Showing posts with label NSA. Show all posts
Showing posts with label NSA. Show all posts

October 28, 2013

RIGHT-SIZING THE SECURITY STATE




RYAN COOPER WASHINGTON POST

It turns out the NSA wasn’t just spying on Angela Merkel. It was apparently spying on Angela Merkel and at least 34 other heads of state! Over the weekend the German newspaper Bild am Sonntag quoted an NSA official saying that President Obama had been briefed on at least the Merkel operation, though the story was quickly denied.
Whatever the truth is there, the real issue exposed here is how the NSA and its brother agencies are genuinely threatened by the exposure of their most controversial programs. It’s time to take this potential for outrage into account, and ditch the scandalous, low-benefit operations.

From my reading of history the American security apparatus has often acted against America’s interests. Things like: the Vietnam War, installing the Shah in Iran, arming mass-murdering guerrillas in Nicaragua, the Bay of Pigs, etc. etc., weren’t just bloody fiascoes. They actively undermined the long-term security of the nation. (And that’s not when they were just being weird, like feeding random citizens LSD, or researching “psychic” charlatans.)
But even if you take all the claims of the various NSA apologists at face value, it is unquestionably clear that the security state faces new challenges in a world where their various controversial activities can be exposed en masse, in real time, as opposed to irregularly and long after the fact, like before. Henry Farrell and Martha Finnemore wrote a splendid article about this problem in Foreign Affairs (paywalled). They conceptualize it brilliantly, thinking of American hypocrisy as an essential component of American strategy, which is critically undermined by whistleblowers like Snowden:

The deeper threat that leakers such as Manning and Snowden pose is more subtle than a direct assault on U.S. national security: they undermine Washington’s ability to act hypocritically and get away with it. Their danger lies not in the new information that they reveal but in the documented confirmation they provide of what the United States is actually doing and why. When these deeds turn out to clash with the government’s public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior and easier for U.S. adversaries to justify their own. 
 

 Whatever one thinks of Snowden, his very presence is proof that the security state can’t be trusted to provide 100% security against leaks, and that one single disgruntled person among the hundreds of thousands of NSA employees and contractors can completely obliterate the Strategic Hypocrisy Reserve. What this suggests is that the cost-benefit analysis for particular security programs ought to be recalibrated in light of their outrage potential. Programs of dubious benefit that would be explosively controversial should they come to light — like snooping on the German Prime Minister’s cell phone — are probably not worth the benefit (which, again, is what?).

Nobody would care if the NSA confined itself to snooping on actual terrorist suspects and so forth, even if they defined such things very loosely and occasionally spied on a few hundred citizens by honest accident. By contrast, dragnet surveillance is both infuriating (witness Germany threatening to break the Internet over it) and of little use, not to mention hugely difficult and expensive.
This is a real problem, because even I will admit that some of the national security state’s public goods are worth having — the Navy providing basic security for most of the world’s shipping lanes comes to mind. One doesn’t see mass protests over that very often. It’s time we focused the NSA and its fellows back onto those kinds of programs, even if it means the nation has to bear the bitter taste of its own medicine.

October 25, 2013

The National Security Agency, Narcissism, and Nationalism

Angela Merkel


CHRISTOPHER DICKEY DAILY BEAST

Pakistani Prime Minister Nawaz Sharif made it clear in a public statement while visiting the White House: no more drones! Never mind that his predecessors reportedly signed off on the not-so-secret CIA drone program blowing away jihadist bad guys and, all too often, bystanders in the remote mountains near Afghanistan.

Even the intelligence operations of the redoubtable New York City Police Department are under fire.  A coalition of 125 civil rights, religious and community groups has just written to the U.S. Department of Justice to demand a federal investigation of the surveillance activities the cops conduct in New York’s Muslim communities.

In the 1980s the intelligence community in the United States already had difficulties with the sheer volume of stuff it collected. “It now produces so much information, such an all-sources glut of words, images and electronic data that the number of intelligence officers who can understand it all, who see the overall pictures, is rapidly declining,” Knightley wrote. [Philip Knightley’s classic study, The Second Oldest Profession, about spies and spying in the last century.]

As James Bamford pointed out back in 2009 in great detail in his book The Shadow Factory, when global communications moved from wires and satellites to undersea and underground fiber optic cables carrying millions of calls and emails at a time, the whole business of intelligence gathering shifted its emphasis to what’s called “collection first.”

