WHISTLEBLOWERS

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, August 21, 2013

NSA SPIES ON U.S. CITIZENS-LIED ABOUT IT

Posted on 12:10 PM by Unknown

FROM THE WALL STREET JOURNAL


    By 
  • SIOBHAN GORMAN
  •  and 
  • JENNIFER VALENTINO-DEVRIES
  •  
  • CONNECT
WASHINGTON—The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.
The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.
The NSA's surveillance network covers more Americans' Internet communications than officials have publicly disclosed, reaching roughly 75 percent of all U.S. internet traffic. Siobhan Gorman reports on the News Hub. Photo: Getty Images.
The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

Q&A

What You Need to Know on the New Details of NSA Spying

How the NSA Scours Internet Traffic in the U.S.

View Graphics

WSJ: Privacy Insights

The Wall Street Journal is conducting a long-running investigation into the profound transformation of personal privacy in America.
Selected findings:
  • The Wall Street Journal reconstructs the clash over the counterterrorism programwithin the administration of President Barack Obama. (10/13/12)
  • Companies today are increasingly tying people's real-life identities to their online browsing habits. (12/7/12)
  • Two students are outed as gay—provoking a crisis within their families—by a Facebook privacy loophole . (10/12/12)
  • Suspicious spouses are taking investigations into their own hands as snooping technologies become cheaper and easier to use. (10/6/12)
  • Americans' license plates are now being tracked not only by the government, but also by repo men who hope to profit from the information. (10/2/12)
  • Google bypassed the privacy settings on millions of Web browsers on Apple iPhones and computers— tracking the online activitiesof people who intended that kind of monitoring to be blocked. (2/17/12)
  • The government follows the movements of thousands of Americans a year by secretly monitoring their cellphone records . (9/9/11)
  • iPhone and Android apps secretly shared data about their users, a Journal investigation found. (12/10/10)
  • Top apps on Facebook transmit personal identifying details to tracking companies, a Journal investigation found. (10/18/10)
  • Plus, the global surveillance bazaar , a secretive phone-tracking "stingray" and RapLeaf's clever way of figuring out Web surfers' real names .
  • See full privacy coverage
The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&TInc., T -0.87% former officials say. AT&T declined to comment.
This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.
Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
The NSA defends its practices as legal and respectful of Americans' privacy. According to NSA spokeswoman Vanee Vines, if American communications are "incidentally collected during NSA's lawful signals intelligence activities," the agency follows "minimization procedures that are approved by the U.S. attorney general and designed to protect the privacy of United States persons."
As another U.S. official puts it, the NSA is "not wallowing willy-nilly" through Americans' idle online chatter. "We want high-grade ore."
To achieve that, the programs use complex algorithms that, in effect, operate like filters placed over a stream with holes designed to let certain pieces of information flow through. After the 2001 terrorist attacks, NSA widened the holes to capture more information when the government broadened its definition of what constitutes "reasonable" collection, according to a former top intelligence official.
The NSA's U.S. programs have been described in narrower terms in the documents released by former NSA contractor Edward Snowden. One, for instance, acquires Americans' phone records; another, called Prism, makes requests for stored data to Internet companies. By contrast, this set of programs shows the NSA has the capability to track almost anything that happens online, so long as it is covered by a broad court order.
The NSA programs are approved and overseen by the secret Foreign Intelligence Surveillance Court. NSA is required to destroy information on Americans that doesn't fall under exceptions to the rule, including information that is relevant to foreign intelligence, encrypted, or evidence of a crime.
The NSA is focused on collecting foreign intelligence, but the streams of data it monitors include both foreign and domestic communications. Inevitably, officials say, some U.S. Internet communications are scanned and intercepted, including both "metadata" about communications, such as the "to" and "from" lines in an email, and the contents of the communications themselves.
Much, but not all, of the data is discarded, meaning some communications between Americans are stored in the NSA's databases, officials say. Some lawmakers and civil libertarians say that, given the volumes of data NSA is examining, privacy protections are insufficient.
Sen. Ron Wyden, an Oregon Democrat, in 2012 sought but failed to prohibit the agency from searching its databases for information on Americans without a warrant. He has also pushed intelligence agencies to detail how many Americans' communications have been collected and to explain whether purely domestic communications are retained in NSA's databanks. They have declined.
"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law," Mr. Wyden says.
This month President Barack Obama proposed changes to NSA surveillance to improve oversight. Those proposed changes wouldn't alter the systems in the U.S. that NSA relies upon for some of its most sensitive surveillance.
The systems operate like this: The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence. This is the first cut of the data.
These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.
The second cut is done by NSA. It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors"—say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
One U.S. official says the agency doesn't itself "access" all the traffic within the surveillance system. The agency defines access as "things we actually touch," this person says, pointing out that the telecom companies do the first stage of filtering.
The surveillance system is built on relationships with telecommunications carriers that together cover about 75% of U.S. Internet communications. They must hand over what the NSA asks for under orders from the secret Foreign Intelligence Surveillance Court. The firms search Internet traffic based on the NSA's criteria, current and former officials say.
Verizon Communications Inc., VZ -0.62% for example, has placed intercepts in the largest U.S. metropolitan areas, according to one person familiar with the technology. It isn't clear how much information these intercepts send to the NSA. A Verizon spokesman declined to comment.
Not all telecommunications providers handle the government demands the same way, says the person familiar with the legal process. According to a U.S. official, lawyers at telecom companies serve as checks on what the NSA receives. "The providers are independently deciding what would be responsive," the official says.
Lawyers for at least one major provider have taken the view that they will provide access only to "clearly foreign" streams of data—for example, ones involving connections to ISPs in, say, Mexico, according to the person familiar with the legal process. The complexities of Internet routing mean it isn't always easy to isolate foreign traffic, but the goal is "to prevent traffic from Kansas City to San Francisco from ending up" with the NSA, the person says.
