 U.S.C.1802 50 U.S.C.1809 ). The complete details of the executive order are not known, but according to statements by the administration,[52] the authorization covers telephone calls originating overseas from or to a person suspected of having links to terrorist organizations such as al-Qaeda or its affiliates even when the other party to the call is within the US. The legality of surveillance involving US persons and extent of this authorization is at the core of this controversy which has steadily grown to include:

About a week after the 9/11 attacks, Congress passed the Authorization for Use of Military Force Against Terrorists (AUMF) which authorized the President to "use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons."

The administration has argued that the language used in the AUMF implicitly authorized the President to exercise those powers "incident to the waging of war", including the collection of enemy intelligence, FISA provisions notwithstanding.[8]

On January 20, 2006, Senator Patrick Leahy (D-VT), the ranking Democrat on the Senate Judiciary Committee along with lone co-sponsor Senator Ted Kennedy (D-MA) introduced S. Res. 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens."[55][56] This non-binding resolution died in the Senate without being brought up for debate or being voted upon.[57]

Because of its highly classified status, little is publicly known about the actual implementation of the NSA domestic electronic surveillance program. Mark Klein, a retired AT&T communications technician, submitted an affidavit including limited technical details known to him personally in support of a class-action lawsuit filed by the Electronic Frontier Foundation in federal district court in San Francisco in January 2006 on behalf of AT&T customers who alleged that they had been damaged by the telecommunications corporation's cooperation with the NSA. The lawsuit is called Hepting v. AT&T.[60][61]

A January 16, 2004 statement by Mr. Klein includes additional technical details regarding the secret 2003 construction of an NSA-operated monitoring facility in Room 641A of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which are occupied by AT&T.[62][63]

According to Klein's affidavit, the NSA-equipped room uses equipment built by Narus Corporation to intercept and analyze communications traffic, as well as perform data-mining functions.[64]

In an article appearing in the January/February 2008 issue of the Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on information contained in Klein's affidavits as well as those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the US Federal Communications Commission.[65] They concluded that the likely architecture of the system created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by government agents.[66]

Journalist Barton Gellman reported in the Washington Post that David Addington who was at that time legal counsel to former Vice President Dick Cheney was the author of the controlling legal and technical documents for the NSA surveillance program, typing the documents on a TEMPEST-shielded computer across from his desk in room 268 of the Eisenhower Executive Office Building and storing them in a vault in his office.[67][68][69]

The NSA surveillance controversy involves legal issues that fall into two broad disciplines: statutory interpretation and Constitutional law. Statutory interpretation is the process of interpreting and applying legislation to the facts of a given case. Constitutional law is the body of law that governs the interpretation of the United States Constitution and covers areas of law such as the relationship between the federal government and state governments, the rights of individuals, and other fundamental aspects of the application of government authority in the United States.[70]

However, there are analogies between the NSA Spying Scandal (20012007) and Hewlett-Packard spying scandal (2006)[71] that may ease to predict the court outcomes. HP, in order to find the leak source of its board strategic minutes revealed to press, employed several contractors to investigate the leak issue but without engaging any external legal firm and supervisory stakeholder. Contractors, under supervision of the HP's internal investigation team, confidentially used false pretense and social security numbers a spying technique namely Pretexting for obtaining phone records of suspicious board members and several journalists. Later on, the HP's surveillance extended beyond the board of directors leaking issue and became a conspiracy for interest of the probe initiators; through which it was claimed that the informational privacy rights of even innocent employees and directors of the board, who had nothing to do with the board leaks, were violated.

In October 2006, HP's chairwoman Patricia Dunn and HP's former chief ethics officer Kevin Hunsaker and several private investigators were charged for criminal cases under California Penal Code such as

All of these charges were dismissed.[72]

18 U.S.C.2511(2)(f) provides in relevant part that "the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in 50 U.S.C.1801(f) ... and the intercept of domestic [communications] may be conducted." The interpretation of this clause is central to the controversy because both sides agree that the NSA program operates outside of the procedural framework provided by FISA. The interpretive conflict arises because other provisions of FISA, including the criminal sanctions subpart 50 U.S.C.1809 include an "unless authorized by statute" provision, raising the issue of statutory ambiguity. The administration's position is that the AUMF is an authorizing statute which satisfies the FISA criteria.

