• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • New Snowden docs show NSA, GCHQ spied on WikiLeaks, Pirate Bay users; GCHQ conducts broad surveillance of social media and watched WikiLeaks users.

    Squeaky Dolphin, GCHQ’s broad social media monitoring tool, is part of the agency’s campaign to “understand and shape the Human Terrain”—that is, regional public sentiment.

     

    Documents obtained by former NSA contractor Edward Snowden and published on The Intercept show that NSA analysts monitored content on The Pirate Bay and used the agency’s surveillance systems to track where it came from. The documents also show that the NSA’s British partners at the GCHQ used XKeyscore data as part of a surveillance program on sites that included WikiLeaks. That was part of a broader psychological profiling and targeting program to collect intelligence, influence individuals online, and disrupt groups like Anonymous that were considered threats.

    The new documents show that the GCHQ conducted “broad real-time monitoring of social media activities, processing data on activities like watching YouTube videos and Facebook Likes to profile, categorize, and target individuals for psychological operations.” The NSA documents in the latest disclosure refer to monitoring for content that could be considered “malicious foreign activity.” But it’s clear that the NSA also used its XKeyscore surveillance to dig through traffic to the torrent-sharing site, and it could very well have profiled foreign users of sites like WikiLeaks and monitored their access to that and other websites.

    However, the documents—one an internal NSA “frequently asked questions” Wiki page and the other a set of GCHQ slides on psychological operations—do not provide a picture of how much information about people accessing WikiLeaks was shared between the GCHQ and the NSA. And while the documents point to NSA monitoring of Pirate Bay, there’s no suggestion of how the information gathered was used or if it was used at all.

    A third, unpublished document shows that the Obama administration apparently encouraged foreign governments in 2010 (including the UK) to pursue charges against WikiLeaks for the publication of diplomatic “wires” provided by Chelsea Manning, formerly known as Bradley Manning.
    “Squeaky Dolphin,” “Airwolf,” and “AnticrisisGirl”

    The GCHQ slide deck, published in 2012, highlights two tools used to conduct social networking, Web monitoring, and profiling. The first, called “Squeaky Dolphin,” pulls online activities within Web traffic caught by the agency’s monitoring systems. The monitoring systems are called “Airwolf” in the slides, which may be a UK codeword for the GCHQ’s equivalent of XKeyscore. That data includes webmail, blogs visited, YouTube views, Facebook “likes” clicked on websites themselves, and other data culled from individual users’ captured activity.

    It runs those activities, captured in real-time, through IBM’s InfoSphere Streams processing software to create analytical feeds. Those feeds are then piped into a Splunk database and surfaced through a “dashboard” view that allows analysts to find trends in sentiment. As an example, the slides showed activity related to cricket matches in London and the surge in Facebook likes for Conservative member of Parliament Liam Fox. It can also be used to spot trends in traffic that might indicate upcoming events such as protests or other civil unrest.

    While Squeaky Dolphin tends to look at things with a wider view, “AnticrisisGirl” is a bit more targeted. It can be used to passively monitor specific websites—including traffic to WikiLeaks, as the slides demonstrate. The tool can be tuned to a specific set of Internet user signatures or keywords, and it provides analytics of their behavior in real time, capturing search terms or direct Web addresses used to get to the sites in question.
    “Nothing to worry about”

    The final document in the latest disclosure, from an NSA internal Wiki, is entitled “Discovery SIGINT Targeting Scenarios and Compliance.” Created in 2011, it provides guidance on what is and isn’t allowed in performing XKeyscore queries and using other analytics tools to capture and analyze data. The document explains when it’s allowed to query against US “selectors”—people or systems running within the United States.

    One of the entries is entitled “Unknowingly targeting a US person”:

    I screwed up…the selector had a strong indication of being foreign, but it turned out to be US…now what?

    NOC/OGC RESPONSE: With all querying, if you discover it actually is US, then it must be submitted and go in the [Office of General Counsel] quarterly report…’but it’s nothing to worry about.’ (Source #001)

    Several of the entries on the Wiki page relate to monitoring of PirateBay. One question posted asked whether it was OK to back-trace connections to thepiratebay.org “even if it hops through US based proxies.” The NSA’s Office of General Counsel responded that it was allowed only by use of metadata “chaining” in compliance with the Department of Defense’s Supplemental Procedures Governing Communications Metadata Analysis” (SPCMA). That order requires that analysts “enter a foreign intelligence (FI) justification for making a query or starting a chain”—in other words, analysts can’t just start a query of a post on The Pirate Bay without documenting their cause.

    Another question posted about The Pirate Bay asked if a password for an account associated with a US person was enough to rule out tracking the source. “If a list of .mil passwords were released to thepiratebay.org…can we go back into [XKeyscore data] (using a custom created fingerprint) to search for traffic containing that password in foreign traffic just before the release?” The official response was that while a password alone would not normally be considered to a “US person,” searching for the password data for military accounts would be allowed due to the NSA’s support role for the Defense Department. Such actions would be “consistent with the SIGINT Consensual Collection package signed by [the commander of] USCYBERCOM and [director of the NSA], appropriate to both of his hats”—referring to Gen. Keith Alexander’s dual role as head of both DOD’s cyber operations and the NSA.

