• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • NSA surveillance played little role in foiling terror plots, experts say

    Obama administration says NSA data helped make arrests in two important cases – but critics say that simply isn’t true
    A new NSA data farm is set to open in the fall in Bluffdale, Utah. A former CIA agent said: ‘[Data-mining] played no role in the Headley case.’ Photograph: George Frey/Getty Images
    Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA’s vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks.
    The defence of the controversial data collection operations, highlighted in a series of Guardian disclosures over the past week, has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA’s use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks.
    Rogers told ABC’s This Week that the NSA’s bulk monitoring of phone calls and internet contacts was central to intercepting the plotters. “I can tell you, in the Zazi case in New York, it’s exactly the programme that was used,” he said.
    A similar point was made in anonymous briefings by administration officials to the New York Times and Reuters.
    But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations.
    In the case of Zazi, an Afghan American who planned to attack the New York subway, the breakthrough appears to have come from Operation Pathway, a British investigation into a suspected terrorism cell in the north-west of England in 2009. That investigation discovered that one of the members of the cell had been in contact with an al-Qaida associate in Pakistan via the email address sana_pakhtana@yahoo.com.
    British newspaper reports at the time of Zazi’s arrest said that UK intelligence passed on the email address to the US. The same email address, as Buzzfeed has pointed out, was cited in Zazi’s 2011 trial as a crucial piece of evidence. Zazi, the court heard, wrote to sana_pakhtana@yahoo.com asking in coded language for the precise quantities to use to make up a bomb.
    Eric Jurgenson, an FBI agent involved in investigating Zazi once the link to the Pakistani email address was made, told the court: “My office was in receipt – I was notified, I should say. My office was in receipt of several email messages, email communications. Those email communications, several of them resolved to an individual living in Colorado.”
    Michael Dowling, a Denver-based attorney who acted as Zazi’s defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.
    “The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi’s contacts with a known terrorist in Pakistan,” Dowling said.
    Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as “misleading” and “an illusion”. Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK’s most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.
    The collapse of the operation, and arrests of suspects that hurriedly followed, came five months before Zazi was arrested in September 2009. “That was the operation that led to the initial data links to Zazi – they put the clues in the database which gave them the connections,” Davis said.
    Davis said that the discovery of the sana_pakhtana@yahoo.com email – and in turn the link to Zazi – had been made by traditional investigative work in the UK. He said the clue-driven nature of the inquiry was significant, as it was propelled by detectives operating on the basis of court-issued warrants.
    “You can’t make this grand sweeping [data collection] stuff subject to warrants. What judge would give you a warrant if you say you want to comb through vast quantities of data?”
    Legal documents lodged with a federal court in New York’s eastern district shortly after Zazi’s arrest show that US counter-intelligence officials had been keeping watch over him under targeted surveillance with the warranted approval of the special intelligence court. During the course of the prosecution, the US served notice that it would be offering evidence “obtained and derived from electronic surveillance and physical search conducted pursuant to the Foreign Intelligence Surveillance Act of 1978 (Fisa).”
    Feinstein and Rogers have also pointed to the case of David Headley, who in January was sentenced to 35 years in jail for having made multiple scouting missions to Mumbai ahead of the 2008 terrorist attacks that killed 168 people. Yet the evidence in his case also points towards a British tip-off as the inspiration behind the US interception of him.
    In July 2009, British intelligence began tracking Headley, a Pakistani American from Chicago, who was then plotting to attack Danish newspaper Jyllands-Posten in retaliation for its publication of cartoons of the prophet Mohammed. Information was passed to the FBI and he was thereafter, until his arrest that October, kept under targeted US surveillance.
    An intelligence expert and former CIA operative, who asked to remain anonymous because he had been directly involved in the Headley case, was derisive about the claim that data-mining sweeps by the NSA were key to the investigation. “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all,” he said.
    The intelligence expert said that it was a far more ordinary lead that ensnared Headley. British investigators spotted him when he contacted an informant.
    The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA’s secret programmes were limited in their value as he was captured only after the event.
    Headley was also subject to a plethora of more conventionally obtained intelligence that questions the central role claimed for the NSA’s data sweeps behind his arrest. In a long profile of Headley, the investigative website ProPublica pointed out that he had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
    Headley was also, ProPublica found, the subject of several inquiries by agents of the FBI-led Joint Terrorism Task Force. A year before the Mumbai attacks his then wife, Faiza Outalha, reported on him to the US embassy Islamabad, saying he was on a secret mission in India and was a “drug dealer, terrorist and spy”.
    Ed Pilkington in New York and Nicholas Watt in London
    theguardian.com, Wednesday 12 June 2013 15.51 BST
    Find this story at 12 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Claim on “Attacks Thwarted” by NSA Spreads Despite Lack of Evidence

    During Keith Alexander’s presentation in Las Vegas, two slides read simply “54 ATTACKS THWARTED.” The NSA, President Obama, and members of Congress have all said NSA spying programs have thwarted more than 50 terrorist plots. But there’s no evidence the claim is true.
    UPDATE Dec. 17, 2013: In a new ruling that calls the NSA’s phone metadata surveillance likely unconstitutional, U.S. District Court Judge Richard Leon cited this article in his assessment of the agency’s claims about thwarted terrorist attacks. Read the ruling here.
    Two weeks after Edward Snowden’s first revelations about sweeping government surveillance, President Obama shot back. “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany,” Obama said during a visit to Berlin in June. “So lives have been saved.”
    In the months since, intelligence officials, media outlets, and members of Congress from both parties all repeated versions of the claim that NSA surveillance has stopped more than 50 terrorist attacks. The figure has become a key talking point in the debate around the spying programs.
    Interactive: How the NSA’s Claim on Thwarted Terrorist Plots Has Spread
    “Fifty-four times this and the other program stopped and thwarted terrorist attacks both here and in Europe — saving real lives,” Rep. Mike Rogers, a Michigan Republican who chairs the House Intelligence Committee, said on the House floor in July, referring to programs authorized by a pair of post-9/11 laws. “This isn’t a game. This is real.”
    But there’s no evidence that the oft-cited figure is accurate.
    The NSA itself has been inconsistent on how many plots it has helped prevent and what role the surveillance programs played. The agency has often made hedged statements that avoid any sweeping assertions about attacks thwarted.
    A chart declassified by the agency in July, for example, says that intelligence from the programs on 54 occasions “has contributed to the [U.S. government’s] understanding of terrorism activities and, in many cases, has enabled the disruption of potential terrorist events at home and abroad” — a much different claim than asserting that the programs have been responsible for thwarting 54 attacks.
    NSA officials have mostly repeated versions of this wording.
    When NSA chief Gen. Keith Alexander spoke at a Las Vegas security conference in July, for instance, he referred to “54 different terrorist-related activities,” 42 of which were plots and 12 of which were cases in which individuals provided “material support” to terrorism.
    But the NSA has not always been so careful.
    During Alexander’s speech in Las Vegas, a slide in an accompanying slideshow read simply “54 ATTACKS THWARTED.”
    And in a recent letter to NSA employees, Alexander and John Inglis, the NSA’s deputy director, wrote that the agency has “contributed to keeping the U.S. and its allies safe from 54 terrorist plots.” (The letter was obtained by reporter Kevin Gosztola from a source with ties to the intelligence community. The NSA did not respond when asked to authenticate it.)
    Asked for clarification of the surveillance programs’ record, the NSA declined to comment.
    Earlier this month, Sen. Patrick Leahy, D-Vt., pressed Alexander on the issue at a Senate Judiciary Committee hearing.
    “Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the U.S.?” Leahy said at the hearing. “Would you agree with that, yes or no?”
    “Yes,” Alexander replied, without elaborating.
    It’s impossible to assess the role NSA surveillance played in the 54 cases because, while the agency has provided a full list to Congress, it remains classified.
    Officials have openly discussed only a few of the cases (see below), and the agency has identified only one — involving a San Diego man convicted of sending $8,500 to Somalia to support the militant group Al Shabab — in which NSA surveillance played a dominant role.
    The surveillance programs at issue fall into two categories: The collection of metadata on all American phone calls under the Patriot Act, and the snooping of electronic communications targeted at foreigners under a 2007 surveillance law. Alexander has said that surveillance authorized by the latter law provided “the initial tip” in roughly half of the 54 cases. The NSA has not released examples of such cases.
    After reading the full classified list, Leahy concluded the NSA’s surveillance has some value but still questioned the agency’s figures.
    “We’ve heard over and over again the assertion that 54 terrorist plots were thwarted … That’s plainly wrong, but we still get it in letters to members of Congress, we get it in statements.”
    — Sen. Patrick Leahy, D-Vt.
     