The U.S. Supreme Court faced a similar issue in Hamdi v. Rumsfeld where the government claimed that the AUMF authorized the President to detain U.S. citizens designated as an enemy combatant despite its lack of specific language to that intent and notwithstanding the provisions of 18 U.S.C.4001(a) which requires that the United States government cannot detain an American citizen except by an act of Congress. In that case, the Court ruled:

[B]ecause we conclude that the Government's second assertion ["that 4001(a) is satisfied, because Hamdi is being detained "pursuant to an Act of Congress" [the AUMF] is correct, we do not address the first. In other words, for the reasons that follow, we conclude that the AUMF is explicit congressional authorization for the detention of individuals ... and that the AUMF satisfied 4001(a)'s requirement that a detention be "pursuant to an Act of Congress"

In Hamdan v. Rumsfeld however, the court rejected the government's argument that the AUMF implicitly authorized the President to establish military commissions in violation of the UCMJ. The opinion of the Court held:

Neither of these congressional Acts, [AUMF or ATC] however, expands the President's authority to convene military commissions. First, while we assume that the AUMF activated the President's war powers, see Hamdi v. Rumsfeld, 542 U.S. 507 (2004)) (plurality opinion), and that those powers include the authority to convene military commissions in appropriate circumstances, see id., at 518; Quirin, 317 U. S., at 2829; see also Yamashita, 327 U. S., at 11, there is nothing in the text or legislative history of the AUMF even hinting that Congress intended to expand or alter the authorization set forth in Article 21 of the UCMJ. Cf. Yerger, 8 Wall., at 105 ("Repeals by implication are not favored")

Determining when explicit congressional authorization is and is not required appears by this decision to require a court to first determine whether an implicit authorization would amount to a "repeal by implication" of the governing Act.

The exclusivity clause also raises a separation of powers issue. (See Constitutional law issues below)

The arguments against the legality of the NSA fall into two broad categories, those who argue that FISA raises no Constitutional issues and therefore the NSA program is illegal on its face [clarification needed]

Common to both of these views is the argument that the participation of "US persons" as defined in FISA 50 U.S.C.1801 renders the objectional intercepts "domestic" in nature.[73] Those advocating the "no constitutional issue" position, argue that Congress has the authority it needs to legislate in this area under Article I and the Fourth Amendment[74] while those who see a constitutional conflict[75] acknowledge that the existing delineation between Congressional and Executive authority in this area is not clear[76] but that Congress, in including the exclusivity clause in FISA, meant to carve out a legitimate role for itself in this arena.

The administration holds that an exception to the normal warrant requirements exists when the purpose of the surveillance is to prevent attack from a foreign threat. Such an exception has been upheld at the Circuit Court level when the target was a foreign agent residing abroad,[77][78] a foreign agent residing in the US,[79][80][81][82] and a US citizen abroad.[83] The warrantless exception was struck down when both the target and the threat was deemed domestic.[84] The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the US Supreme Court, but has occurred at least once, in the case of Aldrich Ames.[85]

The Administration's position with regard to statutory interpretation, as outlined in the DOJ whitepaper, is to avoid what it has termed the "difficult Constitutional questions" by

This argument, as outlined in the DOJ whitepaper, is based on the language of the AUMF, specifically, the acknowledgment of the President's Constitutional authority contained in the preamble; "Whereas, the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States", and the language in the resolution itself;

[Be it resolved] [t]hat the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.

