NSA spying program ended six months ago, maybe permanently …

The NSA spying program to analyze logs of the domestic calls and texts of US citizens is reportedly no longer in use, and the legislation which made it legal may not be renewed when it expires at the end of the year.

The National Security Agencys mass monitoring of logs of phone calls and texts relating to US citizens first began in 2006, some five years after the 9/11 attacks. The program was revealed by Edward Snowden in 2013, and was later declared illegal by a federal appeals court

Congress responded in 2015 by passing new legislation, the Freedom Act, to legalize a revised version of the program. Under the 2015 terms, carriers would not hand over phone logs en-masse to the NSA, but would retain the data and hand over specific records on receipt of a court order.

The New York Times reports that this latter program ended some six months ago. The claimwas made by a senior Republican congressional aide.

The agency has not used the system in months, and the Trump administration might not ask Congress to renew its legal authority, which is set to expire at the end of the year, according to the aide, Luke Murry, the House minority leaders national security adviser []

Security and privacy advocates have been gearing up for a legislative battle over whether to extend or revise the program and with what changes, if any.

Mr. Murry, who is an adviser for Representative Kevin McCarthy of California, raised doubts over the weekend about whether that debate will be necessary. His remarks came during a podcast for the national security website Lawfare.

Mr. Murry brought up the pending expiration of the Freedom Act, but then disclosed that the Trump administration hasnt actually been using it for the past six months.

Im actually not certain that the administration will want to start that back up, Mr. Murry said.

It was already known that the program has never prevented a terrorist attack, and the fact that it hasnt been used for some months means it would be hard to justify renewing the act, argues one civil liberties group.

The disclosure that the program has apparently been shut down for months changes the entire landscape of the debate, said Daniel Schuman, the policy director of Demand Progress, an advocacy group that focuses on civil liberties and government accountability.

Since the sky hasnt fallen without the program, he said, the intelligence community must make the case that reviving it is necessary if, indeed, the National Security Agency thinks it is worth the effort to keep trying to make it work.

The whole piece which also describes accidental collection of illegal data is an interesting read.

Photo: Shutterstock

Check out 9to5Mac on YouTube for more Apple news:

The rest is here:
NSA spying program ended six months ago, maybe permanently ...

Clapper: I Didnt Lie to Congress About NSA Spying I …

Tuesday on CNNs New Day, host John Berman asked former National Intelligence Director James Clapper aboutThe Intercepts Glenn Greenwald saying he lied to Congress about the NSA program used to spy on Americans phone records.

Clapper denied lying to Congress in 2013, explaining he simply just didnt understand the question he was asked.

[T]he original thought behind this, and this program was put in place as a direct result of 9/11, and the point was to be able to track quickly a foreign communicant talking to somebody in this country who may have been plotting a terrorist plot, and was put in place during the Bush administration for that reason. I always regarded it as kind of a safeguard or insurance policy so that if the need came up youd have this to refer to, Clapper told Berman.

As far as the comment, the allegation about my lying: I didnt lie, I made a big mistake and I just simply didnt understand what I was being asked about, he added. I thought of another surveillance program, Section 702 of the Foreign Intelligence Surveillance Act when I was being asked about Section 215 of the Patriot Act at the time. I just didnt understand that.

Follow Trent Baker on Twitter@MagnifiTrent

See the original post here:
Clapper: I Didnt Lie to Congress About NSA Spying I ...

Congress Reauthorizes NSA Spying on Americans American …

Despite cautions from members of both the House and Senate that spying by the NSA threatens Americans security and liberty, both houses of Congress reauthorized essentially unrestrained surveillance when they passed the FISA Amendments Reauthorization Act.

By Mark Anderson

Section 702 of the Foreign Surveillance Authorization Act (FISA) was reauthorized Jan. 18with a Senate vote of 65-34. Originally enacted in 2008, Section 702 provided the authorization for the warrantless surveillance program that allows the NSA to collect texts and emails of foreigners abroad without an individualized warrant, even when they communicate with Americans in the U.S., explains The Hill.

The Senate vote followed an affirmative 256-164 vote in the House on Jan. 11 reauthorizing the law with only minor changes. The House rejected new restrictions proposed by Rep.Justin Amash(R-Mich.) on how the information gathered can be used.

Section 702 was set to expire as 2017 ended but was temporarily extended into mid-January, as proponents claimed letting it lapse would take the nation backwards in time, to the pre-9/11 days, when surveillance shortcomings helped enable the 9/11 attacks. Senate Majority Leader Mitch McConnell (R-Ky.) said the ability to continue spying on Americans is essential to national security and told his colleagues, [W]e cannot let this capability lapse. The world remains dangerous.

Urging senators to slow down and consider the gravity of the issues at hand and to oppose reauthorization until we can have a real opportunity for debate and reform, on the other hand, Sen. Martin Heinrich(D-N.M.) argued, The American people deserve better than warrantless wiretapping.

Sen. Rand Paul (R-Ky.) expressed his intent to filibuster the Senate vote on Section 702 but was shut down by a 60-38 cloture vote Jan. 16 to end debate and prevent Paul from stalling the vote. An online account at libertarian Reason magazines website explains the cloture vote also prevent[ed] any amendments prior to a formal [up-or-down] vote on the FISA Amendments Reauthorization Act of 2017, as the bill is formally named.

The act renews and expands the snooping powers of Section 702 . . . for another six years, Reason continues. Though the law has the word foreign in its name, the reality is that it has been used to collect and access communications from Americans, often without warrants and without our knowledge.

Sens. Paul and Ron Wyden (D-Ore.) led a bipartisan group of senators who tried to amend the bill so that it would require the FBI and National Security Agency (NSA) to get warrants in order to query or access any communications records (like emails or phone calls) from American citizens when [Americans] get drawn into international surveillance, Reason notes.

Thus, a populist-style impulse entered the fray when Paul stepped forward to oppose Section 702 on principle. This is the kind of bipartisan cooperation that could, if sufficiently focused on essential goals such as turning away from the endless war on terror, foil the pro-Zionist war-on-terror stratagem espoused by the neoconservatives that long ago hijacked the conservative movement and placed them in strategic positions to carry forth such a war.

This bill doesnt just renew Section 702 for six years, Reason added. It also codifies permission for the FBI to access and use data secretly collected from Americans for a host of domestic federal crimes that have nothing to do with protecting America from foreign threats.

Furthermore, what are known as about searchesaccessing communications that merely reference a foreign target, not just communications to and from that targetare revived under the reauthorization. These types of searches were said to have been voluntarily ended by the NSA when it became clear that communications were being accessed outside of federal authority. Yet, reauthorization restarts these probes unless Congress acts separately to curtail them.

Arguing in favor of renewing Section 702, an editorial by the Heritage Foundations Hans von Spakovsky published at the neoconservative FoxNews.com states: It is a violation of the law [under Section 702] to collect information from targets inside the U.S.whether they are Americans or foreignersor to deliberately target the online communications of American citizens.

But in an official news release, Sen. Paul noted that due to a backdoor loophole, the bill does nothing for the thousands of Americans whose private communications are searched without a warrant every year, including those who are not even the subject of an investigation.