At times, the NSA has asked for access to data streams that are more likely to include domestic communications, this person says, and "it has caused friction." This person added that government officials have said some providers do indeed comply with requests like this.
The person says talks between the government and different telecoms about what constitutes foreign communications have "been going on for some years," and that some in the industry believe the law is unclear on Internet traffic. "Somebody should enunciate a rule," this person says.
Intelligence officials and the White House argue NSA's surveillance provides early warnings of terror threats that don't respect geographic boundaries. "It's true we have significant capabilities," Mr. Obama said in his NSA remarks last week. "What's also true is we show a restraint that many governments around the world don't even think to do."
Mr. Obama and top intelligence officials say NSA's programs are overseen by all three branches of government, citing procedures approved by the secret surveillance court that require the NSA to eliminate "incidentally acquired" data on Americans. "If you say, 'We don't want the NSA to be scanning large amounts of traffic,' you're saying you don't want it to do its job," says one former official.
Blarney, Fairview, Oakstar, Lithium and Stormbrew were mentioned, but not fully explained, in documents released by Mr. Snowden. An NSA paper released this month mentioned several but didn't describe them beyond saying, "The government compels one or more providers to assist NSA with the collection of information responsive to the foreign intelligence need."
The system is built with gear made by Boeing Co.'s BA -0.00% Narus subsidiary, which makes filtering technology, and Internet hardware manufacturers Cisco Systems Inc. CSCO -0.21% and Juniper Networks Inc., JNPR -0.89% among other companies, according to former intelligence officials and industry figures familiar with the equipment.
Narus didn't respond to requests for comment. Cisco and Juniper declined to comment.
The NSA started setting up Internet intercepts well before 2001, former intelligence officials say. Run by NSA's secretive Special Services Office, these types of programs were at first designed to intercept communications overseas through arrangements with foreign Internet providers, the former officials say. NSA still has such arrangements in many countries, particularly in the Middle East and Europe, the former officials say.
Within NSA, former officials say, intelligence officers joked that the Blarney intercept program with AT&T was named in homage to the NSA program Shamrock, which intercepted telegraphic messages into and out of the U.S. and was an inspiration for the 1978 Foreign Intelligence Surveillance Act, which created the secret national-security court and placed intelligence activities under its supervision.
Blarney was in use before the 2001 terror attacks, operating at or near key fiber-optic landing points in the U.S. to capture foreign communications coming in and out of the country. One example is an AT&T facility in San Francisco that was revealed in 2006 during the debate over warrantless wiretapping. A similar facility was built at an AT&T site in New Jersey, former officials say.
After the 2001 attacks, a former official says, these intercept systems were expanded to include key Internet networks within the U.S. through partnerships with U.S. Internet backbone providers. Amid fears of terrorist "sleeper cells" inside the U.S., the government under President George W. Bush also began redefining how much domestic data it could collect.
For the 2002 Winter Olympics in Salt Lake City, officials say, the Federal Bureau of Investigation and NSA arranged with Qwest Communications International Inc. to use intercept equipment for a period of less than six months around the time of the event. It monitored the content of all email and text communications in the Salt Lake City area.
At that point, the systems fed into the Bush administration's program of warrantless wiretapping, which circumvented the surveillance court on the authority of the president's power as commander in chief. The Bush administration came under criticism from lawmakers and civil libertarians for sidestepping court supervision.
The current legal backing for Blarney and its related programs stems from a section of a 2008 surveillance law. It permits the government, for foreign intelligence investigations, to snoop on foreigners "reasonably believed" to be outside the U.S.
Previously, the law had tighter standards. It allowed the government to spy on people if there were "probable cause" to believe they were an "agent of a foreign power."
NSA has discretion on setting its filters, and the system relies significantly on self-policing. This can result in improper collection that continues for years.
For example, a recent Snowden document showed that the surveillance court ruled that the NSA had set up an unconstitutional collection effort. Officials say it was an unintentional mistake made in 2008 when it set filters on programs like these that monitor Internet traffic; NSA uncovered the inappropriate filtering in 2011 and reported it.
"NSA's foreign intelligence collection activities are continually audited and overseen internally and externally," Ms. Vines says. "When we make a mistake in carrying out our foreign intelligence mission, we report the issue internally and to federal overseers and aggressively get to the bottom of it."
Another Snowden document describes the procedures NSA uses to protect American information that is retained. Any such information is "minimized," meaning that it is destroyed. The document highlights several exceptions, including encrypted communications and information of foreign intelligence significance.
Officials acknowledged some purely domestic communications are incidentally swept into the system. "We don't keep track of numbers of U.S. persons," a U.S. official says. "What we try to do is minimize any exposure."
When searching the data, intelligence officials say they are permitted to look only for information related to a "foreign intelligence interest." In practice, the NSA has latitude under that standard, and an American's communication could be read without a warrant, another U.S. official says.
Paul Kouroupas, a former executive at Global Crossing Ltd. and other telecom companies responsible for security and government affairs, says the checks and balances in the NSA programs depend on telecommunications companies and the government policing the system themselves. "There's technically and physically nothing preventing a much broader surveillance," he says.
An official at Global Crossing's parent, Level 3 Communications Inc., says the company complies with laws requiring it to assist government investigations and declined to disclose the assistance provided.
It is difficult to know how much domestic data NSA is inadvertently retaining. The filtering technology relies on algorithms to seek out valuable communications. A U.S. official says analysts guide the use of these algorithms to make them as precise as possible.
—Devlin Barrett contributed to this article.
Write to Siobhan Gorman at siobhan.gorman@wsj.com and Jennifer Valentino-DeVries at Jennifer.Valentino-DeVries@wsj.com