    Revealed: Australian spy agency offered to share data about ordinary citizens

    • Secret 5-Eyes document shows surveillance partners discussing what information they can pool about their citizens
    • DSD indicated it could provide material without some privacy restraints imposed by other countries such as Canada
    • Medical, legal or religious information ‘not automatically limited’
    • Concern that intelligence agency could be ‘operating outside its legal mandate’
    The secret document shows the partners discussing whether or not to share citizens’ “medical, legal or religious information”. Photograph: Kacper Pempel/Reuters
    Australia’s surveillance agency offered to share information collected about ordinary Australian citizens with its major intelligence partners, according to a secret 2008 document leaked by the US whistleblower Edward Snowden.
    The document shows the partners discussing whether or not to share “medical, legal or religious information”, and increases concern that the agency could be operating outside its legal mandate, according to the human rights lawyer Geoffrey Robertson QC.
    The Australian intelligence agency, then known as the Defence Signals Directorate (DSD), indicated it could share bulk material without some of the privacy restraints imposed by other countries, such as Canada.
    “DSD can share bulk, unselected, unminimised metadata as long as there is no intent to target an Australian national,” notes from an intelligence conference say. “Unintentional collection is not viewed as a significant issue.”
    The agency acknowledged that more substantial interrogation of the material would, however, require a warrant.
    Metadata is the information we all generate whenever we use technology, from the date and time of a phone call to the location from which an email is sent.
    “Bulk, unselected, unminimised metadata” means that this data is in its raw state, and nothing has been deleted or redacted in order to protect the privacy of ordinary citizens who might have been caught in the dragnet. Metadata can present a very complete picture of someone’s life.
    The working document, marked secret, sheds new light on the extent to which intelligence agencies at that time were considering sharing information with foreign surveillance partners, and it provides further confirmation that, to some extent at least, there is warrantless surveillance of Australians’ personal metadata.
    The DSD joined its four intelligence-sharing partners – the US, Britain, Canada and New Zealand, collectively known as 5-Eyes – to discuss what could and what could not be shared under the different jurisdictions at a meeting hosted by Britain’s GCHQ at its headquarters in Cheltenham on 22-23 April, 2008.
    The notes, published today by Guardian Australia, suggest that Australia was open to pooling bulk data that almost certainly includes information about Australian citizens.
    Clearly indicating the different attitudes between the intelligence partners, the Canadians insisted that bulk collection could only be shared if information about its citizens was first “minimised”, meaning deleted or removed. The various techniques used in “minimisation” help protect citizens’ privacy.
    The GCHQ memo taker, reporting on this, said that “bulk, unselected metadata presents too high a risk to share with second parties at this time because of the requirement to ensure that the identities of Canadians or persons in Canada are minimised, but re-evaluation of this stance is ongoing”.
    By contrast, DSD, now renamed the Australian Signals Directorate, offered a broader sweep of material to its partners.
    DSD offered to share bulk, unselected, unminimised metadata – although there were specific caveats. The note taker at the meeting writes: “However, if a ‘pattern of life’ search detects an Australian then there would be a need to contact DSD and ask them to obtain a ministerial warrant to continue.”
    A “pattern of life” search is more detailed one – joining the dots to build up a portrait of an individual’s daily activities.
    It is technically possible to strip out the metadata of Australian nationals from bulk collection methods used by the 5-Eyes countries, such as cable taps – ensuring the information is not stored, and so could not be pulled in to searches and investigations by agents.
    The Snowden documents reveal Australia’s intelligence services instead offered to leave the data in its raw state.
    Australian politicians have insisted that all surveillance undertaken is in accordance with the law.
    But Geoffrey Robertson, writing in the Guardian today, says if what was described in the memo took place, this would be a breach of sections eight and 12 of the Intelligence Services Act 2001. The act sets a strict requirement that ministerial authorisation is required if the data of an Australian citizen is involved, and indicates that the citizen must be a “person of interest”, such as someone involved in terrorism or organised crime.
    The Cheltenham gathering, which appears to have been convened to consider the issues around the burgeoning collection of metadata and to reach common positions, resolved to avoid pre-emptive efforts to categorise various materials and “simply focus on what is shareable in bulk”.
    The memo flags privacy concerns around the collection of various types of data, but the meeting, according to the record, resolved not to set “automatic limitations” – leaving judgment calls to each country’s own agencies.
    “Consideration was given as to whether any types of data were prohibited, for example medical, legal, religious or restricted business information, which may be regarded as an intrusion of privacy,” the memo says.
    “Given the nascent state of many of these data types then no, or limited, precedents have been set with respect to proportionality or propriety, or whether different legal considerations applies to the ‘ownership’ of this data compared with the communications data that we were more accustomed to handle.”
    “It was agreed that the conference should not seek to set any automatic limitations, but any such difficult cases would have to be considered by ‘owning’ agency on a case-by-case basis.”
    The document also shows the agencies considering disclosure to “non-intelligence agencies”. It says: “Asio and the Australian federal police are currently reviewing how Sigint [signals intelligence] information can be used by non-intelligence agencies.”
    The record of the Cheltenham meeting does not indicate whether the activities under discussion in April 2008 progressed to final decisions or specific actions. It appears to be a working draft.
    Since Snowden leaked the NSA documents to the Guardian and the Washington Post in May, controversy has raged around the world over revelations that surveillance agencies are collecting information in bulk about ordinary citizens’ day-to-day activities, without first getting a warrant.
    In Australia, the Greens party and the South Australian independent senator Nick Xenophon have been pursuing questions about the extent to which Australian citizens have been caught up in the dragnet, and the extent of Australian intelligence agencies’ involvement.
    So far, those questions have largely met with stonewalling, both under the previous Labor government and the new Abbott administration.
    Ewen MacAskill, James Ball and Katharine Murphy
    The Guardian, Monday 2 December 2013 00.20 GMT
    Find this story at 2 December 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Singapore, South Korea revealed as Five Eyes spying partners

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 25, 2013
    Philip Dorling
    Find this story at 25 November 2013
    Copyright © 2013 Fairfax Media

    New Snowden leaks reveal US, Australia’s Asian allies

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 24, 2013
    Philip Dorling
    Find this story at 24 November 2013
    Copyright © 2013 Fairfax Media