    Ironically, the NSA’s privacy regulations do keep it from collecting one type of data—private information published by hackers. In a response to a question on whether it was legal to store data exposed by Anonymous or other groups for forensic purposes, the NSA general counsel said it was only legal to retain “.mil information.” It wasn’t clear whether it was legal to retain data from other government agencies.

    by Sean Gallagher – Feb 18 2014, 8:35pm +0100

     Find this story at 18 February 2014

    © 2014 Condé Nast.

    NSA, GCHQ targeted WikiLeaks network; U.K. and U.S. governments used surveillance and political pressure against publishers of government abuses

    The latest report from the Intercept based on Edward Snowden’s NSA leaks reveals how the NSA and its British counterpart GCHQ targeted WikiLeaks and its supporters. The report details how the U.S. and U.K. governments deployed surveillance tools against WikiLeaks networks and supporters, while pressuring international governments to persecute the organization’s founder, Julian Assange, over the publication of the Afghanistan war logs. The documents also show that the NSA considered ways to spy on Anonymous affiliates and hackers as well as users of file-sharing site Pirate Bay.

    The documents are some of the most significant to come to light yet in highlighting the government’s engagement in what Snowden’s attorney Jesselyn Raddack has long called a “war on information.” Publishers and activists have been specifically targeted for making public otherwise secrecy-shrouded instances of abuses of power by the government and the military. “This is a very troubling report,” said Jameel Jaffer, American Civil Liberties Union deputy legal director. “Publishers who disclose abuses of government power should not be subjected to invasive surveillance for having done so, and individuals should not be swept up into surveillance dragnets simply because they’ve visited websites that report on those abuses.”

    The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

    One classified

    Tuesday, Feb 18, 2014 07:31 PM +0100
    Natasha Lennard

    Find this story at 18 February 2013

    © 2014 The Associated Press

    NSA, British spy agency targeted Assange & the WikiLeaks’ ‘human network’

    American and British spy agencies conducted a campaign against the WikiLeaks website and its surrounding “human network,” according to a new report.

    The article, appearing Tuesday in the online publication The Intercept, is based on new information found in documents previously released by Edward Snowden. He is the former National Security Agency (NSA) contractor who has made public — through WikiLeaks — a large cache of otherwise secret NSA materials.

    One classified document from the British spy agency Government Communications Headquarters (GCHQ) appears to be presenting a primer on passive monitoring of websites. But the Intercept story adds the factor that GCHQ’s monitoring system, called ANTICRISIS GIRL, secretly monitored visitors to WikiLeaks via a tap into Internet backbone cables, capturing in real time the IP addresses of site visitors.

    Also included is a 2011 document of an internal NSA wiki with a brief discussion about whether the classification “malicious foreign actor” can be applied to WikiLeaks:

    “Can we treat a foreign server who stores or potentially disseminates leaked or stolen data on its server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.”

    The response by an unnamed NSA employee says, “Let me get back to you.” The term “no defeats” is considered to mean “with no protections.” The inclusion of the Pirate Bay site, which has been cited for copyright violations, either indicates that classified material was thought to be part of its inventory, or the national security agency was expanding its scope to include copyright.

    There is no indication that WikiLeaks or Pirate Bay was actually classified as a “malicious foreign actor” by the NSA. But a 2008 U.S. Army report did identify WikiLeaks as an enemy.

    The “human network” also included, of course, WikiLeaks’ founder and editor-in-chief, Julian Assange. An August, 2010 unclassified document also unearthed by The Intercept indicates that the U.S. urged other countries fighting in Afghanistan to file criminal charges against Assange for the publication of more than 70,000 classified documents relating to the war, which had been provided by Army Private First Class Bradley Manning.

    The document said that this “appeal exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange and the human network that supports WikiLeaks.”

    Last year, James Goodale, then the chief counsel of The New York Times, told the Columbia Journalism Review that “the biggest challenge to the press today is the threatened persecution of WikiLeaks, and it’s absolutely frightening.” The Times worked with WikiLeaks in publishing the content of some of the secret documents.

    February 18, 2014 1:00 PM
    Barry Levine

     Find this story at 18 February 2014

    © Copyright 2014 VentureBeat

    Visited WikiLeaks? NSA and GCHQ know about it

    Julian Assange in 2011 after losing appeals against extradition to Swedenacidpolly/Flickr/CC BY-NC-SA 2.0

    Efforts undertaken by the NSA and GCHQ to target groups including WikiLeaks, Anonymous and Pirate Bay using internet surveillance and prosecution have been detailed in an article published by The Intercept.

    The latest documents leaked by NSA contractor Edward Snowden reveal that the NSA went to great lengths to target individuals associated with WikiLeaks, including founder Julian Assange and “the human network that supports it”.