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • WHO USED NAPALM, WHITE PHOSPHORUS,AGENT ORANGE?
    Lets give some context to the use of chemical warfare by Assad. FROM THE PURSUIT OF EXCITEMENT d by:  James Shannon  | November 7, 2011 Napa...
  • DETAILS OF HOW TO CONTACT YOUR CONGRESSPERSON
    CONTACT YOUR CONGRESSPERSON, TELL HIM/HER NO ATTACKS ON SYRIA Find Your Representative Not sure of your congressional district or who your m...
  • SMALL ESSAY: RISKS OF STRIKES AGAINST SYRIA
    BY BILL HESSELL, Ph.D Dangling questions indeed, the answers to which loudly proclaim "Don't do it!".  Obama claims a missile ...
  • TAKE ACTION HERE: REMOVE SEXIST, STUPID JUDGE
    FROM CARE2 At a hearing in Montana yesterday, a judge sentenced a teacher to just 30 days in jail for repeatedly raping a 14-year-old studen...
  • WHO ARE THE SYRIAN REBELS? DETAILS. AUDIO
      Not enough emphasis here on rebel inks to al-Queda affiliates but more on that in another post.                 LISTEN TO FULL PROGRAM  FR...
  • LATEST, BREAKING NEWS ON SYRIA: HOUSE HEARINGS
    FROM THE NEW YORK TIMES In Hearing, House Panel Seems Split on Syria Strike By  MICHAEL R. GORDON  and  THOM SHANKER Published: September 4,...
  • WOULD THE "JUST WAR" DOCTRINE JUSTIFY AN ATTACK?
    FROM RELIGION NEWS SERVICE I WENT TO CHURCH TODAY ( WHICH WILL, NO DOUBT SURPRISE SOME READERS OF THIS BLOG) AND THE PRIEST PRAYED THAT, IF ...
  • MEDIA CHEERLEADS FOR WAR, WANTS ATTACK NOW
    FROM THINK PROGRESS Media Cheerleads For Another War: Blasts Obama For Not Rushing Into Syria BY  IGOR VOLSKY  ON  SEPTEMBER 1, 2013 AT 12:3...
  • OUR EGREGIOUS E PLURIBUS UNUM
    This guy is really pissed off! FROM CHRIS FLOYD'S EMPIRE BURLESQUE United We Fall: Our Egregious E Pluribus Unum WRITTEN BY CHRIS FLOYD ...
  • A LITTLE ESSAY ON WHY THE SOUTH IS SO MESSED UP
    THE SOUTH WILL RISE AGAIN The Civil War was not only fought to preserve the Union, but it was a fight to preserve state's rights. Know a...

