GREENWALD BACK IN COUNTRY THAT CALLS HIM AN ACCOMPLICE

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

 Guest Post from Glenn Greenwald’s The Intercept

 

By and
Featured photo - Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators
A secret document reveals how the NSA tracks down system administrators for surveillance. Illustration: Josh Begley.

 

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.

The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says.

The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” The posts, boastful and casual in tone, contain hacker jargon  (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. “Current mood: devious,” reads one, while another signs off, “Current mood: scheming.”

The author of the posts, whose name is being withheld by The Intercept, is a network specialist in the agency’s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the NSA’s controversial program to identify users of the Tor browser – a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world’s premier security and hacker conferences:

It is unclear how precise the NSA’s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems “probable” administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee’s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.

The NSA declined to answer questions about its efforts to hack system administrators or explain how it ensures Americans are not mistakenly targeted. Agency spokeswoman Vanee’ Vines said in an email statement: “A key part of the protections that apply to both U.S. persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with U.S. Attorney General-approved procedures to protect privacy rights.”

As The Intercept revealed last week, clandestine hacking has become central to the NSA’s mission in the past decade. The agency is working to aggressively scale its ability to break into computers to perform what it calls “computer network exploitation,” or CNE: the collection of intelligence from covertly infiltrated computer systems. Hacking into the computers of sys admins is particularly controversial because unlike conventional targets – people who are regarded as threats – sys admins are not suspected of any wrongdoing.

In a post calling sys admins “a means to an end,” the NSA employee writes, “Up front, sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network some admin takes care of.”

The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network’s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.

“What we’d really like is a personal webmail or Facebook account to target,” one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, “alternative selectors” like a webmail or Facebook account can be linked to a particular target. You can “dumpster-dive for alternate selectors in the big SIGINT trash can” the author suggests. Or “pull out your wicked Google-fu” (slang for efficient Googling) to search for any “official and non-official e-mails” that the targets may have posted online.

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.

“Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,” the author of the posts writes. (“Pwnage,” short for “pure ownage,” is gamer-speak for defeating opponents.) The author adds, triumphantly, “Yay! /throws confetti in the air.”

In one case, these tactics were used by the NSA’s British counterpart, Government Communications Headquarters, or GCHQ, to infiltrate the Belgian telecommunications company Belgacom. As Der Speigel revealed last year, Belgacom’s network engineers were targeted by GCHQ in a QUANTUM mission named “Operation Socialist” – with the British agency hacking into the company’s systems in an effort to monitor smartphones.

While targeting innocent sys admins may be surprising on its own, the “hunt sys admins” document reveals how the NSA network specialist secretly discussed building a “master list” of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest. One post outlines how this process would make it easier for the NSA’s specialist hacking unit, Tailored Access Operations (TAO), to infiltrate networks and begin collecting, or “tasking,” data:

Aside from offering up thoughts on covert hacking tactics, the author of these posts also provides a glimpse into internal employee complaints at the NSA. The posts describe how the agency’s spies gripe about having “dismal infrastructure” and a “Big Data Problem” because of the massive volume of information being collected by NSA surveillance systems. For the author, however, the vast data troves are actually something to be enthusiastic about.

“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” the author writes. “One of the coolest things about it is how much data we have at our fingertips.”

Micah Lee contributed to this report.

———

Documents published with this article:

Busted! – U.S. Tech Giants Knew Of NSA Spying Says Agency’s Senior Lawyer

Submitted by Michael Krieger of Liberty Blitzkrieg blog,

This is why I’ve been so confused and frustrated by the repeated reports of the behavior of the US government. When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.

The US government should be the champion for the internet, not a threat. They need to be much more transparent about what they’re doing, or otherwise people will believe the worst.

I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.

So it’s up to us — all of us — to build the internet we want. Together, we can build a space that is greater and a more important part of the world than anything we have today, but is also safe and secure. I‘m committed to seeing this happen, and you can count on Facebook to do our part.

– Facebook CEO, Mark Zuckerberg in a post last week

Last week, Mark Zuckerberg made headlines by posting about how he called President Barack Obama to express outrage and shock about the government’s spying activities. Of course, anyone familiar with Facebook and what is going on generally between private tech behemoths and U.S. intelligence agencies knew right away that his statement was one gigantic heap of stinking bullshit. Well now we have the proof.

Earlier today, the senior lawyer for the NSA made it completely clear that U.S. tech companies were fully aware of all the spying going on, including the PRISM program (on that note read my recent post: The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed).

So stop the acting all of you Silicon Valley CEOs. We know you are fully on board with extraordinary violations of your fellow citizens’ civil liberties. We know full well that you have been too cowardly to stand up for the values this country was founded on. We know you and your companies are compromised. Stop pretending, stop bullshitting. You’ve done enough harm.

From The Guardian:

The senior lawyer for the National Security Agency stated unequivocally on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting month of angry denials from the firms.

 

Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet.

 

Asked during at a Wednesday hearing of the US government’s institutional privacy watchdog if collection under the law, known as Section 702 or the Fisa Amendments Act, occurred with the “full knowledge and assistance of any company from which information is obtained,” De replied: “Yes.”

 

When the Guardian and the Washington Post broke the Prism story in June, thanks to documents leaked by whistleblower Edward Snowden, nearly all the companies listed as participating in the program – Yahoo, Apple, Google, Microsoft, Facebook and AOL –claimed they did not know about a surveillance practice described as giving NSA vast access to their customers’ data. Some, like Apple, said they had “never heard” the term Prism.