It was no longer practical or indeed possible to put alligator clips on the landline of a terrorist. He was using the Internet for his emails and his phone calls. So, virtually all data moving through the fiber optic lines that crisscross the globe has to be sucked into the NSA’s computers, then sophisticated filters (many of which were developed by the Israelis, as Bamford points out) are used to sift the torrent of communications until only a very narrow range of suspect ones actually are monitored.

How do you figure out what phones or email accounts to target? You look at who’s communicating with whom, and that information is to be found in the metadata that the NSA has collected from the major Internet service providers and other communications companies.

 Steward A. Baker, a former general counsel at the NSA and assistant secretary at the Department of Homeland Security when it was formed after the attacks on the United States, notes that this may be shocking to some, but it’s perfectly legal in the United States, since “the Supreme Court has held that such records are not protected by the Fourth Amendment, since they’ve already been given to a third party,” the private company, which then shared that information with the U.S. government. “Google is the real Big Brother,” as people in the intelligence community like to say.




The angry protests from Germany’s chancellor over the National Security Agency’s monitoring of her cellphone and France’s furor over the collection of data about millions of its citizens have obscured a new reality: The digital age has merely expanded the ability of nations to do to one another what they have done for centuries.

But at the same time, it has allowed the Europeans, the Chinese and other powers to replicate N.S.A. techniques.
France has long been considered one of the most talented powers at stealing industrial secrets and intellectual property, intelligence officials say, although in recent years it has been pushed to the sidelines by the Chinese. Their daily cyberattacks have worked their way into the Pentagon and gotten them the blueprints for the F-35, the most expensive fighter jet in history.
The Russians have a reputation in the intelligence community for taking their time to infiltrate specific communications targets. “They are a lot more patient than the Chinese,” one former American intelligence official said recently, “and so they don’t get caught as often.”
The Israelis are well known for cooperating with the United States on major intelligence targets, mostly Iran, while using a combination of old-fashioned spies and sophisticated electronic techniques to decipher Washington’s internal debates, the officials say.

Surveillance drones
A surveillance drone.



While it is tempting to dismiss the latest revelations with an everyone-does-it shrug, American officials now concede that the uproar in Europe about the N.S.A.’s programs — both the popular outrage and a more calculated political response by Ms. Merkel and France’s president, François Hollande — may have a broader diplomatic and economic effect than they first imagined.
In Washington, the reaction has set off a debate over whether it is time to put the brakes on the N.S.A., whose capabilities, Mr. Obama has hinted, have expanded faster than its judgment. There are now two groups looking at the N.S.A.’s activities: one inside the National Security Council, another with outside advisers. The president all but told Ms. Merkel that “we don’t have the balance right,” according to one official.
“Sure, everyone does it, but that’s been an N.S.A. excuse for too long,” one former senior official who talks to Mr. Obama often on intelligence matters said Friday. “Obama has said, publicly and privately, that just because we can do something doesn’t mean we should do it. But everyone has moved too slowly in moving that from a slogan to a policy.”

In Europe, where Ms. Merkel and Mr. Hollande demanded Friday that the United States open negotiations on a “code of conduct” that would limit surveillance, there is a sense that the steady stream of revelations may give them an upper hand. Ms. Merkel keeps repeating the phrase that the Americans must “restore trust.” One way the French and Germans intend to do that is to seek some form of inclusion in the inner circle of American intelligence allies, or at least for a deeper intelligence alliance.

Demonstrators with tape over their mouths take part in a protest against government surveillance on October 26, 2013 in Washington, DC.
Demonstrators with tape over their mouths take part in a protest against government surveillance on October 26, 2013 in Washington, DC.

PETER BEINART DAILY BEAST

 I spent Wednesday afternoon meandering across the web, looking at how the American media were covering allegations that the National Security Agency had spied on yet another foreign leader. “Don’t Tap My Phone,” screamed the banner headline at Huffington Post, above a grim-faced German Chancellor Angela Merkel. “Obama to Merkel: We’re Not Spying On You,” announced the lead story on msnbc.com. Then I tacked right, to see how the websites of Fox News, Rush Limbaugh, Red State, National Review, and The Weekly Standard were handling the story. They weren’t. None of them featured the allegations at all, though it had been the subject of a Jay Carney White House press briefing just hours before.