The administration also adds that the program is legal under Title II of the USA PATRIOT Act entitled Enhanced Surveillance Procedures,[citation needed] although it is not relying upon the domestic law enforcement provisions of the PATRIOT Act for authorization of any of the NSA program activities.[citation needed] The President had said prior to this, that Americans' civil liberties were being protected and that purely domestic wiretapping was being conducted pursuant to warrants under applicable law, including the Patriot Act.[87]

These arguments must be compared to the language of the FISA itself, which states:

Notwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen calendar days following a declaration of war by the Congress.[88]

Because the law only authorizes the President to bypass the FISA court during the first 15 days of a war declared by Congress (see "Declaration of war"), the administration's argument rests on the assumption that the AUMF gave the President more power than was understood as absolutely implicit in any Congressional "declaration of war" at the time of the statute's enactment. However, as a "declaration of war by the Congress" encompasses all military actions so declared, no matter how small, brief or otherwise constrained by Congress, the above citation could be seen as setting not a default or typical level of Presidential wartime authority, but instead a presumptive minimum, which might more often than not be extended (explicitly or implicitly) by Congress's war declaration.

According to Peter J. Wallison, former White House Counsel to President Ronald Reagan: "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."[89] In regard to this program, a Gang of Eight (eight key members of Congress, thirteen in this case between the 107th and 109th Congressional Sessions) have been kept informed to some degree:

Under the National Security Act of 1947, 501503, codified as 50 USC 413-413b,[90] the President is required to keep Congressional intelligence committees "fully and currently" informed of U.S. intelligence activities, "consistent with ... protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." For covert actions, from which intelligence gathering activities are specifically excluded in 413b(e)(1), the President is specifically permitted to limit reporting to the so-called "Gang of Eight".[91]

The administration contends that with regard to the NSA surveillance program, the administration fulfilled its notification obligations by briefing key members of Congress (thirteen individuals in this case between the 107th and 109th Congressional sessions) have been briefed on the NSA program more than a dozen times[citation needed] but they were forbidden from sharing information about the program with other members or staff.[citation needed]

On January 18, 2006 the Congressional Research Service released a report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions".[92][93] That report found that "[b]ased upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, concluded there was no specific statutory basis for limiting briefings on the terrorist surveillance program to the Gang of Eight.[94] However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".[95]

Thus, although the specific statutory "Gang of Eight" notification procedure for covert action would not seem to apply to the NSA program, it is not clear if a limited notification procedure intended to protect sources and methods is expressly prohibited. Additionally, should the sources and methods exception apply it will require a factual determination as to whether it should apply to disclosure of the program itself or only to specific sensitive aspects.

The constitutional debate surrounding executive authorization of warrantless surveillance is principally about separation of powers ("checks and balances"). If, as discussed above, no "fair reading" of FISA can be found in satisfaction of the canon of avoidance, these issues will have to be decided at the appellate level, by United States courts of appeals. It should be noted that in such a separation of powers dispute, the burden of proof is placed upon the Congress to establish its supremacy in the matter: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.[citation needed]

Article I vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The U.S. Supreme Court has used the "necessary and proper" clause of Article I to affirm broad Congressional authority to legislate as it sees fit in the domestic arena[citation needed] but has limited its application in the arena of foreign affairs. In the landmark Curtiss-Wright decision, Justice Sutherland writes in his opinion of the Court:

The ["powers of the federal government in respect of foreign or external affairs and those in respect of domestic or internal affairs"] are different, both in respect of their origin and their nature. The broad statement that the federal government can exercise no powers except those specifically enumerated in the Constitution, and such implied powers as are necessary and proper to carry into effect the enumerated powers, is categorically true only in respect of our internal affairs.

Article II vests the President with power as "Commander in Chief of the Army and Navy of the United States," and requires that he "shall take Care that the Laws be faithfully executed".

The U.S. Supreme Court has historically used Article II to justify wide deference to the President in the arena of foreign affairs.[citation needed] Two historical and recent Supreme Court cases define the secret wiretapping by the NSA. Quoting again from the Curtiss-Wright decision:

It is important to bear in mind that we are here dealing not alone with an authority vested in the President by an exertion of legislative power, but with such an authority plus the very delicate, plenary and exclusive power of the President as the sole organ of the federal government in the field of international relationsa power which does not require as a basis for its exercise an act of Congress, but which, of course, like every other governmental power, must be exercised in subordination to the applicable provisions of the Constitution.

