Jump to content

2013 global surveillance disclosures: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎Presentation Slides leaked by Edward Snowden: Bring the slides to view..... still need to upload additional xkeyscore images from Guardian's article. the unofficial users guide, etc.
periods
Line 43: Line 43:
== Presentation Slides leaked by Edward Snowden ==
== Presentation Slides leaked by Edward Snowden ==
<gallery perrow="4" caption= "The Presentation Slides">
<gallery perrow="4" caption= "The Presentation Slides">
File:Cover_slide_of_PRISM.jpg| Cover page of the PRISM presentation
File:Cover_slide_of_PRISM.jpg| Cover page of the PRISM presentation.
File:Prism slide 2.jpg| Map of global internet bandwidth
File:Prism slide 2.jpg| Map of global internet bandwidth.
File:PRISM Collection Details.jpg|Names of the PRISM content providers and what services are typically returned to PRISM.
File:PRISM Collection Details.jpg|Names of the PRISM content providers and what services are typically returned to PRISM.
File:Prism slide 5.jpg|Dates each content provider joined PRISM
File:Prism slide 5.jpg|Dates each content provider joined PRISM.
File:Prism-slide-6.jpg|Flowchart of the PRISM tasking process
File:Prism-slide-6.jpg|Flowchart of the PRISM tasking process.
File:Prism-slide-7.jpg|PRISM dataflow
File:Prism-slide-7.jpg|PRISM dataflow.
File:Prism-slide-8.jpg|Explanation of PRISM case names.
File:Prism-slide-8.jpg|Explanation of PRISM case names.
File:Prism-slide-9.jpg|REPRISMFISA web application
File:Prism-slide-9.jpg|REPRISMFISA web application.
File:Upstream-slide.jpg|Upstream and PRISM .
File:Upstream-slide.jpg|Upstream and PRISM.
File:XKeyscore_presentation_from_2008.pdf| A 2008 Presentation of the [[XKeyscore]]program
File:XKeyscore_presentation_from_2008.pdf| A 2008 Presentation of the [[XKeyscore]] program.
</gallery>
</gallery>



Revision as of 05:10, 4 August 2013

In mid-2013, several news outlets reported that the United States, with the aid of Australia and New Zealand, have been spying on domestic and international communications on a much larger scale than previously thought. It was later revealed that France and the United Kingdom have also been spying.

Based on documents provided by Edward Snowden, these media reports revealed that espionage activities conducted by US and UK intelligence agencies targeted not only foreign countries but also U.S. citizens as well as U.S. allies from NATO and the European Union.

Snowden had made initial contact with journalist Glenn Greenwald and documentary filmmaker Laura Poitras, who also brought in Washington Post reporter Barton Gellman. They met with Snowden in Hong Kong and, beginning on 6 June 2013, began publishing the revelations, roughly on a daily basis, mostly in the Guardian newspaper.[1][2]

Summary of NSA spying programs

On 6 June 2013, Britain's The Guardian newspaper began publishing a series of revelations by an as yet unknown American spy, revealed several days later to be ex-CIA and ex-NSA-contracted systems analyst Edward Snowden. In over a month of publications, it became clear that the NSA operates a complex web of spying programs which allow it to intercept internet and telephone conversations from over a billion users from dozens of countries around the world. Specific revelations have been made about China, the European Union, Latin America, Iran and Pakistan, and Australia and New Zealand, however the published documentation reveals that many of the programs indiscriminately collect bulk information directly from central servers and internet backbones, which almost invariably carry and reroute information from distant countries.