This is part of the reason America is struggling as a superpower: our nationalists don’t give a fig about the nationalism of anyone else. American conservatives sometimes say that unlike American liberals, who believe in surrendering power to global institutions, they believe in the nation as the sole legitimate source of authority in international affairs. And that’s true when defending our nation’s prerogatives. Had news broken that Germany was tapping our president’s cell phone, Limbaugh would be musing about fire-bombing Dresden again. But the American right is indifferent, if not hostile, to non-Americans defending their nation’s honor. NSA spying on foreign leaders is only the latest example. In Colorado, they’re now issuing drone-hunting licenses so Americans can shoot down any airborne spy planes that trespass their property. And yet there’s scarcely any sympathy on the right for the Pakistanis and Yemenis who are upset that the U.S. sends drones over their countries, though those drones regularly kill people.

This isn’t American “exceptionalism”—the belief that the U.S. is fundamentally different, and better, than other nations. It’s what the international relations scholar John Ruggie has called (PDF) American “exemptionalism”—the belief that America need not play by everyone else’s rules. The notion isn’t completely absurd. As a superpower, which many smaller countries look to for protection, the U.S. does have special burdens that may sometimes require a special freedom of action. It’s easy for Belgium to say it won’t take military action without United Nations approval. It’s harder for the U.S., the country that gets disproportionately blamed if a Security Council deadlock prevents it from stopping genocide or protecting an ally from harm.

But American foreign policy has been most successful when the U.S. has been more, rather than less, sensitive to other countries’ pride. A good example is the Marshall Plan, which the United States funded but let the nations of Western Europe design, even though they organized their postwar economies in ways that looked socialistic to American eyes. Another is NATO, which at least in theory meant that the U.S. had obligations to smaller, weaker European nations, not just the other way around.

Obama called Reinhold Niebuhr his favorite philosopher, but few know about the controversial pastor today.
Obama called Reinhold Niebuhr his favorite philosopher

In the unipolar era that followed the Soviet Union’s demise, the U.S. didn’t show this kind of deference very often. Many conservatives, and some liberals, thought it didn’t need to. But that unipolar era is ending. In a world where other countries have more power relative to the U.S., it’s increasingly dangerous to believe we can do things to them we would never tolerate them doing to us. Many decades ago, the man sometimes called Obama’s “favorite theologian” argued that the “pride and self-righteousness of powerful nations are a greater hazard to their success than the machinations of their foes.” It would be nice if Obama remembered that, if even if Fox News won’t.






UPDATE
 
European leaders are mad and President Obama knows it. After NSA leaker Edward Snowden broke the news that the U.S. is keeping tabs on leaders of European countries, even those who are U.S. allies, President Obama ordered a review of who we’re snooping on and why. Jen Psaki, a State Department spokeswoman, said, “We wanted to ensure we’re collecting information because we need it and not just because we can.” Germany and France have demanded that the U.S. put a stop to eavesdropping on leaders, companies and law-abiding citizens. The U.S. already has a no-spying agreement with Canada, Great Britain, New Zealand and Australia.
October 26, 2013 11:57 AM
 

September 8, 2013

N.S.A. Foils Much Internet Encryption



N.Y. Times


N.Y. TIMES

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
 
Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.
The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.
 
The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
----
An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.
In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects.
The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features.
 
The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say.
Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by leaders of Al Qaeda about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work.
 
Read more at the N.Y. TIMES

August 24, 2013

The NSA Is Losing The Benefit of the Doubt






RUTH MARCUS WASHINGTON POST

Footnote 14 should scare every American. Even the parts that aren’t blacked out.
The footnote is contained in the just-declassified 2011 opinion by U.S. District Judge John Bates, then the chief judge of the Foreign Intelligence Surveillance Court.

In the ruling, Bates found that the government had been sweeping up e-mails before receiving court approval in 2008 and, even after that, was illegally collecting “tens of thousands of wholly domestic communications.”
That’s not the really scary part. This is: “The court is troubled that the government’s revelations . . . mark the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program,” Bates wrote in Footnote 14.

He cited a 2009 finding that the court’s approval of the National Security Agency’s telephone records program was premised on “a flawed depiction” of how the NSA uses metadata, a “misperception . . . buttressed by repeated inaccurate statements made in the government’s submissions, and despite a government-devised and Court-mandated oversight regime.
“Contrary to the government’s repeated assurances, NSA had been routinely running queries of the metadata using querying terms that did not meet the required standard for querying. The Court concluded that this requirement had been ‘so frequently and systemically violated that it can fairly be said that this critical element of the overall . . . regime has never functioned effectively.’ ”

Followed by two full paragraphs of redactions. We can only imagine what that episode entailed.