The extent of the President's power as Commander-in-Chief has never been fully defined, but two U.S. Supreme Court cases are considered seminal in this area:[96][97]Youngstown Sheet and Tube Co. v. Sawyer and Curtiss-Wright.

In addition, two relatively new cases, Hamdi v. Rumsfeld and Hamdan v. Rumsfeld, have clarified, and in the case of Hamdan limited, the scope of executive power to detain and try suspected terrorists as enemy combatants.

In Hamdan, the Court's opinion in footnote 23, rejected the notion that Congress is impotent to regulate the exercise of executive war powers:

Whether or not the President has independent power, absent congressional authorization, to convene military commissions, he may not disregard limitations that Congress has, in proper exercise of its own war powers, placed on his powers. See Youngstown Sheet & Tube Co. v. Sawyer, 343 U. S. 579, 637 (1952) (Jackson, J., concurring). The Government does not argue otherwise.

Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence, which in other rulings[citation needed] has been recognized as "fundamentally incident to the waging of war", is a historical point of contention between the Executive and Legislative branches.[8][98]

As noted in "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", published by The Congressional Research Service:

A review of the history of intelligence collection and its regulation by Congress suggests that the two political branches have never quite achieved a meeting of the minds regarding their respective powers. Presidents have long contended that the ability to conduct surveillance for intelligence purposes is a purely executive function, and have tended to make broad assertions of authority while resisting efforts on the part of Congress or the courts to impose restrictions. Congress has asserted itself with respect to domestic surveillance, but has largely left matters involving overseas surveillance to executive self-regulation, subject to congressional oversight and willingness to provide funds.

The same report makes clear the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such completely within their purview to regulate, and further that Congress may "tailor the President's use of an inherent constitutional power":

The passage of FISA and the inclusion of such exclusivity language reflects Congress's view of its authority to cabin the President's use of any inherent constitutional authority with respect to warrantless electronic surveillance to gather foreign intelligence.

The Senate Judiciary Committee articulated its view with respect to congressional power to tailor the President's use of an inherent constitutional power:

The Fourth Amendment to the United States Constitution is part of the Bill of Rights and helps guard against "unreasonable" searches and seizures by agents of the government. It is solely a right of the people that neither the Executive nor Legislative branch can lawfully abrogate, not even if acting in concert: no statute can make an unreasonable search reasonable, nor a reasonable search unreasonable.

The term "unreasonable" is deliberately imprecise but connotes the sense that there is a rational basis for the search and that it is not an excessive imposition upon the individual given the motivation for and circumstances of the search, and is in accordance with customary societal norms. It is conceived that a judge will be sufficiently distanced from the authorities seeking a warrant that they can render an impartial decision unaffected by any prejudices or improper motivations they (or the legislators who enacted a law they are seeking to enforce) may harbor.

An individual who believes their Fourth Amendment rights have been violated by an unreasonable search or seizure may file a civil suit for monetary compensation and seek a court-ordered end to a pattern or practice of such unlawful activities by government authorities, although the plaintiff will need to have evidence that such a wiretap is taking place in order to show standing (Amnesty International v. Clapper). Such civil rights violations are sometimes punishable by state or federal law. Evidence obtained in an unlawful search or seizure is generally inadmissible in a criminal trial.

The law countenances searches without warrant as "reasonable" in numerous circumstances, among them (see below): the persons, property, and papers of individuals crossing the border of the United States and those of paroled felons; in prisons, public schools and government offices; and of international mail. Although these are undertaken as a result of statute or Executive order, they should not be seen as deriving their legitimacy from these, rather, the Fourth Amendment explicitly allows reasonable searches, and the government has instituted some of these as public policy.

The Supreme Court held in Katz v. United States (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore the government must generally obtain a warrant before undertaking such domestic recordings.

The Supreme Court has also held in Smith v Maryland (1979) that citizens have no Fourth Amendment expectation of privacy in the business records (sometimes termed metadata) of their communications. This means that the court can subpoena data such as the numbers that an individual has phoned, when and, to a limited degree, where (subject to Jones v. United States) the phone conversation occurred, although a full judicial warrant would be required for the government to acquire or admit audio content from the telephone call. Under Section 215 of the PATRIOT act, the FBI can subpoena some or all such records from a business record holder using a warrant applied for in the Foreign Intelligence Surveillance Court.