Blog Archive

  • ▼  2013 (500)
    • ►  September (139)
    • ▼  August (361)
      • 3 REASONS CONGRESS MAY NOT APPROVE WAR IN SYRIA
      • GOING TO CONGRESS DOESN'T CHANGE MERITS OF ARGUMENT
      • WELFARE INSANITY: BANNING DRUG OFFENDERS FROM FOOD...
      • MAN CHARGED WITH FELONY FOR PEACEFUL PROTESTING
      • TAKE ACTION HERE: REMOVE SEXIST, STUPID JUDGE
      • SEN. WHO WANTS TEACHERS ARMED, SHOOTS TEACHER
      • MANUFACTURING CONSENT, AMERICAN STYLE
      • WHAT'S WRONG WITH THE ARGUMENTS FOR WAR ON SYRIA?
      • DEREGULATION HAS SPAWNED WALL STREET RACKETEERS
      • MAN SHOOTS SELF, BLAMES HOODIE-WEARERS
      • THE CASE AGAINST AIRSTRIKES ON SYRIA
      • DETAILS OF HOW TO CONTACT YOUR CONGRESSPERSON
      • NANCY PELOSI, WAR HAWK-HERE'S HOW TO CONTACT HER
      • SMALL ESSAY: RISKS OF STRIKES AGAINST SYRIA
      • LATEST-OBAMA SEEKS CONGRESS. VOTE ON SYRIA
      • HOUSE IS THE LEGISLATIVE EQUIVALENT OF N. KOREA
      • TOM FRIEDMAN'S BIZARRE FANTASY
      • BEFORE HE PULLS TRIGGER, QUESTIONS FOR THE PRES. A...
      • JUST 1% OF TOP-PAID CEOS ARE WOMEN
      • RISING CO2 COULD DEVASTATE SEAS
      • HOW THE RESTAURANT LOBBY KEEPS WORKERS IN POVERTY
      • 80% OF AMERICANS SAY GET CONGRESS TO APPROVE SYRIA...
      • A LITTLE ESSAY ON WHY THE SOUTH IS SO MESSED UP
      • RUTH BADER GINSBURG WILL MARRY GAYS
      • NEED A DEFINITION & EXAMPLE OF GREENWASHING?
      • 5 EXAMPLES OF DUMB GREENWASHING
      • WHY "INVESTIGATIONS" OF NSA SPYING DON'T SUCCEED
      • NSA MISLEADS PUBLIC W/O TECHNICALLY LYING
      • CHEMICAL HYPOCRISY: US AIDED IRAQI NERVE ATTACKS
      • PBS'S NEWS HOUR CAN BE JUST SO VAPID
      • THE POLITICS OF NULLIFICATION ON GUN CONTROL
      • NYPD LABELS MOSQUES AS TERROR GROUPS!!
      • LONE RANGER OBAMA MAY GO IT ALONE ON SYRIA
      • NO MORE UNDECLARED WARS
      • SIGN HERE: LETTER OF SUPPORT FOR FOOD WORKERS
      • ORANGE IS THE NEW BLACK, EPISODE 6
      • FLORIDA CONSIDERS ELIMINATING ALL LAWS
      • CHRISTIE FORCED OUT OF GOP RACE,TOO EMPATHETIC
      • DANGLING QUESTIONS ON SYRIAN WAR
      • 5 REASONS WHY FAST FOOD DESERVES TO DIE
      • CAN'T COMPARE FED. BUDGET TO HOUSEHOLD BUDGET
      • MAN REALIZES HE'S BEEN READING FAKE NEWS FOR 25 YRS
      • DREAMERS CUT OUT FROM MARCH ON WASHINGTON
      • GOP PLANS ON SLOW DEATH OF IMMIGRATION REFORM
      • THE MAINSTREAM MEDIA AND THE SLOWLY BOLING FROG
      • WOMEN: WHAT DOES OBAMACARE MEAN FOR YOU?
      • DOJ SURRENDERS ON LEGAL WEED
      • OBAMA: ACTION IN SYRIA HAS NO OBJECTIVE WHATSOEVER.
      • GOP ABSENT FROM MARCH ON WASHINGTON
      • PAT ROBERTSON: GAYS WILL CUT YOU TO GIVE YOU AIDS
      • PEPSI CO. SETTLE CLASS ACTION SUIT-FALSE ADVERTISING