U.S. District Judge John Bates

To judge the significance of Bates’s footnote, it helps to know something about the judge. This is no wild-eyed liberal. Bates spent almost two decades in the U.S. Attorney’s Office in Washington. He served as deputy to independent counsel Kenneth Starr during the investigation of President Bill Clinton. He was named to the bench by President George W. Bush.
If Bates is worked up about being misled by the government — and the sober language of that footnote is the judicial version of a severe dressing-down — people should listen.

Security demands secrecy. The Constitution demands that secrecy be coupled with oversight. In theory, that oversight is twofold, from Congress and the judiciary, through the mechanism of the surveillance court.
In practice, oversight necessarily depends on some measure of good will from the overseen. No matter how well-intentioned and diligent the overseers, particularly in an area as technologically murky and politically fraught as surveillance, the intelligence experts tend to hold the cards.
Their deeply ingrained institutional bias is to reveal only what is absolutely necessary, to trust their secrets and secret methods to as few outsiders as possible. When that instinct for secrecy edges into a willingness to mislead, tacitly or explicitly, effective oversight collapses.


Sen. Ron Wyden          Dir of Nat'l Intelligence James Clapper


We have already seen this phenomenon on display before Congress, in the person of Director of National Intelligence James Clapper. In March, Sen. Ron Wyden asked Clapper whether the NSA collects “any type of data at all on millions or hundreds of millions of Americans.” Clapper’s answer, “No . . . not wittingly.”
This was, as Clapper acknowledged, “clearly erroneous.” His belated apology rings hollow. Clapper was not only forewarned about the question, he refused to correct his misrepresentation for months, until it was proved false.
-----
It is possible to construct a happier narrative. After all, Bates’s rebuke was prompted by the intelligence community’s own disclosures. The government then cleaned up its act, with court-approved procedures to minimize privacy invasions. Congress was informed of the program, the court’s problems with it and the fixes being made. The relevant documents were declassified and released (albeit in the face of a lawsuit). President Obama has proposed additional oversight mechanisms, such as building adversary procedures into the surveillance court.
These are hopeful signs, but they do not erase the ugly history: “repeated inaccurate statements” to the court, “clearly erroneous” congressional testimony. Current assurances, made under the duress of unauthorized disclosure, must be judged in light of past performance. An intelligence community consistently too cute by half ends up harming itself, along with the country it strives to protect.

June 23, 2013

BACKGROUNDER: 5 MYTHS ABOUT THE NAT'L SECURITY AGENCY






JAMES BAMFORD WASHINGTON POST

James Bamford, Published: June 21
James Bamford is the author of three books on the NSA, including “The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America.”
When the National Security Agency was created through a top-secret memorandum signed by President Harry Truman in 1952, the agency was so secret that only a few members of Congress knew about it. While the NSA gradually became known over the decades, its inner workings remain extremely hidden, even with the recent leaks about its gathering of Americans’ phone records and tapping into data from the nine largest Internet companies. Let’s pull back the shroud a bit to demystify this agency.

1. The NSA is allowed to spy on everyone, everywhere.

After his release of documents to the Guardian and The Washington Post, former NSA contractor Edward Snowden said, “I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant to a federal judge to even the president if I had a personal e-mail.”

But Snowden probably couldn’t eavesdrop on just about anyone, including the president, without breaking the law. The Foreign Intelligence Surveillance Act forbids the NSA from targeting U.S. citizens or legal residents without an order issued by the Foreign Intelligence Surveillance Court. This applies whether the person is in the United States or overseas. According to documents from Snowden  published by The Post and the Guardian on Thursday, if agency employees pick up the communications of Americ ans incidentally while monitoring foreign targets, they are supposed to destroy the information unless it contains “significant foreign intelligence” or evidence of a crime.
What’s technically feasible is a different matter. Since 2003, the NSA has been able to monitor much of the Internet and telephone communication entering, leaving and traveling through the United States with secret eavesdropping hardware and software installed at major AT&T switches, and probably those of other companies, around the country.



2. The courts make sure that what the NSA does is legal.

This is part of the NSA’s mantra. Because both the surveillance court and the activities it monitors are secret, it’s hard to contradict. Yet we know about at least one transgression since Congress created the court in 1978 in response to the NSA’s previous abuses.
Under the court’s original charter, the NSA was required to provide it with the names of all U.S. citizens and residents it wished to monitor. Yet the George W. Bush administration issued a presidential order in 2002 authorizing the NSA to eavesdrop without court-approved warrants.