The protection of "private conversations" has been held to apply only to conversations where the participants have not only manifested a desire but also a reasonable expectation that their conversation is indeed private and that no other party is listening in. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war.

The law also recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad.[99] In United States v. Verdugo-Urquidez, the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant would be required to engage in even physical searches of non-U.S. citizens abroad.

The U.S. Supreme Court has never ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. There have been, however, a number of Circuit Court rulings upholding the constitutionality of such warrantless searches.[100] In United States v. Bin Laden, the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States."[101] Assistant Attorney General William Moschella in his written response to questions from the House Judiciary Committee explained that in the administration's view, this unanimity of pre-FISA Circuit Court decisions vindicates their argument that warrantless foreign-intelligence surveillance authority existed prior to FISA and since, as these ruling indicate, that authority derives from the Executive's inherent Article II powers, they may not be encroached by statute.[102] In 2002, the United States Foreign Intelligence Surveillance Court of Review (Court of Review) met for the first time and issued an opinion (In re: Sealed Case No. 02-001) which seems to echo that view. They too noted all the Federal courts of appeal having looked at the issue had concluded that there was constitutional power for the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exits" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power." Professor Orin Kerr argues in rebuttal that the part of In re: Sealed Case No. 02-001 that dealt with FISA (rather than the Fourth Amendment) was nonbinding obiter dicta and that the argument does not restrict Congress's power to regulate the executive in general.[103]

Harold Koh, dean of Yale Law School, Suzanne Spaulding, former general counsel for the Intelligence Committees of the House and Senate, and former Counsel to the President John Dean, contend that FISA clearly makes the wiretapping illegal and subject to the criminal penalties of FISA,[104] (in seeming disagreement with the FISA Court of Review finding above) and that the president's own admissions already constitute sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence. Professor John C. Eastman, in his analysis, prepared at the behest of the House Judiciary Committee, comparing the CRS and DOJ reports, concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war."[105]

Orin S. Kerr, associate professor of law at The George Washington University Law School[106] and a leading scholar in the subjects of computer crime law and internet surveillance,[107] points to an analogy between the NSA intercepts and searches allowed by the Fourth Amendment under the border search exception.

The border search exception permits searches at the border of the United States "or its functional equivalent." (United States v. Montoya De Hernandez, 473 U.S. 531, 538 (1985)). The idea here is that the United States as a sovereign nation has a right to inspect stuff entering or exiting the country as a way of protecting its sovereign interests, and that the Fourth Amendment permits such searches. Courts have applied the border search exception in cases of PCs and computer hard drives; if you bring a computer into or out of the United States, the government can search your computer for contraband or other prohibited items at the airport or wherever you are entering or leaving the country. See, e.g., United States v. Ickes, 393 F.3d 501 (4th Cir. 2005) (Wilkinson, J.)...At the same time, I don't know of a rationale in the case law for treating data differently than physical storage devices. The case law on the border search exception is phrased in pretty broad language, so it seems at least plausible that a border search exception could apply to monitoring at an ISP or telephone provider as the "functional equivalent of the border," much like airports are the functional equivalent of the border in the case of international airline travel...the most persuasive case on point: United States v. Ramsey, [held] that the border search exception applies to all international postal mail, permitting all international postal mail to be searched.

Evidence gathered without warrant may raise significant Fourth Amendment issues which could preclude its use in a criminal trial. As a general rule of law, evidence obtained improperly without lawful authority, may not be used in a criminal prosecution.[citation needed] The U.S. Supreme Court has never addressed the constitutionality of warrantless searches (which has been broadly defined by the court to include surveillance) targeting foreign powers or their agents, the admissibility of such evidence in a criminal trial nor whether it is permissible to obtain or use evidence gathered without warrant against US persons acting as agents of a foreign power.[citation needed]

The National Security Act of 1947[108] requires Presidential findings for covert acts. SEC. 503. [50 U.S.C. 413b] (a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States."