 

The disclosure of Prism resulted in a cataclysm in technology circles, with tech giants launching extensive PR campaigns to reassure their customers of data security and successfully pressing the Obama administration to allow them greater leeway to disclose the volume and type of data requests served to them by the government.

 

The NSA’s Wednesday comments contradicting the tech companies about the firms’ knowledge of Prism risk entrenching tensions with the firms NSA relies on for an effort that Robert Litt, general counsel for the director of national intelligence, told the board was “one of the most valuable collection tools that we have.”

Move along serfs, move along.

Full article here.

NO ESCAPING DRAGNET NATION

No Escaping Dragnet Nation

March 14, 2014

This week, as the chairwoman of the Senate Intelligence Committee Dianne Feinstein publicly accused the CIA of spying on her committee’s computers, Bill talks with investigative reporter Julia Angwin, author of Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance.

The book chronicles the indiscriminate tracking of our everyday lives — where government and business are stockpiling data about us at an unprecedented pace. Reporters are a prime target for Internet snooping, says Angwin, “Journalists are the canary in the coal mine. We’re the first ones to seriously feel the impact of total surveillance, which means we can’t protect our sources. But what happens next? What happens next is we’re not good watch dogs for democracy. And that’s a very worrisome situation.”

Angwin and Moyers also discuss our exposure to fraud from online data mining; why mass data collection is not making us safer in the face of terrorism and why European privacy regulations are stronger than those in the US.

Julia Angwin covered the business and technology beat at The Wall Street Journal for 13 years and is a Pulitzer Prize winner now working for the independent news organization ProPublica.

QUOTES OF THE DAY

“It is a fundamental principle of American democracy that laws should not be public only when it is convenient for government officials to make them public. They should be public all the time, open to review by adversarial courts, and subject to change by an accountable legislature guided by an informed public. If Americans are not able to learn how their government is interpreting and executing the law then we have effectively eliminated the most important bulwark of our democracy. That’s why, even at the height of the Cold War, when the argument for absolute secrecy was at its zenith, Congress chose to make US surveillance laws public. Without public laws, and public court rulings interpreting those laws, it is impossible to have informed public debate. And when the American people are in the dark, they can’t make fully informed decisions about who should represent them, or protest policies that they disagree with. These are fundamentals. It’s Civics 101. And secret law violates those basic principles. It has no place in America.”
Ron Wyden

“Authorities this broad give the national security bureaucracy the power to scrutinize the personal lives of every law-abiding American. Allowing that to continue is a grave error that demonstrates a willful ignorance of human nature. Moreover, it demonstrates a complete disregard for the responsibilities entrusted to us by the Founding Fathers to maintain robust checks and balances on the power of any arm of the government. That obviously raises some very serious questions. What happens to our government, our civil liberties and our basic democracy if the surveillance state is allowed to grow unchecked? As we have seen in recent days, the intelligence leadership is determined to hold on to this authority. Merging the ability to conduct surveillance that reveals every aspect of a person’s life with the ability to conjure up the legal authority to execute that surveillance, and finally, removing any accountable judicial oversight, creates the opportunity for unprecedented influence over our system of government.”
Ron Wyden

“It’s very, very difficult I think for us to have a transparent debate about secret programs approved by a secret court issuing secret court orders based on secret interpretations of the law.”
Tom Udall

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed

Guest Post by Mike Krieger

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Earlier this week, during a talk at SXSW, Edward Snowden pleaded with people to use encryption. While he admitted if the NSA targeted you individually they could almost certainly “own your computer,” he stated that if people use encryption on a massive scale it makes the NSA’s attempts to monitor everyone at the same time much more difficult.

Apparently, the NSA is well aware of this threat. Which is why we now know that the agency has been dedicating significant amounts of taxpayer dollars toward an attempt to infect millions of computers with malware in an attempt at “industrial-scale exploitation,” which would lead to them “owning the net.”

As Mikko Hypponen, an expert in malware stated:

“The NSA’s surveillance techniques could inadvertently be undermining the security of the Internet.”

Move along serfs, nothing to see here.

From The Intercept:

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

It sounds like that is precisely their intent…

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to securet internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Your tax dollars at works slaves.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.

According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.

Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.

According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.

Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.

“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”

In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”

GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing “active” hacking attacks for surveillance “may be illegal” under British law.

When even the GCHQ is questioning the legality of a surveillance program you know you’ve gone too far. Way too far.

Full article here.

In Liberty,
Michael Krieger

AUDACIOUS OLIGARCHY

Time to repost the Hangman poem. The last bastion of freedom are the truth telling blogs. The oligarchs will stop at nothing to crush dissent and silence the truth. Their wealth and power depends upon them using their control of the system to censor, subvert and use propaganda to control the masses. Know your enemy.

Guest Post by Jesse

US Government Officials Said To Be Working On ‘Media-Leak’ Legislation To Impose Censorship

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

In case you had not seen this, it is on the news wire from United Press International.

It seems that if this legislation is real, and is enacted, and that is a big IF, then all a government bureaucrat will have to do is to refuse to permit disclosure on topics that it considers to be too important for even the media to know. And they will be able to exercise a rather effective censorship over a compliant press.

But I think we can be confident that the government of any political party, or any future President, can be trusted to never abuse this power to gag the Press to cover up their mistakes, scandals, or extra-constitutional activities.

We will have to trust them. Because we won’t know if they are abusing that power because the information that they are will be .. classified.