    One particular document revealed that GCHQ tapped into fibre-optic cables to monitor visitors to the site in real time by tracking their IP addresses. It also tracked the search terms that visitors were using to reach the site, all as part of an operation codenamed ANTICRISIS GIRL. This suggests that internet users from anywhere in the world who visited WikiLeaks regularly could potentially have become a target for the NSA.

    The documents also reveal that the NSA labelled WikiLeaks “a malicious foreign actor”. The US government encouraged foreign regimes to press charges against Assange over WikiLeaks’ publication of Afghanistan war logs.

    “WikiLeaks strongly condemns the reckless and unlawful behaviour of the National Security Agency,” said Julian Assange in a statement published on the WikiLeaks site. He called upon the Obama administration to conduct an investigation into the extent of the NSA’s activity regarding the media, including the WikiLeaks network. He also criticised the media-monitoring activities of GCHQ, saying it shows no respect for the rule of law.

    “No entity, including the NSA, should be permitted to act against journalists with impunity. We have instructed our General Counsel Judge Baltasar Garzón to prepare the appropriate response. The investigations into attempts to interfere with the work of WikiLeaks will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”

    The Intercept — the new publication launched by ex-Guardian journalist Glenn Greenwald, who has headed up the reporting on the Snowden documents — points out that the WikiLeaks surveillance reveals just how far the NSA’s actions stray from its “self-proclaimed focus on terrorism”.

    “The documents call into question the Obama administration’s repeated insistence that US citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a ‘malicious foreign actor,’ such as WikiLeaks and Anonymous, would be considered fair game for surveillance,” the site points out.

    The targeting of WikiLeaks, Anonymous and Pirate Bay follows earlier revelations that GCHQ used DDoS attacks to target hacker collectives Anonymous and LulzSec. These latest accusations do not reflect well on GCHQ, which maintains its stance that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight”. It’s hard to see how this would apply to the monitoring of citizens from the UK and abroad who might be doing nothing more than reading the WikiLeaks site.

    Politics / 19 February 14 / by Katie Collins

     

    Find this story at 19 February 2014

    © Condé Nast UK 2014

     

    Environmental Groups “Shocked” by Reports of NSA Spying of U.N. Climate Talks

    In one of the latest revelations based on the leaks of Edward Snowden, the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ “preparations and goals,” saying, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” We speak to Erich Pica, president of Friends of the Earth.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman. We’re still joined by Erich Pica of Friends of the Earth USA. Erich, I wanted to ask you about the recent reports that the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ preparations and goals, saying, quote, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” Your response?

    ERICH PICA: Shocking, but not surprised, as we hear more and more about what the National Security Agency has been doing. You know, the 2009 climate talks in Copenhagen was supposed to be this convening of the world leaders to take us into the future of climate negotiations and carbon pollution reductions. And, you know, the United States, throughout those negotiations, had a smug reality to their negotiating stance and was—can be blamed for the collapse of those talks. And kind of hearing through the Snowden documents that NSA was spying on the countries and the negotiators kind of explains many things about why those talks collapsed, because it seems that the United States wasn’t really interested in negotiating just like other countries should be. They were just interested in listening to what was going on.

    AMY GOODMAN: Explain the significance of those talks. I remember very well in Copenhagen when Friends of the Earth was kicked out.

    ERICH PICA: Yeah, no, we were—we were kicked out for protesting within the U.N. confines. And so, those talks, you know, those 2009 talks, were really about how does the world come together to solve this great issue, which is how to reduce our carbon pollution and save the planet and our society from global warming. And, you know, a lot of countries from around the world, and heads of state, more importantly, came to Copenhagen to try to hammer out an agreement that would have taken us into the future over the next 20 years. And unfortunately, the United States led the—you know, several countries, including Canada, who we were just talking about, in basically destroying the goodwill that these talks had created, to the point where we’ve been now in these negotiations over the last four years, which have really gone nowhere.

    AMY GOODMAN: What do you expect from the coming talks? We’ve just come out of Warsaw. Then they’re moving on to Lima, and the binding discussion is supposed to take place in Paris, France, in 2015.

    ERICH PICA: Yeah, in Paris. Yeah, well, it’s not a good sign when you’re trying to build trust with other negotiators, other countries, and it comes out that, you know, the United States was spying on those negotiations. There’s already been a level of mistrust and distrust between the United States and countries around the world, particularly those developing countries. And so, you know, where we’re going in Paris, who knows? The United States has not been forthcoming with their negotiating stances. They have not been—we have not been aggressive in reducing our climate change emissions and putting out an offer that the rest of the world can accept. And we haven’t been terribly generous with funding to help these less-developed, these poorer countries in adjusting to both adapting and mitigating the climate impacts that are already happening to them.

    AMY GOODMAN: Erich Pica—

    ERICH PICA: And so the United States has very little trust in these talks.