After the New York Times exposed the warrantless wiretapping program in 2005, Congress amended the law to weaken the court’s oversight and incorporate many of the formerly illegal eavesdropping activities conducted during the Bush years. Rather than individual warrants, the court can now approve vast, dragnet-style warrants, or orders, as they’re called. For example, the first document released by the Guardian was a top-secret order from the court requiring Verizon to hand over the daily telephone records of all its customers, including local calls.


Doug Mills/Associated Press
In 2002, President Bush toured the National Security Agency at Fort Meade, Md., with Lt. Gen. Michael V. Hayden, who was then the agency's director


3. Congress has a lot of oversight over the NSA.

This is the second part of the mantra from NSA Director Keith Alexander and other senior agency officials. Indeed, when the congressional intelligence committees were formed in 1976 and 1977, their emphasis was on protecting the public from the intelligence agencies, which were rife with abuses.
Today, however, the intelligence committees are more dedicated to protecting the agencies from budget cuts than safeguarding the public from their transgressions. Hence their failure to discover the Bush administration’s warrantless wiretapping activity and their failure to take action against the NSA’s gathering of telephone and Internet records.


NSA Director Keith Alexander


4. NSA agents break into foreign locations to steal codes and plant bugs.

According to intelligence sources, a number of years ago there was a large debate between the NSA and the CIA over who was responsible for conducting “black-bag jobs” — breaking into foreign locations to plant bugs and steal hard drives, or recruiting local agents to do the same. The NSA argued that it was in charge of eavesdropping on communications, known as signals intelligence, and that the data on hard drives counts. But the CIA argued that the NSA had responsibility only for information “in motion,” while the CIA was responsible for information “at rest.” It was eventually decided that the CIA’s National Clandestine Service would focus on stealing hard drives and planting bugs, and the NSA, through a highly secret unit known as Tailored Access Operations, would steal foreign data through cyber-techniques.

5. Snowden could have aired his concerns internally rather than leaking the documents.

I’ve interviewed many NSA whistleblowers, and the common denominator is that they felt ignored when attempting to bring illegal or unethical operations to the attention of higher-ranking officials. For example, William Binney and several other senior NSA staffers protested the agency’s domestic collection programs up the chain of command, and even attempted to bring the operations to the attention of the attorney general, but they were ignored. Only then did Binney speak publicly to me for an article in Wired magazine.



In a Q&A on the Guardian Web site, Snowden cited Binney as an example of “how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they’ll be destroyed for it: the conscience forbids it.”

And even when whistleblowers bring their concerns to the news media, the NSA usually denies that the activity is taking place. The agency denied Binney’s charges that it was obtaining all consumer metadata from Verizon and had access to virtually all Internet traffic. It was only when Snowden leaked the documents revealing the phone-log program and showing how PRISM works that the agency was forced to come clean.




 

June 17, 2013

Poll: Obama's Approval Rating and Trustworthiness Drops 8% in Polls







USA TODAY/ CNN

President Obama's support may be eroding amid reports of surveillance programs and Internal Revenue Service abuses.
A new CNN/ORC International poll gives Obama an approval rating of 45%, a drop of 8 percentage points over the past month.
Possible reasons: Reports of massive National Security Agency surveillance programs that gather phone numbers and Internet activity, the IRS targeting of conservative groups,...[and the reports of ultra-aggressive, press invasive investigations of leakers.--Esco]

"The drop in Obama's support is fueled by a dramatic 17-point decline over the past month among people under 30, who, along with black Americans, had been the most loyal part of the Obama coalition," says CNN polling director Keating Holland.

"The poll indicates that for the first time in Obama's presidency, half of the public says they don't believe he is honest and trustworthy.
"And Americans are split on the controversial National Security Agency anti-terrorism program to record metadata on U.S. phone calls, but they support the NSA program that targets records of Internet usage by people in other countries.