Perhaps a secret independent court can be set up to review their decisions. All of its decisions will be, of course, classified.

I wonder if the students at Georgetown understood the implications of what their privileged ears were hearing, or if they even cared.

Audacious oligarchy, indeed.

UPI
NSA chief hints at ‘media-leak’ legislation
By Aileen Graef
March. 5, 2014

Journalists and press freedom have taken a hit from the government since Edward Snowden leaked NSA documents to the Guardian, Washington Post, and New York Times.

WASHINGTON, March 5 (UPI) — National Security Agency chief Gen. Keith Alexander was speaking at Georgetown University when he hinted that government officials were working on “media-leak legislation” that would presumably restrict the press from publishing any documents regarding national security that the government doesn’t approve for disclosure.

The NSA director said that the U.K. was right in detaining David Miranda, partner of journalist Glenn Greenwald who first published the Snowden files at the Guardian, on terrorism charges and seizing all of his files. Alexander said the actions were justified in the interests of national security.

“Journalists have no standing with national security issues,” said Alexander. “They don’t know how to weigh the fact of what they’re giving out and saying, is it in the nation’s interest to divulge this. My personal opinion: These leaks have caused grave, significant, and irreversible damage to our nation and to our allies. It will take us years to recover.”

He went on to say that they are making headway on “media-leak legislation.” No one knows exactly what this legislation is, but it will more than likely face resistance from journalists who would like to see full freedom of the press maintained under the First Amendment.

Reddit Censors Big Story About Government Manipulation and Disruption of the Internet

The moderators at the giant r/news reddit (with over 2 million readers) repeatedly killed the Greenwald/Snowden story on government manipulation and disruption of the Internet … widely acknowledged to be one of the most important stories ever leaked by Snowden.

Similarly, the moderators at the even bigger r/worldnews reddit (over 5 million readers) repeatedly deleted the story, so that each new post had to start over at zero.

For example, here are a number of posts deleted from r/news (click any image for much larger/clearer version):

Related posts from other sites – like 21stCenturyWire – were deleted as well:

 

And here are a number of the posts deleted by the moderators of r/worldnews:

 

Write-ups of the same story from other sites – like Zero Hedge – were also deleted:

Two Redditors provide further information on the censorship of this story:

This isn’t the first time Reddit moderators have been caught censoring:

Source links: Here, here, here, here, here and here.

The NSA’s Secret Role in the U.S. Assassination Program

The NSA’s Secret Role in the U.S. Assassination Program
By Jeremy Scahill and Glenn Greenwald
The Intercept
February 10, 2014
EXCERPT – for full article see:
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.

“They might have been terrorists,” he says. “Or they could have been family members who have nothing to do with the target’s activities.”

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”

The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision.

In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.”

But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.

The NSA declined to respond to questions for this article. Caitlin Hayden, a spokesperson for the National Security Council, also refused to discuss “the type of operational detail that, in our view, should not be published.”

In describing the administration’s policy on targeted killings, Hayden would not say whether strikes are ever ordered without the use of human intelligence. She emphasized that “our assessments are not based on a single piece of information. We gather and scrutinize information from a variety of sources and methods before we draw conclusions.”

Hayden felt free, however, to note the role that human intelligence plays after a deadly strike occurs. “After any use of targeted lethal force, when there are indications that civilian deaths may have occurred, intelligence analysts draw on a large body of information – including human intelligence, signals intelligence, media reports, and surveillance footage – to help us make informed determinations about whether civilians were in fact killed or injured.”

The government does not appear to apply the same standard of care in selecting whom to target for assassination. The former JSOC drone operator estimates that the overwhelming majority of high-value target operations he worked on in Afghanistan relied on signals intelligence, known as SIGINT, based on the NSA’s phone-tracking technology.

“Everything they turned into a kinetic strike or a night raid was almost 90 percent that,” he says. “You could tell, because you’d go back to the mission reports and it will say ‘this mission was triggered by SIGINT,’ which means it was triggered by a geolocation cell.”

In July, the Washington Post relied exclusively on former senior U.S. intelligence officials and anonymous sources to herald the NSA’s claims about its effectiveness at geolocating terror suspects.

Within the NSA, the paper reported, “A motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’”

But the Post article included virtually no skepticism about the NSA’s claims, and no discussion at all about how the unreliability of the agency’s targeting methods results in the killing of innocents.

In fact, as the former JSOC drone operator recounts, tracking people by metadata and then killing them by SIM card is inherently flawed. The NSA “will develop a pattern,” he says, “where they understand that this is what this person’s voice sounds like, this is who his friends are, this is who his commander is, this is who his subordinates are. And they put them into a matrix. But it’s not always correct. There’s a lot of human error in that.”

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Bryant describes the program as highly compartmentalized: Drone operators taking shots at targets on the ground have little idea where the intelligence is coming from.

“I don’t know who we worked with,” Bryant says. “We were never privy to that sort of information. If the NSA did work with us, like, I have no clue.”

During the course of his career, Bryant says, many targets of U.S. drone strikes evolved their tactics, particularly in the handling of cell phones. “They’ve gotten really smart now and they don’t make the same mistakes as they used to,” he says. “They’d get rid of the SIM card and they’d get a new phone, or they’d put the SIM card in the new phone.”

As the former JSOC drone operator describes – and as classified documents obtained from Snowden confirm – the NSA doesn’t just locate the cell phones of terror suspects by intercepting communications from cell phone towers and Internet service providers. The agency also equips drones and other aircraft with devices known as “virtual base-tower transceivers” – creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge.