On August 17, 2006, Judge Anna Diggs Taylor of the United States District Court for the Eastern District of Michigan ruled in ACLU v. NSA that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of [FISA or Title III]".[36] In her ruling,[109] she wrote:

The President of the United States, a creature of the same Constitution which gave us these Amendments, has indisputably violated the Fourth in failing to procure judicial orders as required by FISA, and accordingly has violated the First Amendment Rights of these Plaintiffs as well.

Even some legal experts who agreed with the outcome have criticized the reasoning set forth in the opinion.[110] Others have argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they chose to focus solely on arguments about standing and state secrets grounds).[111]

On October 4, 2006, a panel of the United States Court of Appeals for the Sixth Circuit unanimously ruled that the government can continue the program while it appeals the lower court decision.[112][113]

On July 6, 2007 the Sixth Circuit dismissed the case, finding that the plaintiffs had no standing.

The Court found that:[114]

[T]he plaintiffs do not and because of the State Secrets Doctrine cannot produce any evidence that any of their own communications have ever been intercepted by the NSA, under the TSP, or without warrants. Instead, they assert a mere belief, which they contend is reasonable and which they label a well founded belief,...

Implicit in each of the plaintiffs' alleged injuries is the underlying possibility which the plaintiffs label a "well founded belief" and seek to treat as a probability or even a certainty that the NSA is presently intercepting, or will eventually intercept, communications to or from one or more of these particular plaintiffs, and that such interception would be detrimental to the plaintiffs' clients, sources, or overseas contacts. This is the premise upon which the plaintiffs' entire theory is built.

But even though the plaintiffs' beliefs based on their superior knowledge of their contacts' activities may be reasonable, the alternative possibility remains that the NSA might not be intercepting, and might never actually intercept, any communication by any of the plaintiffs named in this lawsuit.

Corporate secrecy is also an issue. Wired reported: In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity."[115] However, Chief Judge Vaughn Walker stated, during the September 12, 2008 hearing in the class-action lawsuit filed by the EFF, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.

The majority of legal arguments supporting the NSA warrantless surveillance program have been based on the War Powers Resolution. There have not been any other noteworthy types of supporting legal arguments. The War Powers Resolution has been questioned as unconstitutional since its creation, and its adaptation to the NSA warrantless surveillance program has been questionable.

Visit link:
NSA warrantless surveillance (200107) - Wikipedia

Appeals Court Upholds Wikimedia’s Case Against NSA Spying Program – Bigger Law Firm Magazine

A three-judge appeals panel ruled unanimously to overturn an earlier dismissal of a major lawsuit against the NSAs internet data gathering activities.

On May 23, 2017, the Fourth Circuit Court of Appeals reversed a lower court dismissal in Wikimedia Foundation, et al. v. National Security Agency, et al. The suit alleges that the National Security Agencys Upstream surveillance program is in violation of the First and Fourth Amendments to the U.S. Constitution.

This marks an important step forward in Wikimedia Foundation v. NSA, and a victory for upholding the rights of privacy and free expression for Wikimedia users, the Wikimedia Foundation said in a press release. We stand ready to continue this fight.

The surveillance program known as Upstream was first revealed by rogue NSA analyst Edward Snowden in May, 2013. Under this program, the spy agency taps directly into the internets backbone at switching stations through which vast amounts of internet traffic are routed.

The lawsuit alleges NSAs Upstream surveillance system violates the First and Fourth Amendments to the U.S. Constitution. The Fourth Circuit ruled those allegations had legal standing sufficient to avoid dismissal.

To put it simply, Wikimedia has plausibly alleged that its communications travel all of the roads that a communication can take, and that the NSA seizes all of the communications along at least one of those roads, the judges wrote.Thus, at least at this stage of the litigation, Wikimedia has standing to sue for a violation of the Fourth Amendment. And, because Wikimedia has self-censored its speech and sometimes forgone electronic communications in response to Upstream surveillance, it also has standing to sue for a violation of the First Amendment."