A dear colleague letter from Sens. Paul, Wyden, Mike Lee (R-Utah), and Patrick Leahy (D-Vt.) adds: The so-called warrant requirement reform in the bill applies only to criminal suspects, and then only to the governments access to their information at the final stage of an investigation, a situation that, according to the most recent annual data from the Director of National Intelligence, has occurred once. This means that the bill actually treats those suspected of a crime better than innocent Americans.

Sadly, these warnings went unheeded as both chambers of Congress voted to reauthorize essentially unrestrained NSA spying and all Americans Fourth Amendment liberties were further deteriorated.

Mark Anderson is a longtime newsman now working as the roving editor for AFP. Email him at [emailprotected]

Continue reading here:
Congress Reauthorizes NSA Spying on Americans American ...

European officials lash out at new NSA spying report – CBS …

Updated 4:24 p.m. ET

BERLINA top German official accused the United States on Sunday of using "Cold War" methods against its allies, after a German magazine cited secret intelligence documents to claim that U.S. spies bugged European Union offices.

Justice Minister Sabine Leutheusser-Schnarrenberger was responding to a report by German news weekly Der Spiegel, which claimed that the U.S. National Security Agency eavesdropped on EU offices in Washington, New York and Brussels. The magazine cited classified U.S. documents taken by former NSA contractor Edward Snowden that it said it had partly seen.

"If the media reports are accurate, then this recalls the methods used by enemies during the Cold War," Leutheusser-Schnarrenberger said in a statement to The Associated Press.

"It is beyond comprehension that our friends in the United States see Europeans as enemies," she said, calling for an "immediate and comprehensive" response from the U.S. government to the claims.

Other European officials demanded an explanation from the U.S.

"I am deeply worried and shocked about the allegations," European Parliament President Martin Schulz said in a statement, according to CNN. "If the allegations prove to be true, it would be an extremely serious matter which will have a severe impact on EU-US relations. On behalf of the European Parliament, I demand full clarification and require further information speedily from the U.S. authorities with regard to these allegations."

The revelations come at a particularly sensitive time for U.S.-E.U. relations, as long-awaited talks about a new trade pact are scheduled to begin next week. It is unclear how the latest report on NSA spying are going to affect them, but the trade pact has been a centerpiece of the Obama administrations diplomatic efforts in Europe for some time.

According to Der Spiegel, the NSA planted bugs in the EU's diplomatic offices in Washington and infiltrated the building's computer network. Similar measures were taken at the EU's mission to the United Nations in New York, the magazine said.

Der Spiegel didn't publish the alleged NSA documents it cited or say how it obtained access to them. But one of the report's authors is Laura Poitras, an award-winning documentary filmmaker who interviewed Snowden while he was holed up in Hong Kong.

The magazine also didn't specify how it learned of the NSA's alleged eavesdropping efforts at a key EU office in Brussels. There, the NSA used secure facilities at NATO headquarters nearby to dial into telephone maintenance systems that would have allowed it to intercept senior EU officials' calls and Internet traffic, Der Spiegel report said.

Germany was allegedly the focus of the European spying, according to The Guardian, categorising Washington's key European ally alongside China, Iraq or Saudi Arabia in the intensity of the electronic snooping.

During a trip through Europe two weeks ago, President Obama assured an audience in Germany that America is not indiscriminately "rifling" through the emails of ordinary European citizens, describing the National Security Agency's surveillance programs as a "circumscribed" system that has averted threats in America, Germany, and elsewhere.

Leutheusser-Schnarrenberger urged EU Commission President Jose Manuel Barroso to take personal responsibility for investigating the allegations.

In Washington, a statement from the national intelligence director's office said U.S. officials planned to respond to the concerns with their EU counterparts and through diplomatic channels with specific nations.

However, "as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations," the statement concluded. It did not provide further details.

NSA Director Keith Alexander last week said the government stopped gathering U.S. citizens' Internet data in 2011. But the NSA programs that sweep up foreigners' data through U.S. servers to pin down potential threats to Americans from abroad continue.

Speaking on CBS' "Face the Nation," former NSA and CIA Director Mike Hayden downplayed the European outrage over the programs, saying they "should look first and find out what their own governments are doing." But Hayden said the Obama administration should try to head off public criticism by being more open about the top-secret programs so that "people know exactly what it is we are doing in this balance between privacy and security."

"The more they know, the more comfortable they will feel," Hayden said. "Frankly, I think we ought to be doing a bit more to explain what it is we're doing, why, and the very tight safeguards under which we're operating."

Hayden also defended a secretive U.S. court that weighs whether to allow the government to seize the Internet and phone records from private companies. The Foreign Intelligence Surveillance Court is made up of federal judges but does not consider objections from defense attorneys in considering the government's request for records.

Read this article:
European officials lash out at new NSA spying report - CBS ...

Huawei: U.S. Is Afraid We Will Stop NSA Spying — It Has …

When it comes to high-stakes national security brinksmanship, its clear that attack is the best form of defense. At the Mobile World Congress event in Barcelona this week, Huaweis rotating chairman Guo Ping used his keynote speech on Tuesday to remind the world about the U.S.s own cybersecurity controversies, referencing the U.S. National Security Agencys internet collection program exposed in 2013.

This has all the hallmarks of a carefully orchestrated line of defense that has been in the works for some time and its a very good one.

The World Of Glass Houses

The PRISM program was initiated under the Patriot Act in 2001 and expanded under the Foreign Intelligence Surveillance Act in 2006 and 2007. The program enabled NSA to collect data from U.S. internet companies including Microsoft, Google and Apple, when permitted by the Foreign Intelligence Surveillance Court.

PRISM, PRISM, on the wall, who is the most trustworthy of them all? Guo asked his MWC audience. If you dont understand that, you can go ask Edward Snowden.

And so onto stage two. In an article written for Wednesdays Financial Times, Guo suggested that the reason the U.S. is so determined to cast national security aspersions on Huawei and encourage its international allies to follow suit has nothing to do with expanding Beijings intelligence collection reach and everything to do with limiting Washingtons.

The Snowden leaks, Guo wrote, shone a light on how the NSAs leaders were seeking to collect it all - every electronic communication sent, or phone call made, by everyone in the world, every day.

Taking The Fight To Europe

That Huawei chose MWC to launch this line of attack on Washington is not a surprise. There was significant unease around the world when the extent of U.S. electronic eavesdropping was exposed and this plays directly to that, as a very brazen look whos talking.

Clearly the more Huawei gear is installed in the worlds telecommunications networks, wrote Gou, the harder it becomes for NSA to collect it all.

The statements coming from Huawei and its leadership have reassured that the company will never assist other countries in gathering intelligence. In other words: we wont do as were asked by Beijing, just as we wont do as were asked by Washington or anyone else either; were not the threat, were the defense, and thats the real truth behind Washingtons lobbying against us.

Huawei, Guo Ping wrote, hampers U.S. efforts to spy on whomever it wants.

China Accuses The U.S. Of Protectionism

This is the first reason for the campaign against us, according to Guo. The second reason has to do with 5G. And here Huawei has found an unlikely ally President Donald Trump.

"I want 5G, and even 6G, technology in the United States as soon as possible, the President tweeted last week. It is far more powerful, faster, and smarter than the current standard. American companies must step up their efforts, or get left behind. There is no reason that we should be lagging behind on something that is so obviously the future. I want the United States to win through competition, not by blocking out currently more advanced technologies. We must always be the leader in everything we do, especially when it comes to the very exciting world of technology!