That, in turn, allows the military to track the cell phone to within 30 feet of its actual location, feeding the real-time data to teams of drone operators who conduct missile strikes or facilitate night raids.

The NSA geolocation system used by JSOC is known by the code name GILGAMESH. Under the program, a specially constructed device is attached to the drone. As the drone circles, the device locates the SIM card or handset that the military believes is used by the target.

Relying on this method, says the former JSOC drone operator, means that the “wrong people” could be killed due to metadata errors, particularly in Yemen, Pakistan and Somalia. “We don’t have people on the ground – we don’t have the same forces, informants, or information coming in from those areas – as we do where we have a strong foothold, like we do in Afghanistan. I would say that it’s even more likely that mistakes are made in places such as Yemen or Somalia, and especially Pakistan.”

As of May 2013, according to the former drone operator, President Obama had cleared 16 people in Yemen and five in Somalia for targeting in strikes. Before a strike is green-lit, he says, there must be at least two sources of intelligence. The problem is that both of those sources often involve NSA-supplied data, rather than human intelligence (HUMINT).

As the former drone operator explains, the process of tracking and ultimately killing a targeted person is known within the military as F3: Find, Fix, Finish. “Since there’s almost zero HUMINT operations in Yemen – at least involving JSOC – every one of their strikes relies on signals and imagery for confirmation: signals being the cell phone lock, which is the ‘find’ and imagery being the ‘unblinking eye’ which is the ‘fix.’” The “finish” is the strike itself.

“JSOC acknowledges that it would be completely helpless without the NSA conducting mass surveillance on an industrial level,” the former drone operator says. “That is what creates those baseball cards you hear about,” featuring potential targets for drone strikes or raids.

President Obama signs authorizations for “hits” that remain valid for 60 days. If a target cannot be located within that period, it must be reviewed and renewed. According to the former drone operator, it can take 18 months or longer to move from intelligence gathering to getting approval to actually carrying out a strike in Yemen. “What that tells me,” he says, “is that commanders, once given the authorization needed to strike, are more likely to strike when they see an opportunity – even if there’s a high chance of civilians being killed, too – because in their mind they might never get the chance to strike that target again.”

While drones are not the only method used to kill targets, they have become so prolific that they are now a standard part of U.S. military culture. Remotely piloted Reaper and Predator vehicles are often given nicknames. Among those used in Afghanistan, says the former JSOC drone operator, were “Lightning” and “Sky Raider.”

The latter drone, he adds, was also referred to as “Sky Raper,” for a simple reason – “because it killed a lot of people.” When operators were assigned to “Sky Raper,” he adds, it meant that “somebody was going to die. It was always set to the most high-priority missions.”

In addition to the GILGAMESH system used by JSOC, the CIA uses a similar NSA platform known as SHENANIGANS. The operation – previously undisclosed – utilizes a pod on aircraft that vacuums up massive amounts of data from any wireless routers, computers, smart phones or other electronic devices that are within range.

One top-secret NSA document provided by Snowden is written by a SHENANIGANS operator who documents his March 2012 deployment to Oman, where the CIA has established a drone base. The operator describes how, from almost four miles in the air, he searched for communications devices believed to be used by Al Qaeda in the Arabian Peninsula in neighboring Yemen.The mission was code named VICTORYDANCE.

“The VICTORYDANCE mission was a great experience,” the operator writes. “It was truly a joint interagency effort between CIA and NSA. Flights and targets were coordinated with both CIAers and NSAers. The mission lasted 6 months, during which 43 flights were flown.”

VICTORYDANCE, he adds, “mapped the Wi-Fi fingerprint of nearly every major town in Yemen.”

The NSA has played an increasingly central role in drone killings over the past five years. In one top-secret NSA document from 2010, the head of the agency’s Strategic Planning and Policy Division of the Counterterrorism Mission Management Center recounts the history of the NSA’s involvement in Yemen. Shortly before President Obama took office, the document reveals, the agency began to “shift analytic resources to focus on Yemen.”

In 2008, the NSA had only three analysts dedicated to Al Qaeda in the Arabian Peninsula in Yemen. By the fall of 2009, it had 45 analysts, and the agency was producing “high quality” signal intelligence for the CIA and JSOC.

In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen.

The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala.

The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children. It is not clear whether the strike was based on metadata collection; the White House has never publicly explained the strike or the source of the faulty intelligence that led to the civilian fatalities.

Another top-secret NSA document confirms that the agency “played a key supporting role” in the drone strike in September 2011 that killed U.S. citizen Anwar al-Awlaki, as well as another American, Samir Khan. According to the 2013 Congressional Budget Justification, “The CIA tracked [Awlaki] for three weeks before a joint operation with the U.S. military killed” the two Americans in Yemen, along with two other people.

When Brandon Bryant left his Air Force squadron in April 2011, the unit was aiding JSOC in its hunt for the American-born cleric. The CIA took the lead in the hunt for Awlaki after JSOC tried and failed to kill him in the spring of 2011.

According to Bryant, the NSA’s expanded role in Yemen has only added to what he sees as the risk of fatal errors already evident in CIA operations. “They’re very non-discriminate with how they do things, as far as you can see their actions over in Pakistan and the devastation that they’ve had there,” Bryant says about the CIA. “It feels like they tried to bring those same tactics they used over in Pakistan down to Yemen. It’s a repeat of tactical thinking, instead of intelligent thinking.”

hose within the system understand that the government’s targeting tactics are fundamentally flawed. According to the former JSOC drone operator, instructors who oversee GILGAMESH training emphasize: “‘This isn’t a science. This is an art.’ It’s kind of a way of saying that it’s not perfect.”