Due to this central server and backbone monitoring, many of the programs overlap and interrelate among one another. These programs are often done with the assistance of US entities such as the DOJ and the FBI[3], are sanctioned by US laws such as the FISA Amendments Act, and the necessary court orders for them are signed by the secret Foreign Intelligence Surveillance Court. In addition to this, many of the NSA's programs are directly aided by national and foreign intelligence services, Britain's GCHQ and Australia's DSD, as well as by large private telecommunications and internet corporations, such as Verizon, Telstra[4], Google and Facebook.[5]

The programs include –

  • PRISM – Cooperation between the NSA and internet companies, whereby the companies allow the NSA access (whether direct or indirect is disputed) to their servers.
  • X-Keyscore – a program which allows searching collected data in a variety of ways.[7]
  • Dropmire – a program that specifically targets foreign embassies and diplomats
  • Fairview – a program that targets mobile phone usage (particularly text messages) in foreign countries.
  • Upstream and Tempora – collecting data from fiber-optic cables and internet backbones.[8]
  • MAINWAY (call records), Main Core (financial records) – storing the collected data
  • ECHELON – intercepts commercial satellite trunk communications by all of the Five Eyes signatories
  • Turbulence – includes cyber-warfare capabilities, such as targeting enemies with malware
  • Insider Threat Program – policy requiring federal employees to report "high-risk persons or behaviors" from among co-workers, as well as to punish those who fail to report such colleagues.[9]

Several programs have been mentioned in passing during Snowden's revelations, but no information on them save for their names is currently available. These include – Special Source Operations (included as a logo on most of the released presentation slides, apparently responsible for all programs which collaborate with corporate entities)[3], ThinThread, Nucleon (voice), Pinwale (video), Marina (internet records), Stormbrew, Blarney, Oakstar, Pintaura (automates traffic flow), TrafficThief, Scissors and Protocol Exploitation (sort data types for analysis), Fallout and Conveyance (provide filtering) (All appear in the slides in the following reference)[8]; ShellTrumpet (a metadata program targeting international communications),[10] MoonlightPath and Spinneret;[11][12][10][13] EvilOlive (collection of internet traffic and data),[13] SilverZephyr and Steel Knight.[14]

The Fourth Amendment to the US Constitution prohibits the search or seizure of a person's "papers or effects" without a court-ordered warrant based on probable cause that the person in question is planning or is guilty of an actual crime, and particularly describing what is to be seized. However, the US government has made strenuous efforts to prevent federal courts from ruling on whether the NSA's surveillance efforts comply with the Fourth Amendment.[speculation?]

Presentation Slides leaked by Edward Snowden

Media reports based on documents provided by Edward Snowden

News outlet Type of media Summary of disclosures
The Guardian British daily newspaper The Guardian and the Washington Post both reported that the U.S. National Security Agency (NSA) has been monitoring Internet traffic in realtime via PRISM.[15][16] In addition, the Guardian reported that:
  • The NSA collected data from over 120 million Verizon subscribers (This was the very first revelation, published on 6 June)[17]
  • The NSA collected global electronic information via Boundless Informant
  • During the 2009 G-20 London Summit, the British intelligence agency Government Communications Headquarters (GCHQ) had intercepted the communications of foreign diplomats.[18]
  • The GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora[19]
  • The NSA collected from 2001 to 2011 via Stellar Wind vast amounts of records detailing the email and internet usage of Americans,[20] and after the program end of Stellar Wind due to operational and resource reasons other programs such as ShellTrumpet.[13]
  • A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire[21]
  • Microsoft "developed a surveillance capability to deal" with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because “Prism collects this data prior to encryption.”[22]
  • The Guardian revealed that XKeyscore allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.[23]
  • The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for these funds GCHQ "must pull its weight and be seen to pull its weight." Documents referenced in the article explain that weaker laws regarding spying are "a selling point". GCHQ is also developing the technology to "exploit any mobile phone at any time."[24]
The Washington Post U.S. daily newspaper PRISM revelation, simultaneously with The Guardian.[15]
  • Upstream revelation.[8]
South China Morning Post  English language newspaper based in Hong Kong During specific episodes within a four-year period, the NSA hacked:
Der Spiegel German news magazine Documents provided by Edward Snowden and seen by Der Spiegel revealed that the NSA spied on various diplomatic missions of the European Union (EU), including:

Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the EU is Germany.[29]

Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel.[30]

The NSA gave the German intelligence agencies BND and BfV access to X-Keyscore.[31]