    AMY GOODMAN: I want to thank you for being with us, president of Friends of the Earth USA, as we turn right now to Michigan.

    ERICH PICA: Thank you.

    AMY GOODMAN: Thank you.

    Monday, February 3, 2014

    Find this story at 3 February 2014

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    New from Snowden: The NSA was spying on U.N. climate talks Leaked documents reveal that the U.S. government monitored communications to gain an advantage in negotiations

    The National Security Agency was spying on foreign governments’ communications before and during the 2009 United Nations conference on climate change in Copenhagen, Denmark, a new document released by whistle-blower Edward Snowden reveals.

    The Huffington Post, partnering with Danish newspaper Information, has the exclusive:

    The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners [the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship] will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”

    “[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document reads. The NSA’s plan, Information adds, was to get the scoop on those private discussions in order to brief U.S. officials and give them an advantage in negotiations of CO2 reductions, which had the potential to harm U.S. (and other nations’) economic interests:

    The general theme of the document is a set of risk assessments on various effects of climate change that the entire intelligence community was working on. However, the document suggests that the NSA’s actual focus in relation to climate change was spying on other countries to collect intelligence that would support American interests, rather than preventing future climate catastrophes. It describes the U.S. as being under pressure because of its role as the historically largest carbon emitter. A pressure to which the NSA spies were already responding:

    “SIGINT (Signals Intelligence, ed.) has already alerted policymakers to anticipate specific foreign pressure on the United States and has provided insights into planned actions on this issue by key nations and leaders.”
    advertisement

    A National Security Council spokeswoman declined to comment directly on the document, but said in an email that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.”

    The ultimate outcome of the Copenhagen talks is mostly seen as a disappointment: an agreement to keep warming below 2 degrees C, but one that was non-binding and that allowed each nation to develop its own plans for doing so. While a number of factors undoubtedly contributed to this, these new revelations signal a bad turn for future efforts to reach an international accord on fighting climate change. As HuffPo puts it, in a bit of an understatement, “The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.”

    Lindsay Abrams is an assistant editor at Salon, focusing on all things sustainable. Follow her on Twitter @readingirl, email labrams@salon.com

    Thursday, Jan 30, 2014 03:38 PM +0100

    Find this story at 30 January 2014

    Copyright © 2014 Salon Media Group, Inc.

    Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit

     

    WASHINGTON — The National Security Agency monitored the communications of other governments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden.

    The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”

    “Second Party partners” refers to the intelligence agencies of the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship. “While the outcome of the Copenhagen Climate Change Conference remains uncertain, signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the 2-week event,” the document says.

    The Huffington Post published the documents Wednesday night in coordination with the Danish daily newspaper Information, which worked with American journalist Laura Poitras.

    The December 2009 meeting in Copenhagen was the 15th Conference of the Parties to the United Nations Framework Convention on Climate Change, which brings together 195 countries to negotiate measures to address rising greenhouse gas emissions and their impact. The Copenhagen summit was the first big climate meeting after the election of President Barack Obama, and was widely expected to yield a significant breakthrough. Other major developed nations were already part of the 1997 Kyoto Protocol, which set emissions limits, while the United States — the world’s biggest emitter of greenhouse gases when the protocol went into effect in 2004 — had famously declined to join. The two-week meeting was supposed to produce a successor agreement that would include the U.S., as well as China, India and other countries with rapidly increasing emissions.

    The document indicates that the NSA planned to gather information as the leaders and negotiating teams of other countries held private discussions throughout the Copenhagen meeting. “[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document states. The information likely would be used to brief U.S. officials, such as Secretary of State Hillary Clinton and Obama, among others, according to the document.

    The document does not detail how the agency planned to continue gathering information during the summit, other than noting that it would be capturing signals intelligence such as calls and emails. Previous disclosures have indicated that the NSA has the ability to monitor the mobile phones of heads of state. Other documents that Snowden has released indicate that the U.K.’s intelligence service tapped into delegates’ email and telephone communications at the 2009 G-20 meetings in London. Other previous Snowden disclosures documented the surveillance of the G-8 and G-20 summits in Canada in 2010, and the U.N. climate change conference in Bali in 2007.

    The document also refers to some intelligence gathered ahead of the meeting, including a report that “detailed China’s efforts to coordinate its position with India and ensure that the two leaders of the developing world are working towards the same outcome.” It refers to another report that “provided advance details of the Danish proposal and their efforts to launch a ‘rescue plan’ to save COP-15.”

    The Danish proposal was a draft agreement that the country’s negotiators had drawn up in the months ahead of the summit in consultation with a small number key of countries. The text was leaked to The Guardian early in the conference, causing some disarray as countries that were not consulted balked that it promoted the interests of developed nations and undermined principles laid out in previous climate negotiations. As Information reports, Danish officials wanted to keep U.S. negotiators from seeing the text in the weeks ahead of the conference, worried that it may dim their ambitions in the negotiations for proposed cuts to greenhouse gas emissions.