Yet the tracking “pods” mounted on the bottom of drones have facilitated thousands of “capture or kill” operations in Afghanistan, Iraq, Yemen, Somalia and Pakistan since September 11. One top-secret NSA document provided by Snowden notes that by 2009, “for the first time in the history of the U.S. Air Force, more pilots were trained to fly drones … than conventional fighter aircraft,” leading to a “‘tipping point’ in U.S. military combat behavior in resorting to air strikes in areas of undeclared wars,” such as Yemen and Pakistan.

The document continues: “Did you ever think you would see the day when the U.S. would be conducting combat operations in a country equipped with nuclear weapons without a boot on the ground or a pilot in the air?”

Even NSA operatives seem to recognize how profoundly the agency’s tracking technology deviates from standard operating methods of war.

One NSA document from 2005 poses this question: “What resembles ‘LITTLE BOY’ (one of the atomic bombs dropped on Japan during World War II) and as LITTLE BOY did, represents the dawn of a new era (at least in SIGINT and precision geolocation)?”

Its reply: “If you answered a pod mounted on an Unmanned Aerial Vehicle (UAV) that is currently flying in support of the Global War on Terrorism, you would be correct.”

Another document boasts that geolocation technology has “cued and compressed numerous ‘kill chains’ (i.e. all of the steps taken to find, track, target, and engage the enemy), resulting in untold numbers of enemy killed and captured in Afghanistan as well as the saving of U.S. and Coalition lives.”

The former JSOC drone operator, however, remains highly disturbed by the unreliability of such methods. Like other whistleblowers, including Edward Snowden and Chelsea Manning, he says that his efforts to alert his superiors to the problems were brushed off. “The system continues to work because, like most things in the military, the people who use it trust it unconditionally,” he says.

When he would raise objections about intelligence that was “rushed” or “inaccurate” or “outright wrong,” he adds, “the most common response I would get was ‘JSOC wouldn’t spend millions and millions of dollars, and man hours, to go after someone if they weren’t certain that they were the right person.’ There is a saying at the NSA: ‘SIGINT never lies.’ It may be true that SIGINT never lies, but it’s subject to human error.”

The government’s assassination program is actually constructed, he adds, to avoid self-correction. “They make rushed decisions and are often wrong in their assessments. They jump to conclusions and there is no going back to correct mistakes.” Because there is an ever-increasing demand for more targets to be added to the kill list, he says, the mentality is “just keep feeding the beast.”

For Bryant, the killing of Awlaki – followed two weeks later by the killing of his 16-year-old son, Abdulrahman al Awlaki, also an American citizen – motivated him to speak out. Last October, Bryant appeared before a panel of experts at the United Nations – including the UN’s special rapporteur on human rights and counterterrorism, Ben Emmerson, who is currently conducting an investigation into civilians killed by drone strikes.

Dressed in hiking boots and brown cargo pants, Bryant called for “independent investigations” into the Obama administration’s drone program. “At the end of our pledge of allegiance, we say ‘with liberty and justice for all,’” he told the panel. “I believe that should be applied to not only American citizens, but everyone that we interact with as well, to put them on an equal level and to treat them with respect.”

Unlike those who oversee the drone program, Bryant also took personal responsibility for his actions in the killing of Awlaki. “I was a drone operator for six years, active duty for six years in the U.S. Air Force, and I was party to the violations of constitutional rights of an American citizen who should have been tried under a jury,” he said. “And because I violated that constitutional right, I became an enemy of the American people.”

Bryant later told The Intercept, “I had to get out because we were told that the president wanted Awlaki dead. And I wanted him dead. I was told that he was a traitor to our country…. I didn’t really understand that our Constitution covers people, American citizens, who have betrayed our country. They still deserve a trial.”

The killing of Awlaki and his son still haunt Bryant. The younger Awlaki, Abdulrahman, had run away from home to try to find his dad, whom he had not seen in three years. But his father was killed before Abdulrahman could locate him. Abdulrahman was then killed in a separate strike two weeks later as he ate dinner with his teenage cousin and some friends. The White House has never explained the strike.

“I don’t think there’s any day that goes by when I don’t think about those two, to be honest,” Bryant says. “The kid doesn’t seem like someone who would be a suicide bomber or want to die or something like that. He honestly seems like a kid who missed his dad and went there to go see his dad.”

Last May, President Obama acknowledged that “the necessary secrecy” involved in lethal strikes “can end up shielding our government from the public scrutiny that a troop deployment invites. It can also lead a president and his team to view drone strikes as a cure-all for terrorism.”

But that, says the former JSOC operator, is precisely what has happened. Given how much the government now relies on drone strikes – and given how many of those strikes are now dependent on metadata rather than human intelligence – the operator warns that political officials may view the geolocation program as more dependable than it really is.

“I don’t know whether or not President Obama would be comfortable approving the drone strikes if he knew the potential for mistakes that are there,” he says. “All he knows is what he’s told.”

Whether or not Obama is fully aware of the errors built into the program of targeted assassination, he and his top advisors have repeatedly made clear that the president himself directly oversees the drone operation and takes full responsibility for it. Obama once reportedly told his aides that it “turns out I’m really good at killing people.”