Immediately afterward, Guo responded enthusiastically: I have noticed the Presidents Twitter, he said that the U.S. needs faster and smarter 5G, or even 6G in the future, and he has realized that the U.S. is lagging behind in this respect, and I think his message is clear and correct."

Guo has progressed this argument in his FTarticle: America also directly benefits if it can quash a company that curtails its digital dominance. Hobbling a leader in 5G technology would erode the economic and social benefits that would otherwise accrue the countries that roll it out early.

The battleground between Washington and Huawei had already shifted to Europe ahead of MWC. Despite the European Union citing caution and the U.K. publicly questioning the level of security within Huawei equipment, there remains no tangible evidence of compromises and accusations are limited to forward-looking threat mitigation. The European carriers fear that a prohibition on Huawei will set their 5G rollouts back several years and will result in them not having access to the markets best-performing networking equipment.

The fusillade being directed at Huawei, Guo has now written, is the direct result of Washingtons realization that the U.S. has fallen behind in developing a strategically important technology.

Trump On The Fence?

This has raised the question as to what extent Trump truly ascribes to the hawkish views of Mike Pompeo and Mike Pence, per their recent thinly veiled threats to European allies that U.S. collaboration will be switched off if they include Huawei in their networks. The much talked about executive order banning Huawei from the U.S. was not signed in time for MWC, despite reports. Are there cracks not yet publicly visible in the U.S. stance against Huawei? Is this now a card to be played in the high-stakes trade game playing out with Beijing? And will Huaweis return to the U.S., under stringent security controls, be a card that Beijing plays to give the President the China trade win he so badly wants?

Trump has said a deal is very close, and some analysts are now expressing serious fearsthat the agreement will be too weak, highlighted byan apparent disagreement between the President andTrade Representative Robert Lighthizer. If the stance on Huawei is softened to secure a deal, that will inevitably be portrayedas a major volte-face.

The reality is that 5G and the IoT built on itsexponential increase in networking capacity will be a major economic driver for a generation or more.Accenture estimates that IoT could add $14trillion to the global economy by 2030throughthe biggest driver of productivity and growth in the next decade, accelerating the reinvention of sectors that account for almost two-thirds of world output. Speak to telecoms industry insiders, especially the networks, and they will wax lyrical about Huaweis innovation and technical lead. The industry excepting Huaweis competitors do not want to see the company excluded.

Nick Read, CEO of Vodafone, the U.K.s leading carrier, told reporters at MWC on Monday that we need to have a fact-based risk-assessed review. People are saying things at the moment that are not grounded, Im not saying that is the case for the U.S. because I have not met them directly myself, so I have not seen what evidence they have, but they clearly need to present that evidence to the right bodies throughout Europe.

The longer this war of rhetoric and lobbying has continued, the more it has started to shift in Huaweis favor, even setting the U.S. against the rest of the Five Eyes. Australia and New Zealand had been relatively forthright in excluding Huawei but may soften their stance if theyre seen to be out of step internationally. The U.K. will be a major litmus test when its security report is published in a few weeks' time.

The global campaign against Huawei has little to do with security, according to Guo, and everything to do with Americas desire to suppress a rising technological competitor.

MWC was always going to be a heightened battleground between Huawei and Washington. The U.S. sent representatives from the Departments of Defense, State and Commerce to lobby against the company. But for Huawei, MWC is home turf. Their brand dominates. U.S. officials and lobbyists were always going to struggle to take their battle to the industry on foreign soil, especially without the unveiling of any concrete evidence against the company.

In parallel with MWC this week, eleven U.S. senators wrote to Energy Secretary Rick Perry and Homeland Security Secretary Kirstjen Nielsen, noting that "Congress recently acted to block Huawei from our telecommunications equipment market due to concerns with the companys links to Chinas intelligence services," and urged "similar action to protect critical U.S. electrical systems and infrastructure."

This again relates to IoT and the race to deliver connectivity across a wide range of industries. The U.S. doesnt want Chinese networking equipment driving its industrial infrastructurefor many reasons, and security is just one of them.

Your Move, Washington

For all the rhetoric, the challenge for the U.S. is the lack of tangible evidence of Huawei collecting intelligence for Beijing, despite their allegedconflict of interest. There has now been so much Huawei-related news that it is losing its impact. The world is starting to view the accusations more cynically. Germany and Italy appear to be wavering, and even the U.K is equivocating.

"Its a hugely complex strategic challenge which will span the next few decades, probably our whole professional lives," Jeremy Fleming,the head of U.K. intelligence agency GCHQ said this week. "How we deal with it will be crucial for prosperity and security way beyond 5G contracts. The U.K.'s Huawei Cyber Security Evaluation Centre (HCSEC), which has said that cyber threats from the equipment manufacturer can be "mitigated", sits within GCHQ.

For Huawei, this latest move is its best, turning defense into attack, hitting the U.S. where it is most vulnerablewith the combined accusations of offensive cyber and protectionism. Huawei CEO and Founder Ren Zhengfei told the BBC last week that "there's no way the U.S. can crush us. If the lights go out in the West, the East will still shine. And if the North goes dark, there is still the South... America doesn't represent the world."

And now Guo has raised the stakes much further, signing off his FT article by saying that if the US can keep Huawei out of the worlds 5G networks by portraying us as a security threat, it can retain its ability to spy on whomever it wants.

This gets more interesting by the day.

Read more:
Huawei: U.S. Is Afraid We Will Stop NSA Spying -- It Has ...

Obama Justifies NSA Spying: Paul Revere Did It First

Argues US has always defended freedom through surveillance

Steve WatsonInfowars.comJanuary 17, 2014

In a speech that was billed as an announcement of reforms to the NSAs mass spying practices, the president argued that the US has a long history of defending liberty by conducting surveillance. Obama even cited Paul Revere, in remarks clearly designed to justify government spying on its own citizens.

#Obama's justification for #NSA spying: "but Paul Revere did it first!"

Paul Weiskel (@PWeiskel08) January 17, 2014

To virtually no ones surprise, the presidents reforms will not stop NSAs mass spying, and this was immediately evident in the opening remarks of Obamas speech when he attempted to argue that in times of war, the US has always used surveillance to secure freedom.

At the dawn of our Republic, a small, secret surveillance committee borne out of the The Sons of Liberty was established in Boston. Obama stated. The groups members included Paul Revere, and at night they would patrol the streets, reporting back any signs that the British were preparing raids against Americas early Patriots.

Note how in the first sentence, using incredibly Orwellian tactics, Obama has twisted the facts to link spying to patriotism, and to suggest that the earliest American icons were engaged in the same sort of activity as todays NSA.

Obama then went on to cite the Civil War, World War II, and the Cold War, arguing that Throughout American history, intelligence has helped secure our country and our freedoms.

Anyone with any shred of intelligence knows that comparing the actions of Paul Revere, who famously alerted the Colonial militia to the approach of British forces before the battles of Lexington and Concord, is in no way comparable to NSA mass spying.

Was Paul Revere covertly spying on his own people? Was he collecting records of all their communications, even if they were completely innocent and not suspected of doing any wrong? Of course not, to argue so is completely asinine.