Patrick Toomey, plaintiffs counsel at the ACLU, said the ruling means Upstream "will finally face badly needed scrutiny" in the courts.

The suit was filed in the United States District Court for the District of Maryland, the trial court covering the NSAs headquarters in Fort Meade, Maryland. That courts Judge T.S. Ellis III dismissed the suit in October, 2015, saying the plaintiffs argument relied on probabilities and suppositions.

The Fourth Circuit panel overruled Ellis, writing theres nothing speculative about it - the interception of Wikimedias communications is an actual injury that has already occurred.

The American Civil Liberties Union (ACLU) filed the lawsuit on behalf of the Wikimedia Foundation, owner of Wikipedia, and eight other plaintiffs including The Nation magazine and Amnesty International. However, those other plaintiffs did not survive the appeals court ruling; their dismissal was upheld on a 2-1 vote.

The NSAs authority for intelligence gathering under Upstream is derived from Section 702 of the FISA Amendments Act of 2008. This section also forms the legal basis for PRISM, an NSA program that dwarfs Upstream in the amount of data it gathers. PRISM collects data with the help of the largest internet companies in the world, including Google and Facebook.

Section 702 will expire in December 2017 unless reauthorized by Congress, and debate on the whether to continue the program is already underway, with the ACLU lobbying congress for significant reforms.

Clapper v. Amnesty International was the Supreme Court culmination of an earlier legal challenge to the FISA Amendments Act. Amnesty argued that it sustained an increase in the cost of securely communicating with its clients, who were ripe targets for government surveillance. The justices ruled 5-4 that these claims were based too much on speculation and on a predicted chain of events that might never occur.

That, however, was before the revelation of details of the FISA 702 surveillance program contained in documents leaked by Edward Snowden in 2013. Armed with those secrets of the inner workings of NSA surveillance, Wikimedia was able to demonstrate that its injury was clear and not speculative.

Read more:
Appeals Court Upholds Wikimedia's Case Against NSA Spying Program - Bigger Law Firm Magazine

A Big Change in NSA Spying Marks a Win for American …

Slide: 1 / of 1. Caption: Caption: The headquarters of the National Security Agency (NSA) in Fort Meade, Maryland.Jim Lo Scalzo/EPA/Redux

The charter of the National Security Agency limits its powerful surveillance to the rest of the world, not US citizens. But one controversial carve-out in NSA rules has for years allowed it to vacuum up communications that arent to or from a foreign target, but merely about oneno matter who sends or receives it. Now the NSA says it will end that practice. And in doing so, it concedes a significant win to the privacy advocates who have fought it for years.

The loophole the NSA is closing, as first reported by the New York Times, falls under the 702 provision of the Foreign Intelligence Surveillance Act. The NSAs interpretation of FISA allowed it to search the vast firehose of internet data that passed through its wiretaps of fiberoptic cables for certain selectors, or search terms, and collect that data if any part of the communication passed outside the USeven if one or both people communicating were in fact Americans.

NSA will no longer collect certain internet communications that merely mention a foreign intelligence target, reads a statement from the agency. Instead, NSA will limit such collection to internet communications that are sent directly to or from a foreign target.

Exactly why the NSA decided to end those about searches still isnt entirely clear. But privacy advocates are cautiously declaring a victory.

The problem of this kind of about searching is that it meant actually scanning the contents of every email to see if the messages contain the target selector, says Robyn Greene, policy counsel at the Open Technology Institute. That implicates foreign affairs, human rights activism abroad, international businesspeople, lawyers who work internationally and researchersStopping about collection is a huge boon to privacy for both Americans and individuals abroad.

For at least a decade, the NSA has interpreted FISA to allow it to collect so-called upstream data based on search terms that go beyond merely who send or received it. It also takes into account strings of information that might be included in the communications, like an email address, phone number, IP address, or the signature that identifies a certain piece of malware. In 2008, the Foreign Intelligence Surveillance Court, which serves as the judicial watchdog for the NSAs potential privacy violations, approved that legal interpretation in a classified ruling.