    How we spied on the Indonesians and how expats are targeted overseas

    THEIR clandestine activities may be directly in the spotlight, but Australian spies have for decades been listening in on our neighbours.
    Modern spooks have two main methods of tapping the mobile phones of people of interest in cities such as Jakarta. The first option is to install a physical bugging device in the actual handset, to forward calls to a third number – but this requires access to the handset.
    For high-security targets, Australian agents use electronic scanners and very powerful computers to monitor phone numbers of interest via microwave towers (small metal towers that look like venetian blinds) located on top of buildings across Jakarta and all modern cities.
    The latter was employed to tap the phones of Indonesian President Susilo Bambang Yudhoyono, his wife and key ministers.
    Getting hold of a handset is a tricky business so the preferred method for the spooks employed by the Australian Signals Directorate (formerly Defence Signals Directorate) is to monitor microwave phone towers located on top of most buildings in Jakarta and indeed any other major city.
    The material, known at this point as “first echelon”, is captured by computers located in secure rooms at the Australian Embassy where information is filtered before it is forwarded by secure means to super computers located at ASD headquarters. They are located inside the maximum security building ‘M’, protected by high voltage electric fences, at Defence’s Russell Office complex in Canberra. Here it is processed and analysed as “second echelon” product.
    In less busy locations, or where the target phone number is known, an off-the-shelf scanner can be programmed to intercept mobile phone calls.
    In cities such as Jakarta enterprising business people now offer a mobile bugging service where for a fee of between $300 and $1000 they will arrange to “borrow” a mobile phone, insert a bugging device and then return it to a relieved owner. Whenever the phone rings or is used to access a network the call is diverted to another handset or recording device.
    Government staff understand that if their phone goes missing and then turns up they should dispose of it and get a new one.
    But for the average citizen, say a teacher at an English speaking school in Jakarta whose phone was bugged by an angry ex-girlfriend, phone tapping is a serious matter. And it is more common than many expatriates might think.
    There is a thriving business in phone tapping for private or industrial or state espionage reasons in cities such as Jakarta, Singapore and Bangkok. Industrial espionage is widespread in cities around the world including Sydney, Melbourne and Canberra.
    Compared to the operations of ASD and its powerful scanners, super computers and army of analysts these operations are small beer.
    Prime Minister Tony Abbott was quick to point out in the wake of the phone tapping scandal that every country spied and he was right.
    However Indonesia has nowhere near the capacity for espionage that Australia and our close “five eyes” allies – the US, UK, Canada and New Zealand – posses.
    After the 2002 Bali bombings the DSD, Australian Federal Police and Telstra went to Indonesia and showed Indonesian intelligence agencies how to tap into the networks of the terrorist group Jemaah Islamiah (JI).
    Unlike Australia much of Indonesia’s electronic surveillance capacity is directed at internal problems such as the insurgencies in Aceh and West Papua.
    According to one of Australia’s leading experts on electronic spying, Professor Des Ball from the Australian National University, there is really no point in conducting such intercept operations unless a country has the whole picture. That is satellite communications, cable communications and radio communications.
    “Microwave mobile phone calls are very hit and miss,” he said.
    Australia owns the big picture thanks to an expensive and extensive network of listening posts in Jakarta, Bangkok and Port Moresby and powerful satellite ground stations at HMAS Harman in Canberra, Shoal Bay near Darwin, Morundah near Wagga in NSW, Cabarlah near Toowoomba in Qld and Geraldton in WA.
    This interception network is monitoring communications from Singapore to the Pacific Islands including Indonesia’s Palapa satellite.
    Professor Ball said there had been huge growth in Australia’s eavesdropping capacity in recent years. For example the number of dishes at Shoal Bay has gone from six to 15 and Geraldton has more than doubled its capacity including six American dishes for the exclusive use of the National Security Agency (NSA) whose lax security allowed Edward Snowden to abscond with top-secret information that is now being leaked.
    Unfortunately Australian taxpayers have no way of knowing how much is spent on these facilities or even how many staff are employed by the top-secret ASD. The numbers used to appear in the Defence annual report, but not anymore.
    Professor Ball said successive governments had allowed the electronic spooks to have a virtual free rein.
    “When briefings about the phone intercepts from SBY and his wife came in the government should have ordered the tapping to stop,” Professor Ball said.
    “It is important to have the capacity but you only use it when there is a conflict. Put it in, test it and keep it up to date, but don’t use it because unless you have to because it will come out.”
    Professor Ball also slammed Mr Abbott for saying that other countries (Indonesia) were doing exactly what Australia did, because they weren’t and they can’t.
    “They are not doing what we are doing and Abbott should have apologised or done what Bob Hawke did with Papua New Guinea in 1983.”
    Prime Minister Hawke went to Port Moresby after it was revealed that Australia spied on politicians there, but before he left he ordered the spooks switch to all monitoring equipment off for 48 hours. He was then able to say that Australia wasn’t doing it although as journalist Laurie Oakes pointed out he had to be “very careful with his tenses”.
    Tapping a friendly foreign leader’s phone is fraught enough. Recording the fact on clear power point slides and handing them to another country is just plain dumb.
    IAN MCPHEDRAN NATIONAL DEFENCE WRITER
    NEWS LIMITED NETWORK
    NOVEMBER 21, 2013 6:34PM
    Find this story at 21 November 2013
    News Ltd 2013 Copyright