    The Danes did share the text with the U.S. and other key nations ahead of the meeting. But the NSA document noting this as “advance details” indicates that the U.S. may have already intercepted it. The paragraph referring to the Danish text is marked “SI” in the Snowden document — which most likely means “signals intelligence,” indicating that it came from electronic information intercepted by the NSA, rather than being provided to the U.S. negotiators.

    That could be why U.S. negotiators took the positions they did going into the conference, a Danish official told Information. “They simply sat back, just as we had feared they would if they knew about our document,” the official said. “They made no constructive statements. Obviously, if they had known about our plans since the fall of 2009, it was in their interest to simply wait for our draft proposal to be brought to the table at the summit.”

    Members of the Danish delegation indicated in interviews with Information that they thought the American and Chinese negotiators seemed “peculiarly well-informed” about discussions that had taken place behind closed doors. “Particularly the Americans,” said one official. “I was often completely taken aback by what they knew.”

    Despite high hopes for an agreement at Copenhagen, the negotiations started slowly and there were few signs of progress. Obama and heads of state from more than 100 nations arrived late in the second week in hopes of achieving a breakthrough, but the final day wore on without an outcome. There were few promising signals until late Friday night, when Obama made a surprise announcement that he — along with leaders from China, India, Brazil and South Africa — had come up with the “Copenhagen Accord.”

    The three-page document set a goal of keeping the average rise in global temperature to less than 2 degrees Celsius, but allowed countries to write their own plans for cutting emissions — leaving out any legally binding targets or even a path to a formal treaty. Obama called the accord “an unprecedented breakthrough” in a press conference, then took off for home on Air Force One. But other countries balked, pointing out that the accord was merely a political agreement, drafted outside the U.N. process and of uncertain influence for future negotiations.

    The climate summits since then have advanced at a glacial pace; a legally binding treaty isn’t currently expected until 2015. And the U.S. Congress, despite assurances made in Copenhagen, never passed new laws cutting planet-warming emissions. (The Environmental Protection Agency is, however, moving forward with regulations on emissions from power plants, but a new law to addressing the issue had been widely considered as preferable.)

    The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.

    “It can’t help in the sense that if people think you’re trying to get an unfair advantage or manipulate the process, they’re not going to have much trust in you,” said Alden Meyer, director of strategy and policy for the Union of Concerned Scientists and a seasoned veteran of the U.N. climate negotiations. Meyer said he worried that the disclosure might cause the parties to “start becoming more cautious, more secretive, and less forthcoming” in the negotiations. “That’s not a good dynamic in a process where you’re trying to encourage collaboration, compromise, and working together, as opposed to trying to get a comparative advantage,” he said.

    Obama has defended the NSA’s work as important in fighting terrorism at home and abroad. But the latest Snowden document indicates that the agency plays a broader role in protecting U.S. interests internationally.

    National Security Council spokeswoman Caitlin Hayden declined to comment directly on the Snowden document in an email to The Huffington Post, but did say that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.” She noted that Obama’s Jan. 17 speech on the NSA “laid out a series of concrete and substantial reforms the Administration will adopt or seek to codify with Congress” regarding surveillance.

    “In particular, he issued a new Presidential Directive that lays out new principles that govern how we conduct signals intelligence collection, and strengthen how we provide executive branch oversight of our signals intelligence activities,” Hayden said. “It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of our companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by the President’s senior national security team.”

    Posted: 01/29/2014 9:17 pm EST Updated: 01/30/2014 12:59 pm EST

    Find this story at 29 January 2014

    Read the document here

    Copyright © 2014 TheHuffingtonPost.com, Inc.