      • WILL ROBOTS BE MAKING YOUR BIG MACS?
      • A COALITION OF THE POOR AND MIDDLE CLASS? HUMM!
      • THE FBI'S WAR ON REV. DR. MARTIN LUTHER KING, JR.
      • WHY THE RUSH TO BOMB SYRIA?
      • WEST DEFILES MARTIN LUTHER KING'S MEMORY
      • EXXON CHANGES COURSE AFTER PR DISASTER
      • GRANNIES ARRESTED BY BRAVE COPS-JUST FOLLOWING ORDERS
      • HOW BIG CORPORATIONS ARE UNPATRIOTIC
      • SOCIALISM IS A MATTER OF DEFINITION AND DEGREE
      • WHO ARE TOP 2 AMERICAN COLLEGES? NO, NOT HARVARD ...
      • WHICH GOP PRESIDENT PROPOSED GUARANTEED MIN.INCOME?
      • U.S. WILL KILL CIVILIANS TO PROTECT CIVILIANS!!
      • UNLESS THREAT TO NATION, NO ATTACK SAID OBAMA
      • DOES OBAMA KNOW HE'S FIGHTING ON AL-QA'IDA'S SIDE?
      • MLK WANTED GUARANTEED BASIC INCOME-OBAMA DOESN'T
      • SYRIA STRIKE TURNS U.S. INTO AL QAEDA'S AIR FORCE
      • WORST CASE SCENARIO HAS COME TO FUKUSHIMA
      • LAWSUT AGAINST THE DONALD, HE TRUMPED UP THINGS
      • WANT CONGRESS TO DEBATE ABOUT SYRIA? TAKE ACTION HERE
      • MAIN SPEAKERS AT MARCH ON WASHINGTON BETRAY MLK
      • ROBERT SCHEER:"I'VE NEVER LIKED GOVERNMENT." VIDEO
      • COMMENT FROM BILL HESSELL,ON SYRIA
      • U.S. MEDIA BEATS THE DRUMS OF WAR
      • 54 ABORTION PROVIDERS IN 27 STATES CLOSED- AUDIO
      • VOTING RESTRICTION LAWS WILL BACKFIRE ON GOP
      • CONGRESSIONAL PROCESS BROKEN-IT CAN BE FIXED
      • CONTRACTOR KGB WILL HAVE TRIAL FOR HUMAN TRAFFICKING
      • IS THERE A CHRISTIAN NATIONALIST MAJORITY IN U.S.?
      • GOD DOES NOT LISTEN TO RICK PERRY'S PRAYERS
      • CLIMATE CHANGE IS DRIVING FORCE BEHIND WILDFIRES
      • 10-YEAR-OLD TEXAS GIRL CHARGED WITH RAPE
      • THERE WERE DINOSAURS IN THE GARDEN OF EDEN
      • NO CLIMATE CHANGE.MUST BE SO, COBURN SAYS SO
      • WATCH IT! THE NSA IS SPYING ON YOUR SEX LIFE
      • AMERICANS ARE TOO STUPID FOR DEMOCRACY
      • STRIKES AGAINST SYRIA COULD BE COUNTERPRODUCTIVE
      • THE RACIST SOUTH WILL RISE AGAIN! INCREDIBLE!
      • INTERESTING POINT OF VIEW ON INTERVENTION IN SYRIA
      • WHY AMERICAN SHOULD INTERVENE IN SYRIA
      • U.S.HELPED SADDAM HUSSEIN AS HE GASSED IRAN
      • WHATEVER OBAMA DECIDES ABOUT SYRIA, HE LOSES
      • WHO USED NAPALM, WHITE PHOSPHORUS,AGENT ORANGE?
      • CHEMICAL WARFARE FROM A.D. 256 TO A.D. 20013
      • 5 REASONS THE U.S. SHOULD INTERVENE IN SYRIA
      • IS THE DEP'T OF DEFENSE SOMETIMES NUTS?
      • IRAQ WAS FOR OIL, AGAINST SYRIA FOR NATURAL GAS
      • HAWK, IN EFFECT, ARGUES WE SHOULD ATTACK SYRIA
      • PROS AND CONS ABOUT LIMITED STRIKES AGAINST SYRIA
      • U.S. CAN FIGHT WAR W/0 CONGRESS IS TIME MAG. CRAP
Powered by Blogger.