The president added, “Didn’t know that was gonna be a strong suit of mine.”

NOW THAT IS PRICELESS

Putin is an all-star in the major leagues of the spy world and Obama is hitting below the Mendoza line in Single A ball. The Russians continue to make Obama and the western world look like fools and amateurs. They intercepted damning conversations by top American officials that prove the Fascist States of America are behind the violent uprisings in the Ukraine. Our friends in the CIA are up to their old tricks.

But the absolute priceless quote of the day is from  State Department government drone Jen Psaki who acted appalled at the dastardly actions of the Ruskies. 

“It’s concerning that private conversation was recorded.”

An American government spokeswhore has the fucking balls to be outraged by having private conversations recorded by a foreign government. Do these drones understand the concepts of irony and hypocrisy?Obama and his NSA scum sucking spy agency hoover up every conversation on the face of the earth to be used at a future time against anyone they declare an enemy of the state, but they are outraged by the Russians recording a discussion among people who want to do damage to their interests by fomenting a revolution in the Ukraine.

I absolutely love seeing the United States government revealed as the evil fascists they pretend to fight. And they call Edward Snowden a traitor. Know your true enemy.

 

State Department Confirms Authenticity Of Intercepted Ukraine Phone Call: Accuses Russia Of Dirty Tricks

Tyler Durden's picture

If there was any doubt whether the intercepted “Fuck the EU” phone call between Assistant Secretary of State Nuland and the US Ambassador to the Ukraine Pyatt was authentic, it can now be laid to rest: in an earlier response to questions from reporters, State Department spokeswoman Jen Psaki did not dispute authenticity of recording and essentially confirmed it was real “I didn’t say it was inauthentic.”

However, in the tried and true fashion of assigning blame elsewhere, the world learned that it was really all Russia’s fault and the released intercept was a “new low of Russian tradecraft.” Psaki added that there are moments “in every diplomatic relationship” when you disagree, Psaki says. But the absolute punchline: “It’s concerning that private conversation was recorded.

Perhaps maybe the NSA can opine on the concernability of a private conversation being recorded.

Then again in a world in which only the NSA is allowed to record every single private conversation, one can easily see why the State Dept thought it was safe to discuss its state subordination strategy over what appears to have been an unencrypted landline. At least the CIA used to communicate by encrypted redlines.

Finally, while Russian “tradecraft” may have hit a new low, so did US reputation and standing abroad, however offset by the humiliation and embarrassment of US foreign policymakers which has never been higher.

WHO DO YOU TRUST?

 

“There is no spying on Americans. We don’t have a domestic spying program.” —President Barack Obama (8-6-13)

“The NSA doesn’t limit itself to foreign intelligence, it collects all communications that transit the United States.” —Edward Snowden (6-6-13)

RANDROIDS TAKE NOTE

Was Rand Paul a spineless, corrupt douchebag before he was elected to the US Senate or has the republican party done their magic with him.  Maybe it was his trip to the wailing wall… One thing is sure, Rand Paul will never be president and will never accomplish jack shit in the US Senate.  What he has attained, at the price of flushing down the toilet every decent thing he was ever exposed to by his father, is a national platform for six years to be an attention whore.  I’m sure it was worth it.

Rand Paul: I Never Said Snowden Is a Hero; He Should Be Tried

What are Rand’s fanboys going to say about this? It doesn’t get much clearer.In a letter to WSJ, Rand wrote:

Edward Snowden broke the law. There are penalties for breaking the law, and I believe he should be prosecuted. I do not overlook or believe our country should condone people who have access to military secrets to reveal those secrets.

Rand does go on in the remainder of the letter to muddy his view above, but this is typical Rand, trying to take both sides of an issue:

You claim “in essence” I’ve asked for a plea bargain for Mr. Snowden. I’ve made no specific legal judgment other than to say that I do support laws against national security leaks. I have not argued, as you allege, that Mr. Snowden is a hero. I have stated that history will decide.

Further, his leaks that had nothing to do with unconstitutional domestic surveillance may have caused real damage to our national security and relations with other countries.

There are advantages to having Mr. Snowden face trial: We could determine how he breached our security and to what extent and how much information was shared with foreign countries. Ruling out the harsher end of the sentencing spectrum might encourage him to return for trial.

Standing trial would allow a judge to determine whether Mr. Snowden’s law-breaking served a higher purpose and thus sentence him accordingly and also whether some of his actions went too far in endangering our security and aiding our enemies, and also sentence him for that accordingly.

But legally and morally, the actions of the individual lawbreaker must be weighed against the government law-breaking that he went to great lengths to reveal. I do not believe we must give up this much of our liberty for security, nor do I apologize for standing up for the Fourth Amendment, which restricts such frighteningly unlimited power.

Note: The purpose of a trial is not to find out how someone was able to accomplish certain things, it is to determine guilt or innocence. Rand’s statement:

There are advantages to having Mr. Snowden face trial: We could determine how he breached our security and to what extent and how much information was shared with foreign countries.

is idiotic.

Thanks to Bob Wenzel, economicpolicyjournal.com

SERVANTS OF SECURITY APPARATUS

Greenwald: US, British media are servants of security apparatus

Published time: December 27, 2013 22:23

Journalist Glenn Greenwald condemned the mainstream media during an address at a German computer conference on Friday and accused his colleagues of failing to challenge erroneous remarks routinely made by government officials around the globe.

