Quotulatiousness

June 8, 2013

Feingold was right, back in 2001

Filed under: Government, Liberty, USA — Tags: , , , , , — Nicholas @ 09:42

Former US senator Russ Feingold was the only member of the senate to vote against the original Patriot Act:

He took a stand against the legislation because it increased the federal government’s authority exponentially and didn’t require enough judicial oversight.

Now here we are more than a decade later and it has been revealed that the U.S. government has been collecting massive amounts of data on millions of Americans every single day, using provisions found in the Patriot Act as justification.

Through the secret “PRISM” surveillance program and court orders compelling at least Verizon to provide records on all its customers, the FBI and NSA have enjoyed access to unthinkable amounts of Americans’ data, all without ever informing the public of alarming domestic surveillance.

In his address on the Senate floor in 2001, Former Sen. Feingold seemingly warned the U.S. about the exact thing so many Americans are outraged over today.

[. . .]

“In 2001, I first voted against the PATRIOT Act because much of it was simply an FBI wish list that included provisions allowing our government to go on fishing expeditions that collect information on virtually anyone,” the statement read. “Today’s report indicates that the government could be using FISA in an indiscriminate way that does not balance our legitimate concerns of national security with the necessity to preserve our fundamental civil rights.”

“This is deeply troubling. I hope today’s news will renew a serious conversation about how to protect the country while ensuring that the rights of law-abiding Americans are not violated,” he added.

June 7, 2013

Who is Glenn Greenwald?

Filed under: Government, Law, Liberty, USA — Tags: , , , , — Nicholas @ 08:14

The New York Times profiles Glenn Greenwald:

After writing intensely, even obsessively, for years about government surveillance and the prosecution of journalists, Glenn Greenwald has suddenly put himself directly at the intersection of those two issues, and perhaps in the cross hairs of federal prosecutors.

Late Wednesday, Mr. Greenwald, a lawyer and longtime blogger, published an article in the British newspaper The Guardian about the existence of a top-secret court order allowing the National Security Agency to monitor millions of telephone logs. The article, which included a link to the order, is expected to attract an investigation from the Justice Department, which has aggressively pursued leakers.

On Thursday night, he followed up with an article written with a Guardian reporter, Ewen MacAskill, that exposed an N.S.A. program, Prism, that has gathered information from the nation’s largest Internet companies going back nearly six years.

“The N.S.A. is kind of the crown jewel in government secrecy. I expect them to react even more extremely,” Mr. Greenwald said in a telephone interview. He said that he had been advised by lawyer friends that “he should be worried,” but he had decided that “what I am doing is exactly what the Constitution is about and I am not worried about it.”

May 9, 2013

The NSA’s guide to hacking Google searches

Filed under: Technology, USA — Tags: , , , , — Nicholas @ 10:34

Wired‘s Kim Zetter on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools:

There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

[. . .]

Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.

October 26, 2010

The intelligence bonanza of the 2001 American EP-3E incident

Filed under: China, Military, USA — Tags: , , , , , — Nicholas @ 12:30

If you cast your mind back far enough, you’ll remember the political impact of the mid-air collision between a Chinese fighter and an American EP-3E electronic surveillance aircraft. It certainly had the potential to turn into a major standoff between the two powers, but apparently the real story was the intelligence breach following the emergency landing:

On April 1, 2001, an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea, triggering the first international crisis of George W. Bush’s Administration. The Chinese jet crashed, and its pilot was killed, but the pilot of the American aircraft, Navy Lieutenant Shane Osborn, managed to make an emergency landing at a Chinese F-8 fighter base on Hainan Island, fifteen miles from the mainland. Osborn later published a memoir, in which he described the “incessant jackhammer vibration” as the plane fell eight thousand feet in thirty seconds, before he regained control.

The plane carried twenty-four officers and enlisted men and women attached to the Naval Security Group Command, a field component of the National Security Agency. They were repatriated after eleven days; the plane stayed behind. The Pentagon told the press that the crew had followed its protocol, which called for the use of a fire axe, and even hot coffee, to disable the plane’s equipment and software. These included an operating system created and controlled by the N.S.A., and the drivers needed to monitor encrypted Chinese radar, voice, and electronic communications. It was more than two years before the Navy acknowledged that things had not gone so well. “Compromise by the People’s Republic of China of undestroyed classified material . . . is highly probable and cannot be ruled out,” a Navy report issued in September, 2003, said.

The loss was even more devastating than the 2003 report suggested, and its dimensions have still not been fully revealed. Retired Rear Admiral Eric McVadon, who flew patrols off the coast of Russia and served as a defense attaché in Beijing, told me that the radio reports from the aircraft indicated that essential electronic gear had been dealt with. He said that the crew of the EP-3E managed to erase the hard drive — “zeroed it out” — but did not destroy the hardware, which left data retrievable: “No one took a hammer.” Worse, the electronics had recently been upgraded. “Some might think it would not turn out as badly as it did, but I sat in some meetings about the intelligence cost,” McVadon said. “It was grim.”

H/T to Bruce Schneier for the link.

« Newer Posts

Powered by WordPress