Senator Rand Paul immediately took to the airwaves on CNN to challenge Obamas characterization of Paul Revere as a proto-spy:

Paul Revere was warning us that the British were coming. He wasnt warning us that the Americans were coming. Paul noted.

The Washington Post also hilariously pointed out in a blog post that if the British Redcoats had access to the type of metadata and processing power the NSA does today, Revere probably would have been caught before he could go on his legendary midnight ride. Indeed, Revere would have been outed as a terrorist.

Speaking of terrorists, it was only a matter of minutes before the president invoked 9/11 in his speech, following pre-determined NSA talking points in order to further justify the unconstitutional practices of the NSA.

The horror of September 11 brought these issues to the fore. Across the political spectrum, Americans recognized that we had to adapt to a world in which a bomb could be built in a basement, and our electric grid could be shut down by operators an ocean away. said Obama.

Obama then argued, in the face of independent studies that suggest otherwise, that the NSA spying has prevented multiple attacks and saved innocent lives not just here in the United States, but around the globe as well.

He also argued, in the face of analysis by privacy and constitutional experts, that there have been no abuses connected to the NSA mass spying program.

Nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens. said Obama.

Obama: review found no evidence of phone records database being abused. Didn't they read FISA court rulings? http://t.co/P46Js5wW5q

Stuart Millar (@stuartmillar159) January 17, 2014

The President announced that he is appointing one of his own insiders, John Podesta, to oversee a comprehensive review of big data and privacy. Podesta also happens to be the head of the White House front group the Center for American Progress, which as noted by SourceWatch has strong ties with the Common Purpose Project, an effort to create message discipline among the pro-Obama organizations, with a direct tie to the White House.

Anyone who believes that John Podesta, also a former Clinton Chief of Staff, will deliver an impartial opinion during this review of big data and privacy should take into account that the Center for American Progress, as admitted by director Jennifer Palmieri, is focused purely around driving the White Houses message and agenda.

Obama announced that several more reviews of the NSAs practices would be taking place, leading critics to assert that reviews do not equate to actions or concrete reforms.

Reviews on reviews on reviews. You'd be forgiven for wondering if Obama has been president for 5 years.

Spencer Ackerman (@attackerman) January 17, 2014

At one point Obama appeared to be indicating that Americans should be thankful for the way continuing government spying is being dealt with, comparing the US to dictatorships, stating No one expects China to have an open debate about their surveillance programs, or Russia to take the privacy concerns of citizens into account.

Comparing the NSA's surveilance practices to China is setting the bar very low. #NSA #unimpressed

Charlotte Gilhooly (@chargilhooly) January 17, 2014

The biggest reform Obama appeared to announce today was that a private entity will hold all of the data that the NSA collects. The president will reportedly order attorney general Eric Holder to report to him by 28 March on options for storing the data.

In other words, NSAs bulk data collection of phone calls and other communications is being outsourced, IT IS NOT BEING ENDED.

If Obama's going to outsource NSA data, he should give it to the clowns behind HealthCareDotGov, so nobody will be able to access it.

John Hayward (@Doc_0) January 17, 2014

Rand Paul noted on CNN Its not about who holds it, I dont want them collecting Americans information.

This shifting of records would not solve the problem it would just shift it, said Elizabeth Goitein,co-director of the Liberty and National Security Program at the Brennan Center for Justice. In the case of telephone companies, it would turn them into agents of the surveillance community.

With the fresh revelations today that NSA collects HUNDREDS OF MILLIONS of text messages per day in an untargeted global sweep, who actually stores them is clearly not the issue here. The issue is the practice of collecting such data, a practice that goes directly against the Fourth Amendment.

Obamas NSA speech in brief:1. OK, well tone it down.2. But were still the good guys.3. Its worse in China.4. Sorry we got caught.

paul bassett davies (@thewritertype) January 17, 2014

The clearest indication that NSA spying will continue came with Obamas declaration that We cannot prevent terrorist attacks or cyber-threats without some capability to penetrate digital communications.

How did Obama's NSA announcements score? Here's our filled-out card. pic.twitter.com/N3h8qJW5Hk

EFF (@EFF) January 17, 2014

-

Steve Watson is the London based writer and editor for Alex Jones Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.

See original here:
Obama Justifies NSA Spying: Paul Revere Did It First

Mass government surveillance pros and cons: NSA spying …

Internet surveillance helps to detect threats but can infringe citizens' privacy, and the laws which protect it. Is mass governmentsurveillance a necessary evil? Why is the NSA spying on regular citizens? Is Edward Snowden ahero or a traitor? Join our debate on pros and cons of government surveillance and vote in our poll

Wikileaks new release of CIA hacking documents casts new doubts on the ethics of government approach to privacy protection. With the advent of the Digital Era, many governments have adopted a policy of mass online surveillanceand data mining. This is a clear case of the privacy vs security dilemma.Governments justify computer and network monitoring based on security concerns. Online surveillance may help detect threats such as terrorism, crime, child pornography, tax evasion and fraud. However these measures have been strongly criticized for the infringement of privacy it necessitates and potential abuse of the data collected for political and commercial purposes. Due to this, maintaining Internet privacy is becoming increasingly difficult. Should the government engage in bulk collection of personal data for national security purposes? Is it acceptable for the greater good to have our online communications monitored?

The NSA surveillance programPRISMis one of the most paradigmatic cases of a government spying on its citizens. This program was launched in 2007, following President Bush'sProtect America Act, to collect and store data from internet communications from at least 9 major internet companies in the United States, including Google, Microsoft, Apple, Skype, Youtube, Yahoo!, Paltalk, AOL and Facebook.

PRISM replaced another mass Internet data mining program, the Terrorist Surveillance Program, which was launched by the US government after the 9/11 terrorist attacks but heavily criticized and considered illegal.Through PRISM, the NSA monitorand collectinternet communications from internet service providersusing Data Intercept Technology. The type of communications intercepted and collected include emails, text chats, video and voice messages, voice-over-IP chats (including Skype calls), social networks information and files transferred. In addition to NSA, other government intelligence agencies such as CIA andFBI were given access to the data collected.

This secret government surveillance program was exposed to the public thanks to the leaks made by the NSA contractorEdward Snowden which were published on June 2013 by The Guardian and The Washington Post. The classified information disclosed by Edward Snowden's NSA Files also revealed that the UK government also spied on British citizens through the Government Communications Headquarters (GCHQ). Apparently the NSA surveillance program was not only used to collect intelligence for domestic affairs but also to collect data from foreign leaders and politicians. Snowden's revelations triggered a series of domestic and international criticisms. Some claimed it was a perversion of the system, that this type of data-gathering is a serious intrusion into people's privacy and entails other risks. The government justified it as part of the wider security strategy of thecountry.

Edward Snowden has been blamed for disclosing this mass surveillance system and endangering national security. At the same time thanks to him individual liberties may be now safer from government interevention.Snowden travelled to Moscow andrequested asylum in Russia to avoid facing legal action and charges in America for revealing secret information. He is now afraid of being abducted by American secret services.Is Edward Snowden a hero or a traitor? IsEdward Snowden simply a whistle-blower or a responsible citizen concerned with fighting to prevent the government from abusing its power? Share your views on the forum below.