O Globo Brazilian newspaper The United States spied on millions of emails and calls of Brazilians.[32][33]

Australia and New Zealand have been aiding the United States in their surveillance program.[34][35]

Le Monde French newspaper In a report unrelated to Edward Snowden, the paper revealed thet France's DGSE was also undertaking mass surveillance, which it described as "illegal and outside any serious control".[36][37]
Süddeutsche Zeitung German newspaper Documents provided by Edward Snowden and seen by Süddeutsche Zeitung revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap onto worldwide fiber-optic communications. These telecom operators are:

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible for. Some of them were subsequently rewarded by the GCHQ for spying on their own customers.[39]

Fallout

U.S. President Barack Obama on the importance of surveillance: "...They help us prevent terrorist attacks. And the modest encroachments on the privacy that are involved in getting phone numbers or duration without a name attached and not looking at content, that on net, it was worth us doing..."

UK Defence officials issued a confidential DA-Notice to the BBC and other media asking the media to refrain from running further stories related to surveillance leaks including US PRISM programme and the British involvement therein.[40][41] The US Army similarly restricted access to the Guardian website in order to prevent an unauthorized disclosure of classified information.[42]

U.S. President Barack Obama asserted that the American public had no cause for concern because "nobody is listening to your telephone calls".[43]

On 21 June 2013, the Director of National Intelligence James R. Clapper issued an apology for giving false testimony under oath to the United States Congress, which is a felony under 18 USC s. 1001. Earlier in March that year, Clapper had denied that the NSA was collecting any type of data from U.S. citizens. In his letter of apology, Clapper wrote that he had focused on Section 702 of the Foreign Intelligence Surveillance Act, and therefore, he "simply didn't think" about Section 215 of the Patriot Act, which justifies the mass collection of telephone data from U.S. citizens.[44] Clapper said: "My response was clearly erroneous—for which I apologize".[44]

Counter-terrorism and national security

Keith B. Alexander, the director of the NSA, asserted that these media leaks have caused "significant" and "irreversible" damage to the national security of the United States and this "irresponsible" release of classified information will have a "long-term detrimental" impact on the intelligence community's ability to detect future attacks. Furthermore, these leaks have "inflamed and sensationalized" the work that the intelligence community does lawfully under "strict oversight and compliance".[45]

U.S. government officials have also claimed that terrorists are trying to change their tactics as a result of these media leaks.[46]

Impact on foreign relations

These media leaks have damaged the bilateral relations of the United States with several of its economic partners:

Amash/Conyers Amendment

In response to the information release by Snowden, Rep. Justin Amash (R-Mich.) and Rep. John Conyers (D-Mich.) proposed an amendment to the National Defense Authorization Act.[49] If passed, the amendment "would curtail the ongoing dragnet collection and storage of the personal records of innocent Americans." The House rejected the amendment by a vote of 205-217.[50] An analysis indicates that those who voted against the amendment received 122% more in campaign contributions from defense contractors than those who voted in favor of it. [51] Template:List of votes on the Amash/Conyers Amendment