    Spying rocks Indonesia-Australia relations

    Indonesia has officially downgraded the relationship, after Australia refused to apologise for espionage.
    A spy scandal involving an Australian attempt to tap the phone of Indonesia’s president has jeopardised crucial people smuggling and counter-terrorism co-operation between the two countries, officials have said.
    President Susilo Bambang Yudhoyono has temporarily suspended co-coordinated military operations with Australia, including those which target people-smuggling, after significant public outcry in Indonesia over the reports.
    “I find it personally hard to comprehend why the tapping was done. We are not in a cold war era,” President Yudhoyono said.
    Find out more with our exclusive interactive feature
    “I know Indonesians are upset and angry over what Australia has done to Indonesia. Our reactions will determine the future of the relationship and friendship between Indonesia and Australia – which actually have been going well.”
    Angry crowds mobbed Australia’s embassy in Jakarta, burning Australian and American flags on Thursday. Indonesia has officially downgraded its relationship with Australia and recalled its ambassador from Canberra.
    ‘Reasonable’ surveillance
    The country’s prime minister, Tony Abbott, has refused to apologise for what he calls “reasonable” surveillance, but promised to respond to the president’s request for an explanation “swiftly and courteously”.
    “I want to express … my deep and sincere regret about the embarrassment to the president and to Indonesia that’s been caused by recent media reporting,” Abbott told parliament.
    “As always, I am absolutely committed to building the closest possible relationship with Indonesia because that is overwhelmingly in the interests of both our countries.”
    I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities
    Tony Abbott, Australian Prime Minister
    The situation erupted after documents leaked by former US National Security Agency contractor Edward Snowden, showed Australia’s Defence Signal’s Directorate recorded personal communications of President Yudhoyono, his wife, Ani Yudhoyono, and senior officials in 2009.
    The surveillance is understood to be part of a longstanding spying arrangement with the UK, USA, Canada and New Zealand, known as the “five eyes” intelligence partners.
    “I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities,” Abbott told Australia’s parliament on Tuesday.
    “Importantly, in Australia’s case, we use all our resources including information to help our friends and allies, not to harm them,” Abbott said.
    The document leaked by Snowden was dated November 2009 and was published jointly by Guardian Australia and the Australian Broadcasting Corporation state television network.
    It details the attempted interception of various targets’ mobile phones and lists their specific phone models with slides marked “top secret” and the Australian Signals Directorate’s slogan: “Reveal their secrets, protect our own.”
    This leak came after previous documents released by Snowden revealed Australian embassies had participated in
    widespread US surveillance across Asia, including in Cambodia, China, Indonesia, Malaysia, Myanmar and Thailand.
    Strained relations
    The combined revelations have strained a bilateral relationship already under pressure over the Abbott government’s hardline asylum seeker policy to “turn back” boats coming to Australia, a controversial and highly emotive issue in the country.
    Professor Greg Fealy is an Indonesian politics specialist at the Australian National University. He told Al Jazeera the situation was becoming increasingly serious.
    “Every new day brings new sanctions from the Indonesian side and so far the Abbott government hasn’t responded well to it,” Fealy said.
    He believes relations between the two countries have not been this strained since the East Timor crisis in 1999, when Australia’s military went into East Timor during its transition from an Indonesian territory to independence.
    “It has the potential to get worse, with the Indonesians withdrawing further cooperation [with Australia] in many fields,” Fealy said.
    “If there is a sufficiently wide range of retaliation then this could possibly be worse than the crisis of 15 years ago.”
    Prime Minister Abbott has been encouraged to reassure President Yudhoyono that no further surveillance is taking place – similar to the conversation between US President Barack Obama and German Chancellor Angela Merkel after
    revelations her phone was also tapped.
    John McCarthy, a former Australian ambassador to Indonesia, said Abbott must contact Yudhoyono to make amends.
    “There is nothing, frankly, to prevent the prime minister saying to the president that it’s not happening and it’s not going to happen in the future. That’s what Obama did with Angela Merkel and I don’t see a problem with that,”
    McCarthy said.
    “It can’t be allowed just to fester. If it festers it will get worse and it will be much harder to deal with, particularly as the politics get hotter in Indonesia.”
    US blame
    Australian officials would also be expressing their frustration with the United States over this situation, according to Michael Wesley, professor of national security at the Australian National University.
    “There are a number of reasons Australian officials can legitimately be very irritated with the Americans. We’re in this mess because of an American security lapse,” Wesley told Al Jazeera.
    “I’m actually gobsmacked at both Snowden and Bradley Manning, at their ability to get highly classified documents and download them. It would be absolutely impossible for people of their level of access to do that in Australia.”
    “There should be real questions asked in the American intelligence community how this could have happened,” Professor Wesley said.
    Former NSA senior executive Thomas Drake said the “five eyes” utilise each other’s services for information on other nations.
    “Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” Drake told ABC.
    Indonesia’s minister for religious affairs, Suryadharma Ali, also cancelled a planned visit to Australia following the response from Yudhoyono.
    Author and Indonesian political expert Professor Damien Kingsbury was due to host Ali at an event in Melbourne, and
    told Al Jazeera the snub was a concerning sign of the deterioration in relations.
    “It is still quite significant that a senior minister felt he couldn’t come to Australia at this time,” Kingsbury said.
    “It’s pretty disastrous, the issue has effectively ended ongoing diplomatic engagement between Australia and Indonesia.”
    “We’ve seen the cancellation and suspension of a number of points of engagement and that has quite distinct implications for Australian government policy in some areas. There is the possibility this matter could continue to escalate if it’s not adequately resolved,” Kingsbury said.
    ‘Uncomfortable’
    The bilateral relationship between the two nations will be “uncomfortable” but it will pass, according to former US assistant secretary of state for East Asia, Kurt Campbell.
    “The relationship will be strong again, but there is a ritual quality that I’m afraid you [Australia] will have to go through, and very little you can say now or do is going to ease the next couple of months,” Campbell told ABC.
    He said the practice of phone-tapping was an acceptable part of international relations.
    “I can tell you that some of the most sensitive spying is done by allies and friends.”
    “Some of the most difficult foreign policy challenges – terrorist attacks – actually emanated in Indonesia. Australia has good cause to understand the delicate dynamics that play out behind the scenes with regard to how Indonesia’s thinking about some of those movements and some of the actors inside its country,” Campbell said.
    Australian opposition leader Bill Shorten said the “vital” relationship between the two countries must be repaired.
    “No-one should underestimate what is at stake in maintaining this critical relationship on the best possible terms.
    “Co-operation between our countries is fundamental to our national interest – working together on people smuggling, terrorism, trade,” Shorten wrote in an opinion piece for The Guardian.
    Prime Minister Abbott is expected to respond to Indonesia’s request for a full written explanation into the phone tapping in the coming days.
    Geraldine Nordfeldt Last updated: 22 Nov 2013 15:00
    Find this story at 22 November 2013

    Indonesia voices anger at Australia alleged spying

    (CNN) — Indonesia summoned the Australian ambassador Monday to voice its anger at allegations that Australia tried to listen into the phone calls of Indonesian President Susilo Bambang Yudhoyono.
    Greg Moriarty. Australia’s ambassador to Indonesia, “took careful note of the issues raised and will report back to the Australian Government,” the Australian embassy in Jakarta said.
    Indonesia’s objections stem from reports in the Australian Broadcasting Corporation (ABC) and Guardian Australia that said Australian intelligence tracked Yudhoyono’s mobile phone for 15 days in August 2009, monitoring the calls he made and received.
    ‘We live in a post-Snowden age’
    Stone: ‘We’ve bugged the whole world’
    Fareed’s Take: Spying on allies
    The intelligence agency also tried to listen in on what was said on at least one occasion. But the call was less than a minute long and could not be successfully tapped, ABC reported.
    The two media outlets cited documents provided by Edward Snowden, the U.S. national security contractor turned leaker.
    “The Australian Government urgently needs to clarify on this news, to avoid further damage,” Indonesian presidential spokesman Teuku Faizasyah tweeted.
    “The damage has been done and now trust must be rebuilt,” he said in another tweet.
    Asked in parliament to comment on the reports, Australian Prime Minister Tony Abbott said, “all governments gather information and all governments know that every other government gathers information.”
    “The Australian Government never comments on specific intelligence matters,” he added. “This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    By the CNN Staff
    November 18, 2013 — Updated 1033 GMT (1833 HKT)
    Find this story at 18 November 2013
    © 2013 Cable News Network. Turner Broadcasting System, Inc.

    Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal

    Video: Watch: Michael Brissenden on how leaked documents prove Australia spied on SBY (ABC News)
    Photo: The documents show the DSD tracked activity on Susilo Bambang Yudhoyono’s mobile phone. (Reuters: Supri)
    Related Story: Live: Follow the unfolding reaction to this story
    Map: Australia
    Australian intelligence tried to listen in to Indonesian president Susilo Bambang Yudhoyono’s mobile phone, material leaked by NSA whistleblower Edward Snowden reveals.
    Documents obtained by the ABC and Guardian Australia, from material leaked by the former contractor at the US National Security Agency, show Australian intelligence attempted to listen in to Mr Yudhoyono’s telephone conversations on at least one occasion and tracked activity on his mobile phone for 15 days in August 2009.
    Spy games explained
    Australia’s role in the NSA spy program, including what it means for Indonesian relations.
    The top-secret documents are from Australia’s electronic intelligence agency, the Defence Signals Directorate (now called the Australian Signals Directorate), and show for the first time how far Australian spying on Indonesia has reached.
    The DSD motto stamped on the bottom of each page reads: “Reveal their secrets – protect our own.”
    The documents show that Australian intelligence actively sought a long-term strategy to continue to monitor the president’s mobile phone activity.
    The surveillance targets also included senior figures in his inner circle and even the president’s wife Kristiani Herawati (also known as Ani Yudhoyono).
    Also on the list of targets is the vice president Boediono, the former vice president Yussuf Kalla, the foreign affairs spokesman, the security minister, and the information minister.
    Mr Yudhoyono’s spokesman Teuku Faizasyah has responded to the revelations, saying: “The Australian Government needs to clarify this news, to avoid further damage … [but] the damage has been done.”
    Asked about the spying in Question Time today, Prime Minister Tony Abbott said: “First of all, all governments gather information and all governments know that every other government gathers information… the Australian government never comments on specific intelligence matters. This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    Documents list ‘who’s who’ of Indonesian government
    One page in the documentation lists the names and the 3G handsets the surveillance targets were using at the time.
    A number of the people on the list are lining up as potential candidates for the presidential election to replace Mr Yudhoyono next year.
    The documents are titled “3G impact and update” and appear to chart the attempts by Australian intelligence to keep pace with the rollout of 3G technology in Indonesia and across South-East Asia.
    A number of intercept options are listed and a recommendation is made to choose one of them and to apply it to a target – in this case the Indonesian leadership.
    The document shows how DSD monitored the call activity on Mr Yudhoyono’s Nokia handset for 15 days in August 2009.
    One page is titled “Indonesian President voice events” and provides what is called a CDR view. CDR are call data records; it can monitor who is called and who is calling but not necessarily what was said.
    Another page shows that on at least one occasion Australian intelligence did attempt to listen in to one of Mr Yudhoyono’s conversations.
    But according to the notes on the bottom of the page, the call was less than one minute long and therefore did not last long enough to be successfully tapped.
    Factbox: Indonesia and Australia
    Indonesia is one of Australia’s most important bilateral relationships.
    Indonesia was Australia’s 12th largest trade partner in 2012.
    Prime Minister Tony Abbott has pledged to increase two-way trade and investment flows.
    President Yudhoyono has visited Australia four times during his presidency, more than any predecessor.
    Asylum seekers remain a sticking point in relations; Australia seeks active cooperation.
    In 2012-13, Australia’s aid assistance to Indonesia was worth an estimated $541.6 million.
    Source: http://www.dfat.gov.au/geo/indonesia/indonesia_brief.html
    Given the diplomatic furore that has already surrounded the claims that the Australian embassy in Jakarta was involved in general spying on Indonesia, these revelations of specific and targetted surveillance activity at the highest level are sure to increase the tension with our nearest and most important neighbour significantly.
    On an official visit to Canberra last week, the Indonesian vice president publicly expressed Indonesia’s concern.
    “Yes, the public in Indonesia is concerned about this,” Boediono said.
    “I think we must look to come to some arrangement that guarantees intelligence information from each side is not used against the other.”
    Last week Prime Minister Tony Abbott was keen to play down the significance of the spying allegations, saying that he was very pleased “we have such a close, cooperative and constructive relationship with the Indonesian government”.
    That may be a little harder to say today.
    By national defence correspondent Michael Brissenden
    Updated Mon 18 Nov 2013, 8:11pm AEDT
    Find this story at 18 November 2013
    © 2013 ABC