Watch Edward Snowden TedTalk on how take back the internet:

There are many pros and cons associated with the use of mass internet surveillance. This is a list of the most common arguments in favor and agaist government surveillance programs:

Pros:

Cons:

Difficult questions: What do you think of the NSA spying on us for security purposes? Are there better alternatives? Could these government surveillance systems be subject to public scrutiny and accountability rules? How much more security should these programs deliver to justify the infringement of privacy and personal liberties? Join our discussion forum below.

Watch this academic debate on National Security and Cyber Surveillance at George Washington University:

Mass governnment surveillance pros and cons: Is NSA internet spying and data mining justified?Vote and and share your views

Vote to see result and collect 1 XP. Your vote is anonymous. If you change your mind, you can change your vote simply by clicking on another option.

See more here:
Mass government surveillance pros and cons: NSA spying ...

Judge: NSA spying almost Orwellian, likely unconstitutional

In a stinging rebuke to President Barack Obamas surveillance policies, a federal judge on Monday branded the National Security Agencys mass collection of Americans telephone data almost Orwellian and likely a violation of the Constitution. Former NSA contractor Edward Snowden cheered the ruling.

Appeals Court Judge Richard Leon invoked Founding Father James Madison and the Beatles in a frequently scathing ruling. Leon, appointed by then-President George W. Bush, ordered the government to halt bulk collection of so-called telephony metadata and destroy information already collected through that program. But he suspended his order as the case works its way through the courts.

I cannot imagine a more indiscriminate and abitrary invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval, Leon wrote.

The judge also dealt a blow to the governments argument that such surveillance programs

a source of controversy ever since Snowden revealed their reach in a series of unauthorized disclosures

are necessary to thwarting terrorist plots.

The Government does not cite a single instance in which analysis of the NSAs bulk metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving any objective that was time-sensitive in nature, he wrote.

Leon said Founding Father James Madison would likely be aghast at the NSAs activities

but also conjured up a Beatles-themed image to rebut the governments suggestion that it does not collect Verizon metadata.

To draw an analogy, if the NSAs program operates the way the Government suggests it does, then omitting Verizon Wireless, AT&T, and Sprint from the collection would be like omitting John, Paul, and George from a historical analysis of the Beatles. A Ringo-only database doesnt make any sense, and I cannot believe the Government would create, maintain, and so ardently defend such a system, he wrote in footnote 36 on page 38.

Among Leons other flourishes, he warned that the so-called war on terrorism realistically could be forever! He expressed concerns about the almost Orwellian technology that enables the Government to store and analyze the phone metadata of every telephone user in the United States. And he said modern-day surveillance tactics would have been the stuff of science fiction at the time a precedent ruling was issued.

The White House had no immediate response to the ruling.

But Snowden, in a statement distributed by independent journalist Glenn Greenwald, cheered.

"I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts," Snowden said. "Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans' rights. It is the first of many."

Continued here:
Judge: NSA spying almost Orwellian, likely unconstitutional

The NSAs Hidden Spy Hubs in Eight U.S. Cities

The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the worlds largest telecommunications networks and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence including classified NSA documents, public records, and interviews with several former AT&T employees indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.

The NSA considers AT&T to be one of its most trusted partners and has lauded the companys extreme willingness to help. It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&Ts customers. According to the NSAs documents, it values AT&T not only because it has access to information that transits the nation, but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&Ts massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.

Much has previously been reported about the NSAs surveillance programs. But few details have been disclosed about the physical infrastructure that enables the spying. Last year, The Intercept highlighted a likely NSA facility in New York Citys Lower Manhattan. Now, we are revealing for the first time a series of other buildings across the U.S. that appear to serve a similar function, as critical parts of one of the worlds most powerful electronic eavesdropping systems, hidden in plain sight.

Its eye-opening and ominous the extent to which this is happening right here on American soil, said Elizabeth Goitein, co-director of the Liberty and National Security Program at the Brennan Center for Justice. It puts a face on surveillance that we could never think of before in terms of actual buildings and actual facilities in our own cities, in our own backyards.

There are hundreds of AT&T-owned properties scattered across the U.S. The eight identified by The Intercept serve a specific function, processing AT&T customers data and also carrying large quantities of data from other internet providers. They are known as backbone and peering facilities.

While network operators would usually prefer to send data through their own networks, often a more direct and cost-efficient path is provided by other providers infrastructure. If one network in a specific area of the country is overloaded with data traffic, another operator with capacity to spare can sell or exchange bandwidth, reducing the strain on the congested region. This exchange of traffic is called peering and is an essential feature of the internet.

Because of AT&Ts position as one of the U.S.s leading telecommunications companies, it has a large network that is frequently used by other providers to transport their customers data. Companies that peer with AT&T include the American telecommunications giants Sprint, Cogent Communications, and Level 3, as well as foreign companies such as Swedens Telia, Indias Tata Communications, Italys Telecom Italia, and Germanys Deutsche Telekom.

AT&T currently boasts 19,500 points of presence in 149 countries where internet traffic is exchanged. But only eight of the companys facilities in the U.S. offer direct access to its common backbone key data routes that carry vast amounts of emails, internet chats, social media updates, and internet browsing sessions. These eight locations are among the most important in AT&Ts global network. They are also highly valued by the NSA, documents indicate.

The data exchange between AT&T and other networks initially takes place outside AT&Ts control, sources said, at third-party data centers that are owned and operated by companies such as Californias Equinix. But the data is then routed in whole or in part through the eight AT&T buildings, where the NSA taps into it. By monitoring what it calls the peering circuits at the eight sites, the spy agency can collect not only AT&Ts data, they get all the data thats interchanged between AT&Ts network and other companies, according to Mark Klein, a former AT&T technician who worked with the company for 22 years. It is an efficient point to conduct internet surveillance, Klein said, because the peering links, by the nature of the connections, are liable to carry everybodys traffic at one point or another during the day, or the week, or the year.

Christopher Augustine, a spokesperson for the NSA, said in a statement that the agency could neither confirm nor deny its role in alleged classified intelligence activities. Augustine declined to answer questions about the AT&T facilities, but said that the NSA conducts its foreign signals intelligence mission under the legal authorities established by Congress and is bound by both policy and law to protect U.S. persons privacy and civil liberties.

Jim Greer, an AT&T spokesperson, said that AT&T was required by law to provide information to government and law enforcement entities by complying with court orders, subpoenas, lawful discovery requests, and other legal requirements. He added that the company provides voluntary assistance to law enforcement when a persons life is in danger and in other immediate, emergency situations. In all cases, we ensure that requests for assistance are valid and that we act in compliance with the law.

Dave Schaeffer, CEO of Cogent Communications, told The Intercept that he had no knowledge of the surveillance at the eight AT&T buildings, but said he believed the core premise that the NSA or some other agency would like to look at traffic at an AT&T facility. He said he suspected that the surveillance is likely carried out on a limited basis, due to technical and cost constraints. If the NSA were trying to ubiquitously monitor data passing across AT&Ts networks, Schaeffer added, he would be extremely concerned.

Sprint, Telia, Tata Communications, Telecom Italia, and Deutsche Telekom did not respond to requests for comment. CenturyLink, which owns Level 3, said it would not discuss matters of national security.

The maps The Intercept used to identify the internet surveillance hubs.