    NSA program stopped no terror attacks, says White House panel member

    A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any terrorist attacks.
    “It was, ‘Huh, hello? What are we doing here?’” said Geoffrey Stone, a University of Chicago law professor, in an interview with NBC News. “The results were very thin.”
    While Stone said the mass collection of telephone call records was a “logical program” from the NSA’s perspective, one question the White House panel was seeking to answer was whether it had actually stopped “any [terror attacks] that might have been really big.”
    “We found none,” said Stone.
    Under the NSA program, first revealed by ex-contractor Edward Snowden, the agency collects in bulk the records of the time and duration of phone calls made by persons inside the United States.
    Stone was one of five members of the White House review panel – and the only one without any intelligence community experience – that this week produced a sweeping report recommending that the NSA’s collection of phone call records be terminated to protect Americans’ privacy rights.
    The panel made that recommendation after concluding that the program was “not essential in preventing attacks.”
    “That was stunning. That was the ballgame,” said one congressional intelligence official, who asked not to be publicly identified. “It flies in the face of everything that they have tossed at us.”
    Despite the panel’s conclusions, Stone strongly rejected the idea they justified Snowden’s actions in leaking the NSA documents about the phone collection. “Suppose someone decides we need gun control and they go out and kill 15 kids and then a state enacts gun control?” Stone said, using an analogy he acknowledged was “somewhat inflammatory.” What Snowden did, Stone said, was put the country “at risk.”
    “My emphatic view,” he said, “is that a person who has access to classified information — the revelation of which could damage national security — should never take it upon himself to reveal that information.”
    Stone added, however, that he would not necessarily reject granting an amnesty to Snowden in exchange for the return of all his documents, as was recently suggested by a top NSA official. “It’s a hostage situation,” said Stone. Deciding whether to negotiate with him to get all his documents back was a “pragmatic judgment. I see no principled reason not to do that.”
    The conclusions of the panel’s reports were at direct odds with public statements by President Barack Obama and U.S. intelligence officials. “Lives have been saved,” Obama told reporters last June, referring to the bulk collection program and another program that intercepts communications overseas. “We know of at least 50 threats that have been averted because of this information.”
    White House Jay Carney is pressed Thursday over whether President Barack Obama believes that the NSA surveillance program saved lives.
    But in one little-noticed footnote in its report, the White House panel said the telephone records collection program – known as Section 215, based on the provision of the U.S. Patriot Act that provided the legal basis for it – had made “only a modest contribution to the nation’s security.” The report said that “there has been no instance in which NSA could say with confidence that the outcome [of a terror investigation] would have been any different” without the program.
    The panel’s findings echoed that of U.S. Judge Richard Leon, who in a ruling this week found the bulk collection program to be unconstitutional. Leon said that government officials were unable to cite “a single instance in which analysis of the NSA’s bulk collection metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving any objective that was time-sensitive in nature.”
    Stone declined to comment on the accuracy of public statements by U.S. intelligence officials about the telephone collection program, but said that when they referred to successes they seemed to be mixing the results of domestic metadata collection with the intelligence derived from the separate, and less controversial, NSA program, known as 702, to intercept communications overseas.
    The comparison between 702 overseas interceptions and 215 bulk metadata collection was “night and day,” said Stone. “With 702, the record is very impressive. It’s no doubt the nation is safer and spared potential attacks because of 702. There was nothing like that for 215. We asked the question and they [the NSA] gave us the data. They were very straight about it.”
    He also said one reason the telephone records program is not effective is because, contrary to the claims of critics, it actually does not collect a record of every American’s phone call. Although the NSA does collect metadata from major telecommunications carriers such as Verizon and AT&T, there are many smaller carriers from which it collects nothing. Asked if the NSA was collecting the records of 75 percent of phone calls, an estimate that has been used in briefings to Congress , Stone said the real number was classified but “not anything close to that” and far lower.
    The heads of top tech companies in the U.S. have ask President Obama to reform government’s surveillance laws and practices. NBC’s Steve Handelsman reports.
    When panel members asked NSA officials why they didn’t expand the program to include smaller carriers, the answer they gave was “money,” Stone said. “They were setting financial priorities,” said Stone, and that was “really revealing” about how useful the bulk collection of telephone calls really was.
    An NSA spokeswoman declined to comment on any aspect of the panel’s report, saying the agency was deferring to the White House. Asked Wednesday about the surveillance panel’s conclusions about telephone record collection, White House press secretary Jay Carney said that “the president does still believe and knows that this program is an important piece of the overall efforts that we engage in to combat threats against the lives of American citizens and threats to our overall national security.”
    By Michael Isikoff
    NBC News National Investigative Correspondent
    Find this story at 20 December 2013
    © 2013 NBCNews.com