See also

References

  1. ^ The NSA Files, The Guardian. Retrieved July 2013.
  2. ^ Edward Snowden and the NSA files – timeline, The Guardian, 23 June 2013. Retrieved July 2013.
  3. ^ a b How Microsoft handed the NSA access to encrypted messages, The Guardian, 12 July 2013. Retrieved 13 Jul 2013.
  4. ^ [1] The Guardian, 10 July 2013. July 2013. Retrieved 12 Jul 2013.
  5. ^ The first three days of revelations were: the FISC court order that Verizon provide bulk metadata on its customers to the NSA; presentation slides explaining the cooperation of nine US internet giants through the PRISM program; and the bulk collection of Chinese users' text messages, which coincided with Xi Jinping's visit to California to meet Barack Obama.
  6. ^ A published heat map shows that most data is collected from Iran, Pakistan and Jordan, with over 40 billion individual pieces of information collected from these three countries alone in March 2013 alone, from a total of 97 billion worldwide).
  7. ^ Snowden reveals Australia's links to US spy web, The Sydney Morning Herald, 8 July 2013. Retrieved 11 Jul 2013.
  8. ^ a b c NSA slides explain the PRISM data-collection program, The Washington Post, 6 June 2013, updated 10 July 2013. Retrieved 12 Jul 2013.
  9. ^ Obama’s crackdown views leaks as aiding enemies of U.S., McClatchy, 20 June 2013. Retrieved 12 July 2013.
  10. ^ a b Bamford, James (12 July 2013). "They Know Much More Than You Think". The New York Review of Books. Retrieved 29 July 2013.
  11. ^ Glenn Greenwald and Spencer Ackermann (27 June 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved 29 July 2013.
  12. ^ Peterson, Josh (27 June 2013). "Report: NSA Internet spying program collected half-a-trillion records in 2012". The Daily Caller. Retrieved 29 July 2013.
  13. ^ a b c Glenn Greenwald and Spencer Ackerman (27 June 2013). "How the NSA is still harvesting your online data". The Guardian. Retrieved 1 August 2013.
  14. ^ No alvo dos EUA, Infographic, O Globo. Retrieved 8 July 2013.
  15. ^ a b Gellman, Barton; Poitras, Laura (6 June 2013). "US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program". The Washington Post. Retrieved 15 June 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  16. ^ Greenwald, Glenn; MacAskill, Ewen (6 June 2013). "NSA Taps in to Internet Giants' Systems to Mine User Data, Secret Files Reveal – Top-Secret Prism Program Claims Direct Access to Servers of Firms Including Google, Apple and Facebook – Companies Deny Any Knowledge of Program in Operation Since 2007 – Obama Orders US to Draw Up Overseas Target List for Cyber-Attacks". The Guardian. Retrieved 15 June 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  17. ^ NSA collecting phone records of millions of Verizon customers daily, Glenn Greenwald, The Guardian, 6 June 2013. Retrieved July 2013.
  18. ^ MacAskill, Ewen; Davies, Nick; Hopkins, Nick; Borger, Julian; Ball, James (17 June 2013). "GCHQ intercepted foreign politicians' communications at G20 summits". The Guardian. London.{{cite news}}: CS1 maint: multiple names: authors list (link)
  19. ^ MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, James (21 June 2013). "GCHQ taps fiber-optic cables for secret access to world's communications". The Guardian.
  20. ^ Glenn Greenwald and Spencer Ackerman (27 June 2013). "NSA collected US email records in bulk for more than two years under Obama". The Guardian. Retrieved 1 August 2013.
  21. ^ MacAskill, Ewen; Borger, Julian (30 June 2013). "New NSA leaks show how US is bugging its European allies". The Guardian. London.{{cite news}}: CS1 maint: multiple names: authors list (link)
  22. ^ Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe (11 July 2013). "Revealed: how Microsoft handed the NSA access to encrypted messages". The Guardian. Retrieved 11 July 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  23. ^ Greenwald, Glenn (July 31, 2013)."Revealed: NSA Program Collects 'Nearly Everything a User Does on the Internet' – XKeyscore Gives 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No Prior Authorization for Searches – Sweeps Up Emails, Social Media Activity and Browsing History". The Guardian. Retrieved August 1, 2013.