Maps: NSA/AT&T

The eight locations are featured on a top-secret NSA map, which depicts U.S. facilities that the agency relies upon for one of its largest surveillance programs, code-named FAIRVIEW. AT&T is the only company involved in FAIRVIEW, which was first established in 1985, according to NSA documents, and involves tapping into international telecommunications cables, routers, and switches.

In 2003, the NSA launched new internet mass surveillance methods, which were pioneered under the FAIRVIEW program. The methods were used by the agency to collect within a few months some 400 billion records about peoples internet communications and activity, the New York Times previously reported. FAIRVIEW was also forwarding more than 1 million emails every day to a keyword selection system at the NSAs Fort Meade headquarters.

Central to the internet spying are eight peering link router complex sites, which are pinpointed on the top-secret NSA map. The locations of the sites mirror maps of AT&Ts networks, obtained by The Intercept from public records, which show backbone node with peering facilities in Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.

One of the AT&T maps contains unique codes individually identifying the addresses of the facilities in each of the cities.

Among the pinpointed buildings, there is a nuclear blast-resistant, windowless facility in New York Citys Hells Kitchen neighborhood; in Washington, D.C., a fortress-like, concrete structure less than half a mile south of the U.S. Capitol; in Chicago, an earthquake-resistant skyscraper in the West Loop Gate area; in Atlanta, a 429-foot art deco structure in the heart of the citys downtown district; and in Dallas, a cube-like building with narrow windows and large vents on its exterior, located in the Old East district.

Elsewhere, on the west coast of the U.S., there are three more facilities: in downtown Los Angeles, a striking concrete tower near the Walt Disney Concert Hall and the Staples Center, two blocks from the most important internet exchange in the region; in Seattle, a 15-story building with blacked-out windows and reinforced concrete foundations, near the citys waterfront; and in San Franciscos South of Market neighborhood, a building where it was previously claimed that the NSA was monitoring internet traffic from a secure room on the sixth floor.

The peering sites otherwise known in AT&T parlance as Service Node Routing Complexes, or SNRCs were developed following the internet boom in the mid- to late 1990s. By March 2009, the NSAs documents say it was tapping into peering circuits at the eight SNRCs.

The facilities purpose was to bolster AT&Ts network, improving its reliability and enabling future growth. They were developed under the leadership of an Iranian-American innovator and engineer named Hossein Eslambolchi, who was formerly AT&Ts chief technology officer and president of AT&T Labs, a division of the company that focuses on research and development.

Eslambolchi told The Intercept that the project to set up the facilities began after AT&T asked him to help create the largest internet protocol network in the world. He obliged and began implementing his network design by placing large Cisco routers inside former AT&T phone switching facilities across the U.S. When planning the project, he said he divided AT&Ts network into different regions, and in every quadrant I will have what I will call an SNRC.

During his employment with AT&T, Eslambolchi said he had to take a polygraph test, and he obtained a government security clearance. I was involved in very, very top, heavy-duty projects for a few of these three-letter agencies, he said, in an apparent reference to U.S. intelligence agencies. They all loved me.

He would not confirm or deny the exact locations of the eight peering sites identified by The Intercept or discuss the classified work he carried out while with the company. You put a gun to my head, he said, Im not going to tell you.

Other former AT&T employees, however, were more forthcoming.

A former senior member of AT&Ts technical staff, who spoke on condition of anonymity due to the sensitivity of the subject, confirmed with 100 percent certainty the locations of six of the eight peering facilities identified by The Intercept. The source, citing direct knowledge of the facilities and their function, verified the addresses of the buildings in Atlanta, Dallas, Los Angeles, New York City, Seattle, and Washington, D.C.

A second former AT&T employee confirmed the locations of the remaining two sites, in Chicago and San Francisco. I worked with all of them, said Philip Long, who was employed by AT&T for more than two decades as a technician servicing its networks. Longs work with AT&T was carried out mostly in California, but he said his job required him to be in contact with the companys other facilities across the U.S. In about 2005, Long recalled, he received orders to move every internet backbone circuit I had in northern California through the San Francisco AT&T building identified by The Intercept as one of the eight NSA spy hubs. Long said that, at the time, he felt suspicious of the changes, because they were unusual and unnecessary. We thought we were routing our circuits so that they could grab all the data, he said. We thought it was the government listening. He retired from his job with AT&T in 2014.

A third former AT&T employee reviewed The Intercepts research and said he believed it accurately identified all eight of the facilities. The site data certainly seems correct, said Thomas Saunders, who worked as a data networking consultant for AT&T in New York City between 1995 and 2004. Those nodes arent going to move.

Photo: Henrik Moltke

The NSA calls this predicament home field advantage a kind of geographic good fortune. A targets phone call, email, or chat will take the cheapest path, not the physically most direct path, one agency document explains. Your targets communications could easily be flowing into and through the U.S.

Once the internet traffic arrives on U.S. soil, it is processed by American companies. And that is why, for the NSA, AT&T is so indispensable. The company claims it has one of the worlds most powerful networks, the largest of its kind in the U.S. AT&T routinely handles masses of emails, phone calls, and internet chats. As of March 2018, some 197 petabytes of data the equivalent of more than 49 trillion pages of text, or 60 billion average-sized mp3 files traveled across its networks every business day.

The NSA documents, which come from the trove provided to The Intercept by the whistleblower Edward Snowden, describe AT&T as having been aggressively involved in aiding the agencys surveillance programs. One example of this appears to have taken place at the eight facilities under a classified initiative called SAGUARO.

As part of SAGUARO, AT&T developed a strategy to help the NSA electronically eavesdrop on internet data from the peering circuits at the eight sites, which were said to connect to the common backbone, major data routes carrying internet traffic.

The company worked with the NSA to rank communications flowing through its networks on the basis of intelligence value, prioritizing data depending on which country it was derived from, according to a top-secret agency document.

Graphic: NSA

NSA diagrams reveal that after it collects data from AT&Ts access links and peering partners, it is sent to a centralized processing facility code-named PINECONE, located somewhere in New Jersey. Inside the PINECONE facility, there is a secure space in which there is both NSA-controlled and AT&T-controlled equipment. Internet traffic passes through an AT&T distribution box to two NSA systems. From there, the data is then transferred about 200 miles southwest to its final destination: NSA headquarters at Fort Meade in Maryland.

At the Maryland compound, the communications collected from AT&Ts networks are integrated into powerful systems called MAINWAY and MARINA, which the NSA uses to analyze metadata such as the to and from parts of emails, and the times and dates they were sent. The communications obtained from AT&T are also made accessible through a tool named XKEYSCORE, which NSA employees use to search through the full contents of emails, instant messenger chats, web-browsing histories, webcam photos, information about downloads from online services, and Skype sessions.

Top left / right: Mike Osborne. Bottom left: Henrik Moltke. Bottom right: Frank Heath.

The NSAs primary mission is to gather foreign intelligence. The agency has broad legal powers to monitor emails, phone calls, and other forms of correspondence as they are being transported across the U.S., and it can compel companies such as AT&T to install surveillance equipment within their networks.

Under a Ronald Reagan-era presidential directive Executive Order 12333 the NSA has what it calls transit authority, which it says enables it to eavesdrop on communications which originate and terminate in foreign countries, but traverse U.S. territory. That could include, for example, an email sent by a person in France to a person in Mexico, which on its way to its destination was routed through a server in California. According to the NSAs documents, it was using AT&Ts networks as of March 2013 to gather some 60 million foreign-to-foreign emails every day, 1.8 billion per month.