Thousands of attendees at the thirtieth annual Chaos Communication Congress in Hamburg packed into a room to watch the 46-year-old lawyer-turned-columnist present a keynote address delivered less than seven months after he started working with former National Security Agency contractor Edward Snowden.

Revelations contained in leaked documents supplied by Snowden to Greenwald and other journalists have sparked international outrage and efforts to reform the far-reaching surveillance operations waged by the NSA and intelligence officials in allied nations. But speaking remotely from Brazil this week, Greenwald argued that the media establishment at large is guilty of failing significantly with respect to accomplishing its most crucial role: keeping governments in check.

When Greenwald and his colleagues began working with Snowden, he said they realized that they’d have to act in a way that wasn’t on par with how the mainstream media has acted up until now.

We resolved that we were going to have to be very disruptive of the status quo — not only the surveillance and political status quo, but also the journalistic status quo,” Greenwald said. “And I think one of the ways that you can see what it is that we were targeting is in the behavior of the media over the past six months since these revelations have emerged almost entirely without them and despite them.”

[W]e knew in particular that one of our most formidable adversaries was not simply going to be the intelligence agencies on which we were reporting and who we were trying to expose, but also their most loyal, devoted servants, which calls itself the United States and British media.”

It really is the case that the United States and British governments are not only willing but able to engage in any conduct no matter how grotesque,” Greenwald said. Nevertheless, he added, journalists tasked with reporting on those issues have all too often been compliant with the blatant lies made by officials from those governments.

Halfway through his remarks, Greenwald recalled a recent quip he made while being interviewed by BBC about the necessity of a functioning media in an environment where government officials can spew untruths to reporters without being questioned.

[A]t one point I made what I thought was the very unremarkable and uncontroversial observation that the reason why we have a free press is because national security officials routinely lie to the population in order to shield their power and get their agenda advanced,” recalled Greenwald, who said it is both the “the goal and duty of a journalist is to be adversarial to those people in power.”

According to Greenwald, the BBC reporter met his remark with skepticism.

I just cannot believe that you would suggest that senior officials, generals in the US and the British government, are actually making false claims to the public,” he remembered being told on-air.

It really is the central view of certainly American and British media stars, that when — especially people with medals on their chest who are called generals, but also high officials in the government — make claims that those claims are presumptively treated as true without evidence. And that it’s almost immoral to call them into question or to question their voracity,” he said.

Obviously we went through the Iraq War, in which those very two same governments specifically and deliberately lied repeatedly to the government, to their people, over the course of two years to justify an aggressive war that destroyed a country of 26 million people. But we’ve seen it continuously over the last six months as well.”

From there, he went on to cite the example of US Director of National Intelligence James Clapper, who earlier this year made remarks to Congress that were quickly proved false by documents leaked to Greenwald by Mr. Snowden. The very first National Security Agency document he was shown, Greenwald said, “revealed that the Obama administration had succeeded in convincing court, a secret court, to compel phone companies to turn over to the NSA every single phone record of every single telephone call.”

Clapper “went to the Senate and lied to their faces…which is at least as serious of a crime as anything Edward Snowden is accused of,” Greenwald added.

But DNI Clapper aside, Greenwald said that the established media continues to reject the notion that government officials spew lies. Snowden’s NSA documents have exposed those fibs on more than one occasion, he noted, yet reporters around the world continue to take the word of officials as fact rather than dig from the truth.

Their role is not to be adversarial. Their role is to be loyal spokespeople to those powerful factions that they pretend to exercise oversight,” Greenwald said.

But as the US, UK and other governments continue to feed the media lies, Greenwald said their operations are far from being single-pronged. The US “knows that its only hope for continuing to maintain its regiment of secrecy behind which it engages with radical and corrupt acts is to intimidate and deter and threaten people who are would-be whistleblowers and transparency activists from coming forward and doing what it is that they do by showing them that they’ll be subjected to even the most extreme punishments and there’s nothing that they can do about it,” he said. “And it’s an effective tactic.”

Ironically, he added, those nations are “fueling the fire of this activism with their own abusive behavior.”

Meanwhile, NSA reform may not happen as quickly as Greenwald, Snowden and others have hoped; despite a series of considerable victories for privacy advocates as of late, a federal judge in New York said moments before Friday’s address that the surveillance policies exposed by those leaks are not in violation of the US Constitution. The American Civil Liberties Union sued DNI Clapper in June after Greenwald and others wrote that the government was compelling telecoms for telephony metadata pertaining to millions of Americans. But District Judge William Pauley wrote on Friday that “Whether the Fourth Amendment protects bulk telephony metadata is ultimately a question of reasonableness.”

And while Judge Pauley and proponents of that program and similar surveillance operations continue to call the NSA’s efforts imperative in America’s war on terror, Greenwald said at Friday’s conference that their intention is much more sinister than stopping another 9/11 from occurring.

The NSA’s goal, Greenwald said, is to “ensure that all forms of human communication . . .are collected, monitored, stored and analyzed by that agency and by their allies.”

RAND PAUL vs. THE NSA TRAITORS

Who has betrayed the trust of the American people? Edward Snowden or the NSA & Obama?

Who are the real traitors, treating the Constitution like toilet paper?

I’m glad there is one voice in Congress telling the truth and realizing the true enemy of the people.

Is it a surprise his last name is Paul?

 

Rand Paul Plots NSA Class-Action Lawsuit Options

The anti-surveillance senator has recruited ‘hundreds of thousands’ of plaintiffs

December 17, 2013

Sen. Rand Paul, R-Ky., speaks with the news media after delivering a speech at the Detroit Economic Club on Dec. 6, 2013, in Detroit, Michigan.