    Australia’s spy agencies targeted Indonesian president’s mobile phone

    Secret documents revealed by Edward Snowden show Australia tried to monitor the mobile calls of Susilo Bambang Yudhoyono and his wife
    Susilo Bambang Yudhoyono, accompanied by his first lady, Kristiani Herawati, speaks to his Democratic party supporters during a rally in Banda Aceh, Aceh province, in March 2009. Photograph: Supri/Reuters
    Australia’s spy agencies have attempted to listen in on the personal phone calls of the Indonesian president, Susilo Bambang Yudhoyono, and have targeted the mobile phones of his wife, senior ministers and confidants, a top-secret document from whistleblower Edward Snowden reveals.
    The document, dated November 2009, names the president and nine of his inner circle as targets of the surveillance, including the vice-president, Boediono, who last week visited Australia. Other named targets include ministers from the time who are now possible candidates in next year’s Indonesian presidential election, and the first lady, Kristiani Herawati, better known as Ani Yudhoyono.
    When a separate document from Snowden, a former contractor to the US’s National Security Agency (NSA), showed Australia had spied on Indonesia and other countries from its embassies, the Indonesian foreign minister, Marty Natalegawa, reacted angrily and threatened to review co-operation on issues crucial to Australia such as people smuggling and terrorism.
    The revelation strained a bilateral relationship already under pressure over the Abbott government’s policy to “turn back” boats of asylum seekers coming to Australia. The new leak, published jointly by Guardian Australia and the Australian Broadcasting Corporation, reveals the specific top-level targets and is likely to seriously escalate those tensions.
    The leaked material is a slide presentation, marked top secret, from the Australian Department of Defence and the Defence Signals Directorate, or DSD, (now called the Australian Signals Directorate), dealing with the interception of mobile phones as 3G technology was introduced in Asia. It includes a slide titled Indonesian President Voice Intercept, dated August 2009 and another slide, titled IA Leadership Targets + Handsets, listing the president and the first lady as having Nokia E90-1s, Boediono as having a BlackBerry Bold 9000, as well as the type and make of the mobile phones held by the other targets.
    Also named as targets for the surveillance are Dino Patti Djalal, at the time the president’s foreign affairs spokesman, who recently resigned as Indonesia’s ambassador to the US and is seeking the candidacy in next year’s presidential election for the president’s embattled Democratic party, and Hatta Rajasa, now minister for economic affairs and possible presidential candidate for the National Mandate party. Hatta was at the time minister for transport and his daughter is married to the president’s youngest son.
    A slide entitled Indonesian President Voice Intercept (August ’09), shows a call from an unknown number in Thailand to Yudhoyono. But the call did not last long enough for the DSD to fulfil its aims. “Nil further info at this time (didn’t make the dev threshold – only a sub-1minute call),” a note at the bottom says.
    Another slide, titled Indonesian President Voice Events, has a graphic of calls on Yudhoyono’s Nokia handset over 15 days in August 2009. It plots CDRs – call data records – which record the numbers called and calling a phone, the duration of calls, and whether it was a voice call or SMS. The agency, in what is standard procedure for surveillance, appears to have expanded its operations to include the calls of those who had been in touch with the president. Another slide, entitled Way Forward, states an imperative: “Must have content.”
    Also on the list of “IA Leadership Targets” are:
    • Jusuf Kalla, the former vice-president who ran as the Golkar party presidential candidate in 2009.
    • Sri Mulyani Indrawati, then a powerful and reforming finance minister and since 2010 one of the managing directors of the World Bank Group.
    • Andi Mallarangeng, a former commentator and television host who was at the time the president’s spokesman, and who was later minister for youth and sports before resigning amid corruption allegations.
    • Sofyan Djalil, described on the slide as a “confidant”, who until October 2009 was minister for state-owned enterprises.
    • Widodo Adi Sucipto, a former head of the Indonesian military who was until October 2009 security minister.
    Asked about the previous revelations about the embassies, Tony Abbott emphasised that they occurred during the administration of the former Labor government, that Australia’s activities were not so much “spying” as “research” and that its intention would always be to use any information “for good”. The prime minister has repeatedly insisted Australia’s relationship with Indonesia is “good and getting better”.
    Boediono said during his visit to Australia – before being revealed as an intended target of Australia’s surveillance – that the Indonesian public was “concerned” about the spying allegations.
    “I think we must look forward to come to some arrangement which guarantees that intelligence information from each side is not used against the other,” he said. “There must be a system.”
    At the bottom of each slide in the 2009 presentation is the DSD slogan: “Reveal their secrets – protect our own.” The DSD is credited with supplying the information.
    Yudhoyono now joins his German, Brazilian and Mexican counterparts as leaders who have been monitored by a member of Five Eyes, the collective name for the surveillance agencies of the US, Britain, Australia, New Zealand and Canada, who share information.
    Germany, Brazil and Mexico have all protested to the US over the infringement of privacy by a country they regarded as friendly. The German chancellor, Angela Merkel, reacted with outrage to the revelation that her personal mobile phone had been tapped by the US, calling President Barack Obama to demand an explanation. The US eventually assured the chancellor that her phone was “not currently being tapped and will not be in the future”.
    The Australian slide presentation, dated November 2009, deals with the interception of 3G mobile phones, saying the introduction of 3G in south-east Asia was nearly complete and providing dates for 3G rollout in Cambodia, Malaysia, the Philippines, Singapore and Thailand.
    Talking about future plans, the Australian surveillance service says it “must have content” and be able to read encrypted messages, which would require acquiring the keys that would unlock them. Other documents from Snowden show the intelligence agencies have made huge inroads in recent years in finding ways into encrypted messages.
    One of the slides, entitled DSD Way Forward, acknowledges that the spy agency’s resources are limited compared with its US and British counterparts. It says there is a “need to capitalise on UKUSA and industry capability”, apparently a reference to the help provided – willingly or under pressure – from telecom and internet companies. The slides canvass “options” for continued surveillance and the final slide advises: “Choose an option and apply it to a target (like Indonesian leadership).”
    The tension between Australia and Indonesia began in October when documents revealed by the German newspaper Der Spiegel and published by Fairfax newspapers revealed that Australian diplomatic posts across Asia were being used to intercept phone calls and data. The Guardian then revealed that the DSD worked alongside America’s NSA to mount a massive surveillance operation in Indonesia during a UN climate change conference in Bali in 2007.
    But these earlier stories did not directly involve the president or his entourage. Abbott made his first international trip as prime minister to Indonesia and has repeatedly emphasised the crucial importance of the bilateral relationship.
    Speaking after his meeting with Boediono last week, Abbott said: “All countries, all governments gather information. That’s hardly a surprise. It’s hardly a shock.
    “We use the information that we gather for good, including to build a stronger relationship with Indonesia and one of the things that I have offered to do today in my discussions with the Indonesian vice-president is to elevate our level of information-sharing because I want the people of Indonesia to know that everything, everything that we do is to help Indonesia as well as to help Australia. Indonesia is a country for which I have a great deal of respect and personal affection based on my own time in Indonesia.”
    Asked about the spying revelations in a separate interview, Abbott said: “To use the term spying, it’s kind of loaded language … researching maybe. Talking to people. Understanding what’s going on.”
    On Monday a spokesman for Abbott said: “Consistent with the long-standing practice of Australian governments, and in the interest of national security, we do not comment on intelligence matters.”
    It remains unclear exactly who will contest next year’s Indonesian presidential election, in which Yudhoyono, having already served two terms, is not eligible to stand. Based on recent polling, the popular governor of Jakarta, Joko Widodo, known as Jokowi, and former general Prabowo Subianto would be frontrunners.
    Ewen MacAskill in New York and Lenore Taylor in Canberra
    theguardian.com, Monday 18 November 2013 00.58 GMT
    Find this story at 18 November 2013
    Find the documents at
     