    NSA surveillance played little role in foiling terror plots, experts say

    Obama administration says NSA data helped make arrests in two important cases – but critics say that simply isn’t true
    A new NSA data farm is set to open in the fall in Bluffdale, Utah. A former CIA agent said: ‘[Data-mining] played no role in the Headley case.’ Photograph: George Frey/Getty Images
    Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA’s vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks.
    The defence of the controversial data collection operations, highlighted in a series of Guardian disclosures over the past week, has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA’s use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks.
    Rogers told ABC’s This Week that the NSA’s bulk monitoring of phone calls and internet contacts was central to intercepting the plotters. “I can tell you, in the Zazi case in New York, it’s exactly the programme that was used,” he said.
    A similar point was made in anonymous briefings by administration officials to the New York Times and Reuters.
    But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations.
    In the case of Zazi, an Afghan American who planned to attack the New York subway, the breakthrough appears to have come from Operation Pathway, a British investigation into a suspected terrorism cell in the north-west of England in 2009. That investigation discovered that one of the members of the cell had been in contact with an al-Qaida associate in Pakistan via the email address sana_pakhtana@yahoo.com.
    British newspaper reports at the time of Zazi’s arrest said that UK intelligence passed on the email address to the US. The same email address, as Buzzfeed has pointed out, was cited in Zazi’s 2011 trial as a crucial piece of evidence. Zazi, the court heard, wrote to sana_pakhtana@yahoo.com asking in coded language for the precise quantities to use to make up a bomb.
    Eric Jurgenson, an FBI agent involved in investigating Zazi once the link to the Pakistani email address was made, told the court: “My office was in receipt – I was notified, I should say. My office was in receipt of several email messages, email communications. Those email communications, several of them resolved to an individual living in Colorado.”
    Michael Dowling, a Denver-based attorney who acted as Zazi’s defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.
    “The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi’s contacts with a known terrorist in Pakistan,” Dowling said.
    Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as “misleading” and “an illusion”. Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK’s most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.
    The collapse of the operation, and arrests of suspects that hurriedly followed, came five months before Zazi was arrested in September 2009. “That was the operation that led to the initial data links to Zazi – they put the clues in the database which gave them the connections,” Davis said.
    Davis said that the discovery of the sana_pakhtana@yahoo.com email – and in turn the link to Zazi – had been made by traditional investigative work in the UK. He said the clue-driven nature of the inquiry was significant, as it was propelled by detectives operating on the basis of court-issued warrants.
    “You can’t make this grand sweeping [data collection] stuff subject to warrants. What judge would give you a warrant if you say you want to comb through vast quantities of data?”
    Legal documents lodged with a federal court in New York’s eastern district shortly after Zazi’s arrest show that US counter-intelligence officials had been keeping watch over him under targeted surveillance with the warranted approval of the special intelligence court. During the course of the prosecution, the US served notice that it would be offering evidence “obtained and derived from electronic surveillance and physical search conducted pursuant to the Foreign Intelligence Surveillance Act of 1978 (Fisa).”
    Feinstein and Rogers have also pointed to the case of David Headley, who in January was sentenced to 35 years in jail for having made multiple scouting missions to Mumbai ahead of the 2008 terrorist attacks that killed 168 people. Yet the evidence in his case also points towards a British tip-off as the inspiration behind the US interception of him.
    In July 2009, British intelligence began tracking Headley, a Pakistani American from Chicago, who was then plotting to attack Danish newspaper Jyllands-Posten in retaliation for its publication of cartoons of the prophet Mohammed. Information was passed to the FBI and he was thereafter, until his arrest that October, kept under targeted US surveillance.
    An intelligence expert and former CIA operative, who asked to remain anonymous because he had been directly involved in the Headley case, was derisive about the claim that data-mining sweeps by the NSA were key to the investigation. “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all,” he said.
    The intelligence expert said that it was a far more ordinary lead that ensnared Headley. British investigators spotted him when he contacted an informant.
    The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA’s secret programmes were limited in their value as he was captured only after the event.
    Headley was also subject to a plethora of more conventionally obtained intelligence that questions the central role claimed for the NSA’s data sweeps behind his arrest. In a long profile of Headley, the investigative website ProPublica pointed out that he had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
    Headley was also, ProPublica found, the subject of several inquiries by agents of the FBI-led Joint Terrorism Task Force. A year before the Mumbai attacks his then wife, Faiza Outalha, reported on him to the US embassy Islamabad, saying he was on a secret mission in India and was a “drug dealer, terrorist and spy”.
    Ed Pilkington in New York and Nicholas Watt in London
    theguardian.com, Wednesday 12 June 2013 15.51 BST
    Find this story at 12 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Claim on “Attacks Thwarted” by NSA Spreads Despite Lack of Evidence