"That doesn't mean they necessarily like what is going on: Just over six in 10 believe that government is so large and powerful that it threatens the rights and freedoms of ordinary Americans."
------------------------------------

This segues perfectly to George Packer's concerns and remedies:


BIG BROTHER IN SILICON VALLEY


packer-silicon-valley-hacker.jpg
Photograph: Jeff Chiu/AP

GEORGE PACKER NEW YORKER

The word “HACK” is painted across the main square of Facebook’s campus in letters so large that they can be seen from space. The term has lost its negative connotation in Silicon Valley; freewheeling coding sessions and virtual breaking and entering have become the same thing. The culture of hacking is rebellious, idealistic, and militantly anti-bureaucratic—fitting for an age that glorifies entrepreneurship—and it marks a stark shift from the recent history of scientists in American life. During the heyday of the space program, rocket scientists and computer engineers worked closely with NASA officials. The bureaucrat and the geek were not polar opposites but complementary types who often seemed indistinguishable—straight arrows with an occasional streak of repressed weirdness. But, with the counterculture and the advent of the personal computer as a tool for individual liberation, John Glenn gave way to Steve Jobs, “Apollo 13” to “The Social Network.”

Now the National Security Agency’s data-mining story has fundamentally changed the public’s picture of Silicon Valley and its relation to the state. As I wrote in the magazine last month (now available online to non-subscribers), the Valley has, historically, kept as far away from Washington as possible. A strong, though not particularly ideological, strain of libertarianism appears to be coded into the DNA of computer engineers—a desire to be left alone to create beautiful systems that can be messed up only by the uncomprehending interference of mediocrities from the government. Partly as a result, information technology has been one of the country’s most lightly regulated industries....

But the opposition between tech and government has been breaking down recently, and in ways not limited to the N.S.A. program. Silicon Valley was always aware of the downsides to a relationship with Washington, but now it knows more about potential positives, not just in the growing influence of tech money in political campaigns and tech endorsements of individual candidates but in industry-led advocacy efforts on issues like immigration reform, and in the idea of technology as a solution for chronic social problems. Now, it turns out, the biggest companies in the computer business—Microsoft, Yahoo, Google, Facebook, and Apple, among others—have been giving vast amounts of user data to the government’s chief surveillance agency, in some cases for years. (The Washington Post obtained an N.S.A. document claiming that the government has access to the companies’ servers. The companies, using nearly identical legal language, deny it. Perhaps we’ll know more in the coming days.)

Is it really surprising that the brotherhood of hackers turns out to be more like central intelligence? It doesn’t take much of an imaginative leap to go from gathering every last move you make online, and sharing it with marketers and advertisers, to divulging it to spies. Google, Apple, and Facebook have long since stopped being mere instruments of individual empowerment through collecting and processing information. Benignly democratic terms like “open source” and “transparency”—still in ubiquitous use around Silicon Valley—have become outmoded distractions from the source of the tech giants’ phenomenal growth, which is data-mining and its monetization.

Yes, it’s voluntary—no one forces you to enter credit-card information on Home Depot’s Web site, or to let Facebook track every purchase you make on Amazon—whereas Prism, the N.S.A.’s top-secret program for mining e-mails, videos, chats, and other online communications, is not. Markets involve choice; laws do not. Being a consumer is discretionary; being a citizen isn’t. But Prism, for all its breathtaking reach and intrusiveness, is less creepy to me than all the trillions of bits of information that commercial companies have stored up on all of us, gathered through a sophisticated mix of temptations, deceptions, default settings, carelessness, and sheer market power. It’s sinister when Big Brother is watching you, but it’s even more sinister when Big Brother is you, sharing. Prism is designed to prevent terror attacks on Americans. Advertising algorithms are designed to increase Google’s and Facebook’s profits. Which involves more of a public benefit? Between career officials at the N.S.A. and marketing managers at social-media companies, I trust the former more than the latter to maintain my privacy and use the information they have on me with maximum restraint. (Private contractors like Booz Allen Hamilton are a different story—the outsourcing of national security is one of the worst post-9/11 trends.)

I’m sympathetic to the dilemma of technology companies that are faced with government requests for access to information. There is an interest in protecting their users’ privacy (or whatever is left of it), and there is an interest in protecting Americans from attack. The government hasn’t proved that the full breadth of the N.S.A.’s program is necessary to uncover, track, and stop terror plots. Its critics haven’t proved that the program has been abused, that the collection of so much abstract data has led to unwarranted specific intrusions. What the whole debate obviously needs is much more clarity—for the government to allow more daylight into the nature of its surveillance programs (its fanatical level of secrecy is at least partly self-serving and designed to thwart critics as much as terrorists), and for the companies to be allowed to stop lying about their involvement. If we are going to have an N.S.A. with such broad powers of surveillance, and a technology industry with such extensive involvement in that surveillance, both have to be monitored and regulated (a hated word in the Valley) much more heavily than they are. Members of the congressional intelligence committees need to be able to discuss what they know without resorting to elaborate circumlocutions, and White House officials need to try persuasion instead of mere assertion. Courts need to be able to reach decisions that are accountable to parties other than just the government itself. Reporters need to be able to dig up important stories—as long as they don’t put lives at risk—without fear of the Justice Department. Technology executives need to be able to describe their industry’s participation in language that’s at least translucent, if not transparent. And the public needs to be able to understand, and then judge, this latest manifestation of the ancient trade-off between liberty and security.....