  24. ^ James Ball, Luke Harding and Juliette Garside (1 August 2013). "Exclusive: NSA pays £100m in secret funding for GCHQ". Retrieved 2 August 2013.
  25. ^ EXCLUSIVE: US hacks Chinese mobile phone companies, South China Morning Post
  26. ^ NSA targeted China's Tsinghua University in hacking attacks, South China Morning Post
  27. ^ Lam, Lana (23 June 2013). "US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009". South China Morning Post (Hong Kong). Retrieved 25 June 2013.
  28. ^ a b c Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. "Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus". Der Spiegel (in German). Retrieved 29 June 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  29. ^ Laura Poitras, Marcel Rosenbach und Holger Stark. "Geheimdokumente: NSA überwacht 500 Millionen Verbindungen in Deutschland". Der Spiegel (in German). Retrieved 30 June 2013.
  30. ^ Iain Thomson (8 July 2013). "Snowden: US and Israel did create Stuxnet attack code". The Register. Retrieved 8 July 2013.
  31. ^ 'Prolific Partner': German Intelligence Used NSA Spy Program, Der Spiegel. Retrieved 21 July 2013.
  32. ^ EUA espionaram milhões de e-mails e ligações de brasileiros, O Globo, 6 July 2013. Retrieved 8 Jul 2013.
  33. ^ The NSA's mass and indiscriminate spying on Brazilians, Glenn Greenwald, The Guardian', 7 July 2013. Retrieved 8 Jul 2013.
  34. ^ EUA expandem o aparato de vigilância continuamente, O Globo, 6 July 2013. Retrieved 8 Jul 2013.
  35. ^ Philip Dorling (8 July 2013). "Snowden reveals Australia's links to US spy web". The Age World. Retrieved 8 July 2013.
  36. ^ Révélations sur le Big Brother français(2), Le Monde, 4 July 2013. Retrieved 5 Jul 2013.
  37. ^ France 'runs vast electronic spying operation using NSA-style methods', The Guardian, 4 July 2013. Retrieved 5 Jul 2013.
  38. ^ a b c d e f g John Goetz and Frederik Obermaier. "Snowden enthüllt Namen der spähenden Telekomfirmen" (in German). Süddeutsche Zeitung. Retrieved 2 August 2013. In den internen Papieren des GCHQ aus dem Jahr 2009 stehen sie nun aufgelistet: Verizon Business, Codename: Dacron, British Telecommunications (codenamed "Remedy"), Vodafone Cable ("Gerontic"), Global Crossing ("Pinnage"), Level 3 (codenamed "Little"), Viatel ("Vitreous") und Interoute ("Streetcar"). {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  39. ^ "Snowden enthüllt Namen der spähenden Telekomfirmen". Süddeutsche Zeitung. Retrieved 2 August 2013. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  40. ^ Staines, Paul. "D-Notice, June 7, 2013". Retrieved 8 June 2013.
  41. ^ Halliday, Josh. "MoD serves news outlets with D notice over surveillance leaks". The Guardian. Retrieved 27 June 2013.
  42. ^ Phillip Molnar (28 June 2013). "Restricted web access to The Guardian is Armywide, officials say". Monterey Herald. Retrieved 28 June 2013.
  43. ^ "Obama: "Nobody is listening to your telephone calls"". CBS News. Retrieved 9 July 2013.
  44. ^ a b "DNI Clapper Letter on Misunderstandings Arising from his March 12th Appearance Before the Senate Select Committee on Intelligence". Director of National Intelligence. Archived from the original (PDF) on 16 December 2013. Retrieved 9 July 2013.
  45. ^ Roulo, Claudette. "Leaks Damage National Security, NSA Director Says". American Forces Press Service. Archived from the original on 16 December 2013. Retrieved 8 July 2013. (Archive)
  46. ^ "Terrorists try changes after Snowden leaks, official says". CNN. Retrieved 8 July 2013.
  47. ^ Weiner, Rachel. "White House: Hong Kong damaged relationship by releasing Snowden". The Washington Post. Retrieved 8 July 2013.
  48. ^ "European Union threatens to stop sharing data with United States over spying reports". Daily News. Retrieved 8 July 2013.
  49. ^ Ehrenfreund, Max (25 July 2013). "House proposal to curtail NSA in response to Edward Snowden's leaks fails narrowly". The Washington Post. Retrieved 29 July 2013.
  50. ^ Abby Ohlheiser and Philip Bump (24 July 2013). "The Amash Amendment Fails, Barely". The Atlantic Wire. Retrieved 29 July 2013.
  51. ^ Kravets, David (26 July 2013). "Lawmakers Who Upheld NSA Phone Spying Received Double the Defense Industry Cash". Retrieved 3 August 2013.

Further reading