Without an individualized court order, it is illegal for the NSA to spy on communications that are wholly domestic, such as emails sent back and forth between two Americans living in Texas. However, in the aftermath of the 9/11 attacks, the agency began eavesdropping on Americans international calls and emails that were passing between the U.S. and other countries. That practice was exposed by the New York Times in 2005 and triggered what became known as the warrantless wiretapping scandal.

Critics argued that the surveillance of Americans international communications was illegal, because the NSA had carried it out without obtaining warrants from a judge and had instead acted on the orders of President George W. Bush. In 2008, Congress weighed into the dispute and controversially authorized elements of the warrantless wiretapping program by enacting Section 702 of the Foreign Intelligence and Surveillance Act, or FISA. The new law allowed the NSA to continue sweeping up Americans international communications without a warrant, so long as it did so incidentally while it was targeting foreigners overseas for instance, if it was monitoring people in Pakistan, and they were talking with Americans in the U.S. by phone, email, or through an internet chat service.

Within AT&Ts networks, there is filtering equipment designed to separate foreign and domestic internet data before it is passed to the NSA, the agencys documents show. Filtering technology is often used by internet providers for security reasons, enabling them to keep tabs on problems with their networks, block out spam, or monitor hacking attacks. But the same tools can be used for government surveillance.

You can essentially trick the routers into redirecting a small subset of traffic you really care about, which you can monitor in more detail, said Jennifer Rexford, a computer scientist who worked for AT&T Labs between 1996 and 2005.

According to the NSAs documents, it programs its surveillance systems to focus on particular IP addresses a set of numbers that identify a computer associated with foreign countries. A classified 2012 memo describes the agencys efforts to use IP addresses to home in on internet data passing between the U.S. and particular regions of interest, including Iran, Afghanistan, Israel, Nigeria, Pakistan, Yemen, Sudan, Tunisia, Libya, and Egypt. But this process is not an exact science, as people can use privacy or anonymity tools to change or spoof their IP addresses. A person in Israel could use privacy software to masquerade as if they were accessing the internet in the U.S. Likewise, an internet user in the U.S. could make it appear as if they were online in Israel. It is unclear how effective the NSAs systems are at detecting such anomalies.

In October 2011, the Foreign Intelligence Surveillance Court, which approves the surveillance operations carried out under Section 702 of FISA, found that there were technological limitations with the agencys internet eavesdropping equipment. It was generally incapable of distinguishing between some kinds of data, the court stated. As a consequence, Judge John D. Bates ruled, the NSA had been intercepting the communications of non-target United States persons and persons in the United States, violating Fourth Amendment protections against unreasonable searches and seizures. The ruling, which was declassified in August 2013, concluded that the agency had acquired some 13 million internet transactions during one six-month period, and had unlawfully gathered tens of thousands of wholly domestic communications each year.

The root of the issue was that the NSAs technology was not only targeting communications sent to and from specific surveillance targets. Instead, the agency was sweeping up peoples emails if they had merely mentioned particular information about surveillance targets.

A top-secret NSA memo about the courts ruling, which has not been disclosed before, explained that the agency was collecting peoples messages en masse if a single one were found to contain a selector like an email address or phone number that featured on a target list.

One example of this is when a user of a webmail service accesses her inbox; if the inbox contains one email message that contains an NSA tasked selector, NSA will acquire a copy of the entire inbox, not just the individual email message that contains the tasked selector, the memo stated.

The courts ruling left the agency with two options: shut down the spying based on mentions of targets completely, or ensure that protections were put in place to stop the unlawfully collected communications from being reviewed. The NSA chose the latter option, and created a cautionary banner that warned its analysts not to read particular messages unless they could confirm that they had been lawfully obtained.

But the cautionary banner did not solve the problem. The NSAs analysts continued to access the same data repositories to search, unlawfully, for information on Americans. In April 2017, the agency publicly acknowledged these violations, which it described as inadvertent compliance incidents. It said that it would no longer use surveillance programs authorized under Section 702 of FISA to harvest messages that mentioned its targets, citing technological constraints, United States person privacy interests, and certain difficulties in implementation.

The messages that the NSA had unlawfully collected were swept up using a method of surveillance known as upstream, which the agency still deploys for other surveillance programs authorized under both Section 702 of FISA and Executive Order 12333. The upstream method involves tapping into communications as they are passing across internet networks precisely the kind of electronic eavesdropping that appears to have taken place at the eight locations identified by The Intercept.

Photo: Frank Heath

Photo: Frank Heath

The Atlanta facility is likely of strategic importance for the NSA. The site is the closest major AT&T internet routing center to Miami, according to the NSA and AT&T maps. From undersea cables that come aground at Miami, huge flows of data pass between the U.S. and South America. It is probable that much of that data is routed through the Atlanta facility as it is being sent to and from the U.S. In recent years, the NSA has extensively targeted several Latin American countries such as Mexico, Brazil, and Venezuela for surveillance.

Photo: Henrik Moltke

According to the Chicago Sun-Times, the facility handles much of the citys phone and internet traffic and is equipped with banks of routers, servers, and switching systems. This building touches every single resident of the city, Jim Wilson, an AT&T area manager, told the newspaper in 2016.

Photo: Henrik Moltke

10 South Canal Street originally contained a million-gallon oil tank, turbine generators, and a water well, so that it could continue to function for more than two weeks without electricity or water from the city, according to Illinois broadcaster WBEZ. The building is anchored in bedrock, which helps support the weight of the equipment inside, and gives it extra resistance to bomb blasts or earthquakes, WBEZ reported.

NSA and AT&T maps point to the Chicago facility as being one of the peering hubs, which process internet traffic as part of the NSA surveillance program code-named FAIRVIEW. Philip Long, who was employed by AT&T for more than two decades as a technician servicing its networks, confirmed that the Chicago site was one of eight primary AT&T Service Node Routing Complexes, or SNRCs, in the U.S. NSA documents explicitly describe tapping into flows of data at all eight of these sites.

Photo: Mike Osborne

The 4211 Bryan Street facility is located next to other AT&T-owned buildings, including a towering telephone routing complex that was first built in 1904. A piece about the telephone hub in the Dallas Observer described it as an imposing, creepy building that is known in some circles as The Great Wall of Beige.

Photo: Mike Osborne

NSA and AT&T maps point to the 4211 Bryan Street facility as being one of the peering hubs, which process internet traffic as part of the NSA surveillance program code-named FAIRVIEW. A former AT&T employee confirmed that the site was one of eight primary AT&T Service Node Routing Complexes, or SNRCs, in the U.S. NSA documents explicitly describe tapping into flows of data at all eight of these sites.

Photo: Henrik Moltke

Located between Chinatown and the Staples Center, the fortress-like structure is one of the largest telephone central offices in the U.S. The theoretical number of telephone lines that can be served from this office are 1.3 million and this office also serves as a foreign exchange carrier to neighboring area codes, according to the Central Office, a website that profiles U.S. telecommunications hubs.

Untitled, or Bell Communications Around the Globe. Mural by Anthony Heinsbergen (1961) on the West side of 420 South Grand Ave, La.