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    It’s outrageous to accuse the Guardian of aiding terrorism by publishing Snowden’s revelations

    Alan Rusbridger is being grilled by MPs – but he has published nothing that could be a threat to national security
    The Guardian’s editor, Alan Rusbridger, is due to appear before the House of Commons home affairs select committee on Tuesday to answer questions about his newspaper’s publication of intelligence files leaked by Edward Snowden. Unlike the directors of MI5, MI6 and GCHQ, who gave evidence recently before the intelligence and security committee, Rusbridger will not be provided with a list of questions in advance.
    There are at least five legal and political issues arising out of Snowden’s revelations on which reasonable opinion is divided. These include whether Snowden should enjoy the legal protection accorded a whistleblower who reveals wrongdoing; whether his revelations have weakened the counter-terrorism apparatus of the US or the UK; whether, conversely, they show the need for an overhaul of surveillance powers on both sides of the Atlantic (and even an international agreement to protect partners like Germany); whether parliament has been misled by the services about the extent of intrusive surveillance; and whether the current system for parliamentary oversight of the intelligence and security services is sufficiently robust to meet the international standards laid down by my predecessor at the UN, Martin Scheinin.
    These questions are too important for the UN to ignore, and so on Tuesday I am launching an investigation that will culminate in a series of recommendations to the UN general assembly next autumn. As in the case of Chelsea Manning, there are also serious questions about sensitive information being freely available to so many people. The information Snowden had access to, which included top-secret UK intelligence documents, was available to more than 850,000 people, including Snowden – a contractor not even employed by the US government.
    There is, however, one issue on which I do not think reasonable people can differ, and that is the importance of the role of responsible media in exposing questions of public interest. I have studied all the published stories that explain how new technology is leading to the mass collection and analysis of phone, email, social media and text message data; how the relationship between intelligence services and technology and telecoms companies is open to abuse; and how technological capabilities have moved ahead of the law. These issues are at the apex of public interest concerns. They are even more important – dare I say it – than whether Hugh Grant’s mobile was hacked by a tabloid.
    The astonishing suggestion that this sort of journalism can be equated with aiding and abetting terrorism needs to be scotched decisively. Attacking the Guardian is an attempt to do the bidding of the services themselves, by distracting attention from the real issues. It is the role of a free press to hold governments to account, and yet there have even been outrageous suggestions from some Conservative MPs that the Guardian should face a criminal investigation.
    It is disheartening to see some tabloids give prominence to this nonsense. When the Mail on Sunday took the decision to publish the revelations of the former MI5 officer David Shayler, no one suggested that the paper should face prosecution. Indeed, when the police later tried to seize the Guardian’s notes of its own interviews with Shayler, Lord Judge, the former lord chief justice, refused to allow it to happen – saying, rightly, that it would interfere with the vital role played by the media to expose public wrongdoing.
    When it comes to damaging national security, comparisons between the two cases are telling. The Guardian has revealed that there is an extensive programme of mass surveillance that potentially affects every one of us, while being assiduous in avoiding the revelation of any name or detail that could put sources at risk. Rusbridger himself has made most of these decisions, as befits their importance. The Mail on Sunday, on the other hand, published material that was of less obvious public interest.
    An even closer example is Katharine Gunn, the GCHQ whistleblower who revealed in 2003 that the US and UK were spying on the missions of Mexico and five other countries at the UN, in order to manipulate a vote in the security council in favour of military intervention in Iraq. Like Snowden, her defence was that she was acting to prevent a greater wrong – the attempt to twist the security council to the bellicose will of the US and UK. She was charged under the Official Secrets Act, but the case was dropped because the director of public prosecutions and attorney general rightly concluded that no jury would convict Gunn.
    There can be no doubt that the Guardian’s revelations concern matters of international public interest. There is already an intense debate that has drawn interventions from some of the UK’s most senior political figures. Wholesale reviews have been mooted by President Obama, Chancellor Merkel and Nick Clegg, Britain’s deputy prime minister. Current and former privy councillors and at least one former law officer have weighed in.
    In the US, a number of the revelations have already resulted in legislation. Senior members of Congress have informed the Guardian that they consider the legislation to have been misused, and the chair of the US Senate intelligence committee has said that as a result of the revelations it is now “abundantly clear that a total review of all intelligence programmes is necessary”.
    In Europe, and particularly in Germany (which has a long and unhappy history of abusive state surveillance) the political class is incandescant. In November the Council of Europe parliamentary assembly endorsed the Tshwane International Principles on National Security and the Right to Information, which provide the strongest protection for public interest journalism deriving from whistleblowers. Lord Carlile, the former independent reviewer of terrorism legislation in the UK, took part in the drafting of the principles and has endorsed them as an international template for resolving issues such as the present one. Many states have registered serious objections at the UN about spying, and there are diplomatic moves towards an international agreement to restrict surveillance activity. In direct response to the Guardian’s revelations, Frank La Rue, the special rapporteur on freedom of expression, has brought forward new guidelines on internet privacy, which were adopted last week by the UN general assembly.
    When it comes to assessing the balance that must be struck between maintaining secrecy and exposing information in the public interest there are often borderline cases. This isn’t one. It’s a no-brainer. The Guardian’s revelations are precisely the sort of information that a free press is supposed to reveal.
    The claims made that the Guardian has threatened national security need to be subjected to penetrating scrutiny. I will be seeking a far more detailed explanation than the security chiefs gave the intelligence committee. If they wish to pursue an agenda of unqualified secrecy, then they are swimming against the international tide. They must justify some of the claims they have made in public, because, as matters stand, I have seen nothing in the Guardian articles that could be a risk to national security. In this instance the balance of public interest is clear.
    Ben Emmerson
    The Guardian, Monday 2 December 2013 18.21 GMT
    Find this story at 2 December 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Meet the Spies Doing the NSA’s Dirty Work; This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.