June 10, 2013

HERO OR VILLAIN ?





JOHN CASSIDY, NEW YORKER

Is Edward Snowden, the twenty-nine-year-old N.S.A. whistle-blower who was last said to be hiding in Hong Kong awaiting his fate, [N.Y. Times reports he " checked out of a hotel in Hong Kong where he had been holed up for several weeks, according to two American officials. It was not clear where he went."] a hero or a traitor? He is a hero. (My colleague Jeffrey Toobin disagrees.) In revealing the colossal scale of the U.S. government’s eavesdropping on Americans and other people around the world, he has performed a great public service that more than outweighs any breach of trust he may have committed. Like Daniel Ellsberg, the former Defense Department official who released the Pentagon Papers, and Mordechai Vanunu, the Israeli nuclear technician who revealed the existence of Israel’s weapons program, before him, Snowden has brought to light important information that deserved to be in the public domain, while doing no lasting harm to the national security of his country.

Doubtless, many people inside the U.S. power structure—President Obama included—and some of its apologists in the media will see things differently. When Snowden told the Guardian that “nothing good” was going to happen to him, he was almost certainly right. In fleeing to Hong Kong, he may have overlooked the existence of its extradition pact with the United States, which the U.S. authorities will most certainly seek to invoke. The National Security Agency has already referred the case to the Justice Department, and James Clapper, Obama’s director of National Intelligence, has said that Snowden’s leaks have done “huge, grave damage” to “our intelligence capabilities.”

Before accepting such claims at face value, let’s remind ourselves of what the leaks so far have not contained. They didn’t reveal anything about the algorithms that the N.S.A. uses, the groups or individuals that the agency targets, or the identities of U.S. agents. They didn’t contain the contents of any U.S. military plans, or of any conversations between U.S. or foreign officials. As Glenn Greenwald, one of the journalists who broke the story, pointed out on “Morning Joe” today, this wasn’t a WikiLeaks-style data dump. “[Snowden] spent months meticulously studying every document,” Greenwald said. “He didn’t just upload them to the Internet.”

So, what did the leaks tell us? First, they confirmed that the U.S. government, without obtaining any court warrants, routinely collects the phone logs of tens of millions, perhaps hundreds of millions, of Americans, who have no links to terrorism whatsoever. If the publicity prompts Congress to prevent phone companies such as Verizon and A.T. & T. from acting as information-gathering subsidiaries of the spying agencies, it won’t hamper legitimate domestic-surveillance operations—the N.S.A. can always go to court to obtain a wiretap or search warrant—and it will be a very good thing for the country.
The second revelation in the leaks was that the N.S.A., in targeting foreign suspects, has the capacity to access vast amounts of user data from U.S.-based Internet companies such as Facebook, Google, Yahoo, Microsoft, and Skype. Exactly how this is done remains a bit murky. But it’s clear that, in the process of monitoring the communications of overseas militants and officials and the people who communicate with them, the N.S.A. sweeps up a great deal of online data about Americans, and keeps it locked away—seemingly forever.

Conceivably, the fact that Uncle Sam is watching their Facebook and Google accounts could come as news to some dimwit would-be jihadis in foreign locales, prompting them to communicate in ways that are harder for the N.S.A. to track. But it will hardly surprise the organized terrorist groups, which already go to great lengths to avoid being monitored. Not for nothing did Osama bin Laden’s compound in Abbottabad go without a phone or Internet connection.
Another Snowden leak, which Greenwald and the Guardian published over the weekend, was a set of documents concerning another secret N.S.A. tracking program with an Orwellian name: “Boundless Informant.” Apparently designed to keep Snowden’s former bosses abreast of what sorts of data it was collecting around the world, the program unveiled the vast reach of the N.S.A.’s activities. In March, 2013, alone, the Guardian reported, the N.S.A. collected ninety-seven billion pieces of information from computer networks worldwide, and three billion of those pieces came from U.S.-based networks.