After months of consideration, Sen. Rand Paul, R-Ky., is moving closer to filing a lawsuit in federal court against National Security Agency surveillance programs.

A senior Paul staffer says U.S. District Court Judge Richard Leon’s Monday decision that NSA opponents have standing to sue over the bulk collection of phone records makes Paul “much more likely” to file his own lawsuit.

[READ: Judge Orders NSA to Stop Collecting Phone Records]

The senior staffer, who spoke with U.S. News on background, says hundreds of thousands of people volunteered online as possible plaintiffs after Paul first floated the idea of a class-action lawsuit in June.

The senator has not firmly decided to file suit and it’s still possible Paul will choose to instead assist with three already-filed lawsuits against the NSA.

If Paul does file a lawsuit it would be the fourth major legal attack against the NSA’s bulk collection and five-year storage of American phone records.

Lawsuits against the phone-record collection are already filed in federal court by the American Civil Liberties Union in New York, by conservative legal activist Larry Klayman of Freedom Watch in Washington, D.C., and by the Electronic Frontier Foundation in San Francisco.

Klayman won a major victory against the NSA on Monday, with Leon ruling the phone record program is likely a violation of the Fourth Amendment. Leon granted a preliminary injunction barring the collection, but stayed implementation pending appeal.

Unlike the possible Paul lawsuit, Klayman only sought a handful of original plaintiffs. He is seeking for the “class” he represents to be defined by Leon to include all Americans affected by the program, which purportedly helps scuttle terrorist plots – an accomplishment Leon disputed.

The senior Paul staffer stressed that Paul is currently evaluating strategy options. If a lawsuit is filed, it would likely be in either D.C. or Kentucky. It’s unclear which Paul-affiliated entity would file the challenge.

“As of now the senator is in the process of finding the best lawyer to file the [possible] suit [and] is still accepting more plaintiffs for the case,” Paul spokeswoman Eleanor May said.

[ALSO: Second Judge ‘Skeptical’ About Legal Case for NSA Surveillance]

The website of Paul’s political action committee, RANDPAC, currently has a pop-up advertisement that asks prospective plaintiffs to provide their name, email address and ZIP code. The ad says it seeks 10 million plaintiffs and asks for “a generous donation to help rally up to ten million Americans to support my lawsuit to stop Big Brother.”

Regardless of the legal approach selected, the senior staffer said Paul’s footwork to seek plaintiffs should help with possible standing issues, which have historically – although not in the initial Klayman case decision – derailed anti-surveillance lawsuits.

The pending EFF and ACLU lawsuits also do not have a large number of individuals named as plaintiffs. The EFF lawsuit is brought by a coalition of advocacy groups and the ACLU’s challenge is brought by the organization itself, as a customer of Verizon Business Network Services, the entity specified in an officially recognized court order leaked by Edward Snowden.

Although Judge Leon took a preliminary sledgehammer to the Justice Department’s legal argument and U.S. District Court Judge William Pauley of New York is also considering an injunction request from the ACLU, the Paul staffer stressed the legal fight may take a while to resolve and said the senator wouldn’t be too late to have a meaningful impact.

In the sweeping Monday victory for NSA critics, Leon ruled Klayman had standing to challenge the phone record collection, that his court had the authority to review Foreign Intelligence Surveillance Court actions, that the landmark 1979 case Smith v. Maryland was ill-suited to justify the surveillance and that the program likely violates the Fourth Amendment.

[BROWSE: Editorial Cartoons on the NSA]

Leon described the collection as “almost-Orwellian” and said “the government does not cite a single instance in which analysis of the NSA’s bulk metadata collection actually stopped an imminent attack, or otherwise aided the government in achieving any objective that was time-sensitive.”

Paul, who has introduced legislation to ease standing issues and also to forbid indiscriminate collection of Americans’ records, applauded Leon’s decision Monday.

“I will continue to fight against the violations of Americans’ constitutional rights through illegal phone surveillance until it is stopped once and for all,” he said in a release.

In addition to considering a lawsuit against the phone record collection, Paul is also looking at legal options against NSA Internet programs. Klayman is currently suing to halt the PRISM Internet program, but Leon did not grant an injunction in that case.

MUST BE SEEN TO BE BELIEVED

I thought the emblem below was a joke, designed to make our government look bad. But, I was wrong.

The US National Reconnaissance Office launched a top-secret surveillance satellite into space Thursday evening, and the official emblem for the spy agency’s latest mission is a malevolent octopus with furrowed brows that also happens to be wrapping its tentacles around all corners of the Earth.

The Office of the Director of National Intelligence live-tweeted Thursday’s launch from Vandenberg Air Force Base in California. It’s almost as if our Orwellian masters want to shove our faces in the fact that they know everything we do, say, or think.

Now that Snowden has revealed their worldwide spying on every U.S. citizen and foreign leader, they seem relieved to just glory in their authoritarian rule, with no fear of retribution or rebuke. We’ve passed the point of no return. This government is out of control and will have to be taken down by force. I love my country, but hate my government. Tyrants must be treated like the criminals they are.

Embedded image permalink

WITH ALLIES LIKE THIS, WHO NEEDS ENEMIES?

US has been sharing unfiltered intelligence with Israel, including the private data of American citizens – according to a confidential document that was part of whistleblower Edward Snowden’s leaks. It shows that Washington set no limits as to how its ally could use the information.