    With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
    When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
    But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
    The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.
    But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.
    The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. Its motto: “Vigilance Through Technology.” The DITU is responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States. According to a senior Justice Department official, the NSA could not do its job without the DITU’s help. The unit works closely with the “big three” U.S. telecommunications companies — AT&T, Verizon, and Sprint — to ensure its ability to intercept the telephone and Internet communications of its domestic targets, as well as the NSA’s ability to intercept electronic communications transiting through the United States on fiber-optic cables.
    For Prism, the DITU maintains the surveillance equipment that captures what the NSA wants from U.S. technology companies, including archived emails, chat-room sessions, social media posts, and Internet phone calls. The unit then transmits that information to the NSA, where it’s routed into other parts of the agency for analysis and used in reports.
    After Prism was disclosed in the Washington Post and the Guardian, some technology company executives claimed they knew nothing about a collection program run by the NSA. And that may have been true. The companies would likely have interacted only with officials from the DITU and others in the FBI and the Justice Department, said sources who have worked with the unit to implement surveillance orders.
    “The DITU is the main interface with providers on the national security side,” said a technology industry representative who has worked with the unit on many occasions. It ensures that phone companies as well as Internet service and email providers are complying with surveillance law and delivering the information that the government has demanded and in the format that it wants. And if companies aren’t complying or are experiencing technical difficulties, they can expect a visit from the DITU’s technical experts to address the problem.
    * * *
    Recently, the DITU has helped construct data-filtering software that the FBI wants telecom carriers and Internet service providers to install on their networks so that the government can collect large volumes of data about emails and Internet traffic.
    The software, known as a port reader, makes copies of emails as they flow through a network. Then, in practically an instant, the port reader dissects them, removing only the metadata that has been approved by a court.
    The FBI has built metadata collection systems before. In the late 1990s, it deployed the Carnivore system, which the DITU helped manage, to pull header information out of emails. But the FBI today is after much more than just traditional metadata — who sent a message and who received it. The FBI wants as many as 13 individual fields of information, according to the industry representative. The data include the route a message took over a network, Internet protocol addresses, and port numbers, which are used to handle different kinds of incoming and outgoing communications. Those last two pieces of information can reveal where a computer is physically located — perhaps along with its user — as well as what types of applications and operating system it’s running. That information could be useful for government hackers who want to install spyware on a suspect’s computer — a secret task that the DITU also helps carry out.
    The DITU devised the port reader after law enforcement officials complained that they weren’t getting enough information from emails and Internet traffic. The FBI has argued that under the Patriot Act, it has the authority to capture metadata and doesn’t need a warrant to get them. Some federal prosecutors have gone to court to compel port reader adoption, the industry representative said. If a company failed to comply with a court order, it could be held in contempt.
    The FBI’s pursuit of Internet metadata bears striking similarities to the NSA’s efforts to obtain the same information. After the 9/11 terrorist attacks, the agency began collecting the information under a secret order signed by President George W. Bush. Documents that were declassified Nov. 18 by Barack Obama’s administration show that the agency ran afoul of the Foreign Intelligence Surveillance Court after it discovered that the NSA was collecting more metadata than the court had allowed. The NSA abandoned the Internet metadata collection program in 2011, according to administration officials.
    But the FBI has been moving ahead with its own efforts, collecting more metadata than it has in the past. It’s not clear how many companies have installed the port reader, but at least two firms are pushing back, arguing that because it captures an entire email, including content, the government needs a warrant to get the information. The government counters that the emails are only copied for a fraction of a second and that no content is passed along to the government, only metadata. The port reader is designed also to collect information about the size of communications packets and traffic flows, which can help analysts better understand how communications are moving on a network. It’s unclear whether this data is considered metadata or content; it appears to fall within a legal gray zone, experts said.
    * * *
    The DITU also runs a bespoke surveillance service, devising or building technology capable of intercepting information when the companies can’t do it themselves. In the early days of social media, when companies like LinkedIn and Facebook were starting out, the unit worked with companies on a technical solution for capturing information about a specific target without also capturing information related to other people to whom the target was connected, such as comments on posts, shared photographs, and personal data from other people’s profiles, according to a technology expert who was involved in the negotiations.
    The technicians and engineers who work at the DITU have to stay up to date on the latest trends and developments in technology so that the government doesn’t find itself unable to tap into a new system. Many DITU employees used to work for the telecom companies that have to implement government surveillance orders, according to the industry representative. “There are a lot of people with inside knowledge about how telecommunications work. It’s probably more intellectual property than the carriers are comfortable with the FBI knowing.”
    The DITU has also intervened to ensure that the government maintains uninterrupted access to the latest commercial technology. According to the Guardian, the unit worked with Microsoft to “understand” potential obstacles to surveillance in a new feature of Outlook.com that let users create email aliases. At the time, the NSA wanted to make sure that it could circumvent Microsoft’s encryption and maintain access to Outlook messages. In a statement to the Guardian, Microsoft said, “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” It’s the DITU’s job to help keep companies in compliance. In other instances, the unit will go to companies that manufacture surveillance software and ask them to build in particular capabilities, the industry representative said.
    The DITU falls under the FBI’s Operational Technology Division, home to agents, engineers, electronic technicians, computer forensics examiners, and analysts who “support our most significant investigations and national security operations with advanced electronic surveillance, digital forensics, technical surveillance, tactical operations, and communications capabilities,” according to the FBI’s website. Among its publicly disclosed capabilities are surveillance of “wireline, wireless, and data network communication technologies”; collection of digital evidence from computers, including audio files, video, and images; “counter-encryption” support to help break codes; and operation of what the FBI claims is “the largest fixed land mobile radio system in the U.S.”
    The Operational Technology Division also specializes in so-called black-bag jobs to install surveillance equipment, as well as computer hacking, referred to on the website as “covert entry/search capability,” which is carried out under law enforcement and intelligence warrants.
    The tech experts at Quantico are the FBI’s silent cybersleuths. “While [the division’s] work doesn’t typically make the news, the fruits of its labor are evident in the busted child pornography ring, the exposed computer hacker, the prevented bombing, the averted terrorist plot, and the prosecuted corrupt official,” according to the website.
    According to former law enforcement officials and technology industry experts, the DITU is among the most secretive and sophisticated outfits at Quantico. The FBI declined Foreign Policy’s request for an interview about the unit. But in a written statement, an FBI spokesperson said it “plays a key role in providing technical expertise, services, policy guidance, and support to the FBI and the intelligence community in collecting evidence and intelligence through the use of lawfully authorized electronic surveillance.”
    In addition to Carnivore, the DITU helped develop early FBI Internet surveillance tools with names like CoolMiner, Packeteer, and Phiple Troenix. One former law enforcement official said the DITU helped build the FBI’s Magic Lantern keystroke logging system, a device that could be implanted on a computer and clandestinely record what its user typed. The system was devised to spy on criminals who had encrypted their communications. It was part of a broader surveillance program known as Cyber Knight.
    In 2007, Wired reported that the FBI had built another piece of surveillance malware to track the source of a bomb threat against a Washington state high school. Called a “computer and Internet protocol address verifier,” it was able to collect details like IP addresses, a list of programs running on an infected computer, the operating system it was using, the last web address visited, and the logged-in user name. The malware was handled by the FBI’s Cryptologic and Electronic Analysis Unit, located next door to the DITU’s facilities at Quantico. Wired reported that information collected by the malware from its host was sent via the Internet to Quantico.
    The DITU has also deployed what the former law enforcement official described as “beacons,” which can be implanted in emails and, when opened on a target’s computer, can record the target’s IP address. The former official said the beacons were first deployed to track down kidnappers.
    * * *
    Lately, one of the DITU’s most important jobs has been to keep track of surveillance operations, particularly as part of the NSA’s Prism system, to ensure that companies are producing the information that the spy agency wants and that the government has been authorized to obtain.
    The NSA is the most frequent requester of the DITU’s services, sources said. There is a direct fiber-optic connection between Quantico and the agency’s headquarters at Fort Meade, Maryland; data can be moved there instantly. From the companies’ perspective, it doesn’t much matter where the information ends up, so long as the government shows up with a lawful order to get it.
    “The fact that either the targets are coming from the NSA or the output goes to the NSA doesn’t matter to us. We’re being compelled. We’re not going to do any more than we have to,” said one industry representative.
    But having the DITU act as a conduit provides a useful public relations benefit: Technology companies can claim — correctly — that they do not provide any information about their customers directly to the NSA, because they give it to the DITU, which in turn passes it to the NSA.
    But in the government’s response to the controversy that has erupted over government surveillance programs, FBI officials have been conspicuously absent. Robert Mueller, who stepped down as the FBI’s director in September, testified before Congress about disclosed surveillance only twice, and that was in June, before many of the NSA documents that Snowden leaked had been revealed in the media. On Nov. 14, James Comey gave his first congressional testimony as the FBI’s new director, and he was not asked about the FBI’s involvement in surveillance operations that have been attributed to the NSA. Attorney General Eric Holder has made few public comments about surveillance. (His deputy has testified several times.)
    The former law enforcement official said Holder and Mueller should have offered testimony and explained how the FBI works with the NSA. He was concerned by reports that the NSA had not been adhering to its own minimization procedures, which the Justice Department and the FBI review and vouch for when submitting requests to the Foreign Intelligence Surveillance Court.
    “Where they hadn’t done what was represented to the court, that’s unforgivable. That’s where I got sick to my stomach,” the former law enforcement official said. “The government’s position is, we go to the court, apply the law — it’s all approved. That makes for a good story until you find out what was approved wasn’t actually what was done.”
    BY SHANE HARRIS | NOVEMBER 21, 2013
    Find this story at 21 November 2013
    ©2013 The Slate Group, LLC.

    FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 2013

    For now, law enforcement has trouble monitoring Gmail communications in real time
    Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
    Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
    That’s because a 1994 surveillance law called the Communications Assistance for Law Enforcement Act only allows the government to force Internet providers and phone companies to install surveillance equipment within their networks. But it doesn’t cover email, cloud services, or online chat providers like Skype. Weissmann said that the FBI wants the power to mandate real-time surveillance of everything from Dropbox and online games (“the chat feature in Scrabble”) to Gmail and Google Voice. “Those communications are being used for criminal conversations,” he said.
    While it is true that CALEA can only be used to compel Internet and phone providers to build in surveillance capabilities into their networks, the feds do have some existing powers to request surveillance of other services. Authorities can use a “Title III” order under the “Wiretap Act” to ask email and online chat providers furnish the government with “technical assistance necessary to accomplish the interception.” However, the FBI claims this is not sufficient because mandating that providers help with “technical assistance” is not the same thing as forcing them to “effectuate” a wiretap. In 2011, then-FBI general counsel Valerie Caproni—Weissmann’s predecessor—stated that Title III orders did not provide the bureau with an “effective lever” to “encourage providers” to set up live surveillance quickly and efficiently. In other words, the FBI believes it doesn’t have enough power under current legislation to strong-arm companies into providing real-time wiretaps of communications.
    Because Gmail is sent between a user’s computer and Google’s servers using SSL encryption, for instance, the FBI can’t intercept it as it is flowing across networks and relies on the company to provide it with access. Google spokesman Chris Gaither hinted that it is already possible for the company to set up live surveillance under some circumstances. “CALEA doesn’t apply to Gmail but an order under the Wiretap Act may,” Gaither told me in an email. “At some point we may expand our transparency report to cover this topic in more depth, but until then I’m not able to provide additional information.”
    Either way, the FBI is not happy with the current arrangement and is on a crusade for more surveillance authority. According to Weissmann, the bureau is working with “members of intelligence community” to craft a proposal for new Internet spy powers as “a top priority this year.” Citing security concerns, he declined to reveal any specifics. “It’s a very hard thing to talk about publicly,” he said, though acknowledged that “it’s something that there should be a public debate about.”
    Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
    By Ryan Gallagher
    Find this story at 26 March 2013
    © 2013 The Slate Group, LLC.

    Is NSA Prism the New FBI Carnivore?

    From the ‘Uncle Sam is Watching’ files:
    Lots of concern and talk in the last couple of days over the Washington Post’s leaked government story on PRISM.
    The TL;dr version is that PRISM was/is an NSA operation that routes American’s private information to the NSA where it can be analyzed in the interest of national security.
    While the revelation about NSA PRISM is new – the fact that the U.S. Government has active programs to surveil the Internet for email and otherwise is not.
    Back in 2005 it was revealed that the FBI had to abandon it’s own Internet surveillance effort known as Carnivore. With Carnivore, the FBI was quite literally injesting email and Internet content en masse from the U.S .
    Officially known as the Digital Collection System 1000 (DCS-1000), Carnivore captures data traffic that flows through an Internet service provider (ISP). The system prompted a flurry of criticism from privacy advocates when it was announced in 2000 during the Clinton administration.
    At the time that Carnivore was shut down, the Electronic Privacy Information Center (EPIC) speculated that, “FBI’s need for Carnivore-like Internet surveillance tools is decreasing, likely because ISPs are providing Internet traffic information directly to the government.”
    Eight years later, it looks like EPIC was right – since it would appear based on the WaPo report that the NSA has been getting info directly from providers.
    I saw the head of the NSA, General Alexander speak at Defcon last year and he’s slotted to speak as a keynote at Black Hat this year. I wonder if he’ll actually show up now given the revelation of PRISM.
    By Sean Michael Kerner | June 06, 2013
    Find this story at 6 June 2013
    Copyright 2013 QuinStreet Inc.

    FBI retires its Carnivore (2005)

    FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.
    Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.
    Carnivore became a hot topic among civil libertarians, some network operators and many lawmakers in 2000, when an ISP’s legal challenge brought the surveillance tool’s existence to light. One controversy revolved around the FBI’s legally-murky use of the device to obtain e-mail headers and other information without a wiretap warrant — an issue Congress resolved by explicitly legalizing the practice in the 2001 USA PATRIOT Act.
    Under section 216 of the act, the FBI can conduct a limited form of Internet surveillance without first visiting a judge and establishing probable cause that the target has committed a crime. In such cases the FBI is authorized to capture routing information like e-mail addresses or IP addresses, but not the contents of the communications.
    According to the released reports, the bureau used that power three times in 2002 and six times in 2003 in cases in which it brought its own Internet surveillance gear to the job. Each of those surveillance operations lasted sixty days or less, except for one investigation into alleged extortion, arson and “teaching of others how to make and use destructive devices” that ran over eight months from January 10th to August 26th, 2002.
    Other cases investigated under section 216 involved alleged mail fraud, controlled substance sales, providing material support to terrorism, and making obscene or harassing telephone calls within the District of Columbia. The surveillance targets’ names are not listed in the reports.
    In four additional cases, twice each in 2002 and 2003, the FBI obtained a full-blown Internet wiretap warrant from a judge, permitting them to capture the contents of a target’s Internet communications in real time. No more information on those cases is provided in the reports because they involved “sensitive investigations,” according to the bureau.
    The new documents only enumerate criminal investigations in which the FBI deployed a government-owned surveillance tool, not those in which an ISP used its own equipment to facilitate the spying. Cases involving foreign espionage or international terrorism are also omitted.
    Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture e-mail messages, and reconstruct Web pages exactly as a surveillance target saw them while surfing the Web. FBI agents lugged it with them to ISPs that lacked their own spying capability.
    Kevin Poulsen, SecurityFocus 2005-01-14
    Find this story at 14 January 2005
    Copyright 2010, SecurityFocus

    << oudere artikelen  nieuwere artikelen >>