The practice has remained contentious. Privacy advocates argue that its unconstitutionally indiscriminate, violating Fourth Amendment protections from warrantless searches of US citizens. Any American communicating about a certain selector could have their communications caught in the NSAs dragnet if their communications simply pass through a foreign server, something they have little or no control over. This could just be two people talking something, or a reporter writing a certain email address. It really broadens the aperture for the collection of communications without a warrant, says Andrew Crocker, an attorney with digital rights group EFF. In our view, its been unconstitutional all along.

It also happens frequently. In 2011, for instance, the FISC revealed an estimate that about .2 percent were between Americans, amounting to tens of thousands of individual communications. The same year, it blocked the NSA from doing any upstream data collection for close to six months, though it never revealed why. In 2014, a report by the White Houses Privacy and Civil Liberties Oversight Board raised the issue of the broad, indiscriminate targeting of about searches once again.

That board also pointed to the problem exacerbated by so-called Multi-Communication Transactions: Due to the complexities of how data is packaged and moves around the internet, the NSAs filter pulled in entire bundles of digital communications despite many of the messages containing nothing to do with the target selector. You would have one message that met the conditions to trigger collection, and then whoops, they got everything else in the same package including totally domestic emails, says Julian Sanchez, a privacy-focused research fellow with the Cato Institute.

To deal with those inherent problems, the NSA at some point agreed to store the domestic communications it collected with special protections, and only grant access to analysts under certain, secret conditions. In its public statement, though, the NSA conceded to inadvertent compliance lapses, indicating that those special procedures failed. After reporting the violations to Congress and the FISC, the NSA decided to cease its about collection altogether, and even to delete older data collected under the practice.

Even though the Agency was legally allowed to retain such about information previously collected under Section 702, the NSA will delete the vast majority of its upstream internet data to further protect the privacy of US person communications, the NSA statement reads.

But while privacy advocates applaud that move, they also argue its not enough. Instead of leaving the decision to the NSAs discretion or secret court rulings, Congress should encode the rollback in law when it renews the Foreign Intelligence Surveillance Act later this year, says OTIs Robyn Greene. We need to codify an end to about collection in the law, says Green, This decision doesnt reduce that need for legislative reform, it highlights the need. In response to the NSAs statement, Senate Intelligence Committee member Ron Wyden said he intended to introduce that very legislation.

Privacy advocates now hope that the NSAs decision to stop the about searches might reduce the chance that Congress will seek to authorize the practice. This takes off the table one of the most controversial elements in the reauthorization debate, the EFFs Crocker says. Straightforwardly, thats a good thing.

Visit link:
A Big Change in NSA Spying Marks a Win for American ...

Mike Lee: NSA Spying Is ‘What Gov’t Does When Left Unrestrained’ – Fox News Insider

Senator Mike Lee (R-Utah) reacted to comments from Rep. Devin Nunes that the cases of 'unmaskings' during the Obama administration included information about civilians.

Nunes said there was a "treasure trove" of information about people other than Gen. Michael Flynn and Russian envoys.

"This is what governments do when left unrestrained," Lee said.

George Takei: Trump Is Like 'An Alien Life Form' Who Is 'Ignorant of History'

Trump Makes Special Trip to Graves of Iraq, Afghanistan War Soldiers

Oliver North: North Korean Missile Could 'Shut Down Hawaii For Decades'

He said he was troubled by the fact the Obama administration had enough power to cull information about everyday Americans.

"The government can use overwhelming force and power to engage in political espionage," he said.

Lee said legislators must follow the lead of Founding Father James Otis of Massachusetts, who warned against such activity.

"Otis was a big believer in that government will intrude into a man's house unless restricted," Lee said, calling for better oversight of spying activity.

'You Aren't Representing Me': Trump Supporter Confronts Maxine Waters

Cavuto: Trump Told 'Grumbling European Phonies' to Stop Being 'Deadbeats'

Shoving Match, Threats Explode in Texas Capitol Over Illegal Immigration

The rest is here:
Mike Lee: NSA Spying Is 'What Gov't Does When Left Unrestrained' - Fox News Insider