It’s hardly surprising that the main targets for the N.S.A.’s data collection were Iran (fourteen billion pieces in that period) and Pakistan (more than thirteen billion), but countries such as Jordan, India, and Egypt, American allies all, may be a bit surprised to find themselves so high on the list. “We hack everyone everywhere,” Snowden told the Guardian. “We like to make a distinction between us and the others. But we are in almost every country in the world. We are not at war with these countries.”
For most Americans, the main concern will be domestic spying, and the chronic lack of oversight that Snowden’s leaks have highlighted. In the years since 9/11, the spying agencies have been given great leeway to expand their activities, with the Foreign Intelligence Surveillance Act Court, which deals with legal requests from the agencies, and the congressional intelligence committees, which nominally oversees all of their activities, all too often acting as rubber stamps rather than proper watchdogs.

Read more at JOHN CASSIDY, NEW YORKER

keefe-obama-nsa.jpg
THE NEW YORKER

After Barack Obama was elected to his first term as President but before he took the oath of office, Vice-President Dick Cheney gave an exit interview to Rush Limbaugh. Under George W. Bush, Cheney was the architect, along with his legal counsel, David Addington, of a dramatic expansion of executive authority—a power grab that Obama criticized, fiercely, on the campaign trail, and promised to “reverse.” But when Limbaugh inquired about this criticism Cheney swatted it aside, saying, “My guess is that, once they get here and they’re faced with the same problems we deal with every day, they will appreciate some of the things we’ve put in place.”



JEFFREY TOOBIN NEW YORKER

Edward Snowden, a twenty-nine-year-old former C.I.A. employee and current government contractor, has leaked news of National Security Agency programs that collect vast amounts of information about the telephone calls made by millions of Americans, as well as e-mails and other files of foreign targets and their American connections. For this, some, including my colleague John Cassidy, are hailing him as a hero and a whistle-blower. He is neither. He is, rather, a grandiose narcissist who deserves to be in prison.
Snowden provided information to the Washington Post and the Guardian, which also posted a video interview with him. In it, he describes himself as appalled by the government he served:

The N.S.A. has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.
I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.
What, one wonders, did Snowden think the N.S.A. did? Any marginally attentive citizen, much less N.S.A. employee or contractor, knows that the entire mission of the agency is to intercept electronic communications. Perhaps he thought that the N.S.A. operated only outside the United States; in that case, he hadn’t been paying very close attention. In any event, Snowden decided that he does not “want to live in a society” that intercepts private communications. His latter-day conversion is dubious.

And what of his decision to leak the documents? Doing so was, as he more or less acknowledges, a crime. Any government employee or contractor is warned repeatedly that the unauthorized disclosure of classified information is a crime. But Snowden, apparently, was answering to a higher calling. “When you see everything you realize that some of these things are abusive,” he said. “The awareness of wrongdoing builds up. There was not one morning when I woke up. It was a natural process.” These were legally authorized programs; in the case of Verizon Business’s phone records, Snowden certainly knew this, because he leaked the very court order that approved the continuation of the project. So he wasn’t blowing the whistle on anything illegal; he was exposing something that failed to meet his own standards of propriety. The question, of course, is whether the government can function when all of its employees (and contractors) can take it upon themselves to sabotage the programs they don’t like. That’s what Snowden has done.

{Esco cannot help but think of Hannah Arendt's concept of the "banality of evil" while reading this. Faceless bureaucrats mindlessly doing their jobs; just what the government needs so that it can function.]

What makes leak cases difficult is that some leaking—some interaction between reporters and sources who have access to classified information—is normal, even indispensable, in a society with a free press. It’s not easy to draw the line between those kinds of healthy encounters and the wholesale, reckless dumping of classified information by the likes of Snowden or Bradley Manning. Indeed, Snowden was so irresponsible in what he gave the Guardian and the Post that even these institutions thought some of it should not be disseminated to the public. ...
------
The American government, and its democracy, are flawed institutions. But our system offers legal options to disgruntled government employees and contractors. They can take advantage of federal whistle-blower laws; they can bring their complaints to Congress; they can try to protest within the institutions where they work. But Snowden did none of this. Instead, in an act that speaks more to his ego than his conscience, he threw the secrets he knew up in the air—and trusted, somehow, that good would come of it. We all now have to hope that he’s right.