Photo: Henrik Moltke

Due to the close proximity of the Madison Complex and One Wilshire, and their shared role as telecommunications hubs, it is likely that the buildings process some of the same data as it is being routed across U.S. networks.

NSA and AT&T maps point to the Madison Complex facility as being one of the peering hubs, which process internet traffic as part of the NSA surveillance program code-named FAIRVIEW. A former AT&T employee confirmed that the site was one of eight primary AT&T Service Node Routing Complexes, or SNRCs, in the U.S. NSA documents explicitly describe tapping into flows of data at all eight of these sites.

Photo: Henrik Moltke

A New York Times article published in 1975 noted that 811 10th Avenue was the first of several windowless equipment buildings to be constructed in the city, and added that its design initially caused considerable controversy.

Aerial shot of 811 10th street, NYC, ca. 1965.

Photo: courtesy of Avery Architectural & Fine Arts Library, Columbia University

Photo: Henrik Moltke

NSA and AT&T documents indicate that 10th Avenue building serves as the NSAs internet equivalent of 33 Thomas Street. While the NSAs surveillance at 33 Thomas Street mainly targets phone calls that pass through the buildings international switching points, at the 10th Avenue site the agency appears to primarily collect emails, online chats, and data from internet browsing sessions.

Photo: Henrik Moltke

NSA and AT&T maps obtained by The Intercept indicate that 611 Folsom Street is one of the eight peering hubs in the U.S. that process internet traffic as part of the NSA surveillance program code-named FAIRVIEW. Philip Long, who was employed by AT&T for more than two decades as a technician servicing its networks, confirmed that the San Francisco site is one of eight primary AT&T Service Node Routing Complexes, or SNRCs, in the U.S. NSA documents explicitly describe tapping into flows of data at all eight of these sites.

Photo: Henrik Moltke

We were getting orders to move backbones and it just grabbed me, said Long. We thought it was government stuff and that they were being intrusive. We thought we were routing our circuits so that they could grab all the data.

It is not the first time the building has been implicated in revelations about electronic eavesdropping. In 2006, an AT&T technician named Mark Klein alleged in a sworn court declaration that the NSA was tapping into internet traffic from a secure room on the sixth floor of the facility.

Klein, who worked at 611 Folsom Street between October 2003 and May 2004, stated that employees from the agency had visited the building and recruited one of AT&Ts management level technicians to carry out a special job. The job involved installing a splitter cabinet that copied internet data as it was flowing into the building, before diverting it into the secure room.

The room at AT&Ts Folsom St. facility that allegedly contained NSA surveillance equipment.

Photo: Mark Klein

He said equipment in the secure room included a semantic traffic analyzer a tool that can be used to search large quantities of data for particular words or phrases contained in emails or online chats. Notably, Klein discovered that the NSA appeared to be specifically targeting internet peering links, which is corroborated by the NSA and AT&T documents obtained by The Intercept.

According to documents provided by Klein, AT&Ts network at Folsom Street peered with other companies like Sprint, Cable & Wireless, and Qwest. It was also linked, he said, to an internet exchange named MAE West, a major data hub in San Jose, California, where other companies connect their networks together.

Sprint did not respond to a request for comment. A spokesperson for Cable & Wireless said the company only discloses data when legally required to do so as a result of a valid warrant or other legal process. In 2011, CenturyLink acquired Qwest as part of a $12.2 billion merger deal. A CenturyLink spokesperson said he could not discuss matters of national security.

Photo: Jovelle Tamayo for The Intercept

Read more from the original source:
The NSAs Hidden Spy Hubs in Eight U.S. Cities

The Trump Administration Is Hiding a Crucial Report on NSA …

Despite requests from a senator and the European Union, the Trump administration is refusing to make public an important report by a federal privacy watchdog about how the U.S. government handles personal information swept up by its surveillance.

The public has a right to know what the government does with the vast troves of private data that American intelligence agencies collect in the course of their spying. On Thursday, we filed a Freedom of Information Act request demanding the release of the report, significant portions of which are unclassified.

The report is from the Privacy and Civil Liberties Oversight Board, which was created by Congress to be an independent, bipartisan agency. Its mission is to help ensure that national security laws and programs dont infringe on individual rights. As part of that mission, the board has issued several significant oversight reports addressing government surveillance. While we have not always agreed with the conclusions of these reports, they have played a vital role in the democratic process by educating the public about the powerful spying tools at the governments disposal. In the wake of Edward Snowdens revelations about the National Security Agencys illegal mass surveillance programs, the boards work informed the public debate by prompting the declassification of additional details about these secret programs.

Recognizing the boards importance as a mechanism for transparency, Congress required that it make its reports public to the greatest extent possible. But now the Trump administration is wrongly trying to keep its findings secret.

The report were seeking concerns the implementation of President Obamas 2014 policy directive on government spying and the handling of personal information, which can include emails, chats, text messages, and more. The directive recognized that all persons have legitimate privacy interests in the handling of their personal information. While Obamas policy changes left much to be desired, they did include improvements, including some very modest protections for the handling of personal information of non-American citizens abroad. The directive also encouraged the Privacy and Civil Liberties Oversight Board to provide the president with a report assessing how the new policies were carried out.

In December 2016, the board delivered its report to the White House and congressional intelligence committees. Two months later, Sen. Ron Wyden (D-Ore.) wrote a letter to Office of the Director of National Intelligence, urging it to make public the unclassified portions of the report and to declassify the rest of it as soon as possible. European Union officials and representatives have also called for the reports release.

In response, the Trump administration has refused to release any of the report, even with redactions, citing executive privilege. By shrouding the report in secrecy, the administration is depriving the public of the ability to understand how the government is applying Obamas efforts to impose even minimal privacy safeguards on highly controversial NSA spying.

The European Union has said that the disclosure of the report is important for its annual assessment of the central U.S.-EU data-sharing agreement, known as Privacy Shield. That agreement allows American tech firms operatingin Europe to easily transfer data to the United States.

Just last week, the European Parliament called for the suspension of the Privacy Shield agreement because the United States is not complying with EU law. Suspending the agreement would be devastating for Silicon Valley. One of parliaments many concerns was Trumps claim of presidential privilege over the boards report, which likely addresses the implementation of privacy protections for Europeans.

In addition to keeping the report secret, the Trump administration appears to be undermining the Privacy and Civil Liberties Oversight Boards proper functioning. Since February 2017, four of the boards five positions have been vacant, preventing it from doing much of its work to investigate government overreach. Three new members have been nominated but are still awaiting Senate confirmation after many months. Even if all three were confirmed, that would leave the board imbalanced, with three Republicans and only one Democrat. In this scenario, the boards rules require that the next member not be a Republican, but Trump has made no nomination.

Given the vacancies and the fact that the current nominee for chair of the board is on the record supporting unconstitutional surveillance programs there are now serious questions regarding whether the board will act as an independent check on surveillance abuses by the executive branch in the future.

Despite questions about the future of the Privacy and Civil Liberties Oversight Board, its reports have shed much-needed light on the governments surveillance practices. By hiding the report that were demanding today, the Trump administration is not only undermining the boards purpose its also undermining democratic accountability.

More:
The Trump Administration Is Hiding a Crucial Report on NSA ...