    During Keith Alexander’s presentation in Las Vegas, two slides read simply “54 ATTACKS THWARTED.” The NSA, President Obama, and members of Congress have all said NSA spying programs have thwarted more than 50 terrorist plots. But there’s no evidence the claim is true.
    UPDATE Dec. 17, 2013: In a new ruling that calls the NSA’s phone metadata surveillance likely unconstitutional, U.S. District Court Judge Richard Leon cited this article in his assessment of the agency’s claims about thwarted terrorist attacks. Read the ruling here.
    Two weeks after Edward Snowden’s first revelations about sweeping government surveillance, President Obama shot back. “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany,” Obama said during a visit to Berlin in June. “So lives have been saved.”
    In the months since, intelligence officials, media outlets, and members of Congress from both parties all repeated versions of the claim that NSA surveillance has stopped more than 50 terrorist attacks. The figure has become a key talking point in the debate around the spying programs.
    Interactive: How the NSA’s Claim on Thwarted Terrorist Plots Has Spread
    “Fifty-four times this and the other program stopped and thwarted terrorist attacks both here and in Europe — saving real lives,” Rep. Mike Rogers, a Michigan Republican who chairs the House Intelligence Committee, said on the House floor in July, referring to programs authorized by a pair of post-9/11 laws. “This isn’t a game. This is real.”
    But there’s no evidence that the oft-cited figure is accurate.
    The NSA itself has been inconsistent on how many plots it has helped prevent and what role the surveillance programs played. The agency has often made hedged statements that avoid any sweeping assertions about attacks thwarted.
    A chart declassified by the agency in July, for example, says that intelligence from the programs on 54 occasions “has contributed to the [U.S. government’s] understanding of terrorism activities and, in many cases, has enabled the disruption of potential terrorist events at home and abroad” — a much different claim than asserting that the programs have been responsible for thwarting 54 attacks.
    NSA officials have mostly repeated versions of this wording.
    When NSA chief Gen. Keith Alexander spoke at a Las Vegas security conference in July, for instance, he referred to “54 different terrorist-related activities,” 42 of which were plots and 12 of which were cases in which individuals provided “material support” to terrorism.
    But the NSA has not always been so careful.
    During Alexander’s speech in Las Vegas, a slide in an accompanying slideshow read simply “54 ATTACKS THWARTED.”
    And in a recent letter to NSA employees, Alexander and John Inglis, the NSA’s deputy director, wrote that the agency has “contributed to keeping the U.S. and its allies safe from 54 terrorist plots.” (The letter was obtained by reporter Kevin Gosztola from a source with ties to the intelligence community. The NSA did not respond when asked to authenticate it.)
    Asked for clarification of the surveillance programs’ record, the NSA declined to comment.
    Earlier this month, Sen. Patrick Leahy, D-Vt., pressed Alexander on the issue at a Senate Judiciary Committee hearing.
    “Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the U.S.?” Leahy said at the hearing. “Would you agree with that, yes or no?”
    “Yes,” Alexander replied, without elaborating.
    It’s impossible to assess the role NSA surveillance played in the 54 cases because, while the agency has provided a full list to Congress, it remains classified.
    Officials have openly discussed only a few of the cases (see below), and the agency has identified only one — involving a San Diego man convicted of sending $8,500 to Somalia to support the militant group Al Shabab — in which NSA surveillance played a dominant role.
    The surveillance programs at issue fall into two categories: The collection of metadata on all American phone calls under the Patriot Act, and the snooping of electronic communications targeted at foreigners under a 2007 surveillance law. Alexander has said that surveillance authorized by the latter law provided “the initial tip” in roughly half of the 54 cases. The NSA has not released examples of such cases.
    After reading the full classified list, Leahy concluded the NSA’s surveillance has some value but still questioned the agency’s figures.
    “We’ve heard over and over again the assertion that 54 terrorist plots were thwarted … That’s plainly wrong, but we still get it in letters to members of Congress, we get it in statements.”
    — Sen. Patrick Leahy, D-Vt.
     

    Singapore, South Korea revealed as Five Eyes spying partners

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 25, 2013
    Philip Dorling
    Find this story at 25 November 2013
    Copyright © 2013 Fairfax Media

    New Snowden leaks reveal US, Australia’s Asian allies

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 24, 2013
    Philip Dorling
    Find this story at 24 November 2013
    Copyright © 2013 Fairfax Media

    How we spied on the Indonesians and how expats are targeted overseas

    THEIR clandestine activities may be directly in the spotlight, but Australian spies have for decades been listening in on our neighbours.
    Modern spooks have two main methods of tapping the mobile phones of people of interest in cities such as Jakarta. The first option is to install a physical bugging device in the actual handset, to forward calls to a third number – but this requires access to the handset.
    For high-security targets, Australian agents use electronic scanners and very powerful computers to monitor phone numbers of interest via microwave towers (small metal towers that look like venetian blinds) located on top of buildings across Jakarta and all modern cities.
    The latter was employed to tap the phones of Indonesian President Susilo Bambang Yudhoyono, his wife and key ministers.
    Getting hold of a handset is a tricky business so the preferred method for the spooks employed by the Australian Signals Directorate (formerly Defence Signals Directorate) is to monitor microwave phone towers located on top of most buildings in Jakarta and indeed any other major city.
    The material, known at this point as “first echelon”, is captured by computers located in secure rooms at the Australian Embassy where information is filtered before it is forwarded by secure means to super computers located at ASD headquarters. They are located inside the maximum security building ‘M’, protected by high voltage electric fences, at Defence’s Russell Office complex in Canberra. Here it is processed and analysed as “second echelon” product.
    In less busy locations, or where the target phone number is known, an off-the-shelf scanner can be programmed to intercept mobile phone calls.
    In cities such as Jakarta enterprising business people now offer a mobile bugging service where for a fee of between $300 and $1000 they will arrange to “borrow” a mobile phone, insert a bugging device and then return it to a relieved owner. Whenever the phone rings or is used to access a network the call is diverted to another handset or recording device.
    Government staff understand that if their phone goes missing and then turns up they should dispose of it and get a new one.
    But for the average citizen, say a teacher at an English speaking school in Jakarta whose phone was bugged by an angry ex-girlfriend, phone tapping is a serious matter. And it is more common than many expatriates might think.
    There is a thriving business in phone tapping for private or industrial or state espionage reasons in cities such as Jakarta, Singapore and Bangkok. Industrial espionage is widespread in cities around the world including Sydney, Melbourne and Canberra.
    Compared to the operations of ASD and its powerful scanners, super computers and army of analysts these operations are small beer.
    Prime Minister Tony Abbott was quick to point out in the wake of the phone tapping scandal that every country spied and he was right.
    However Indonesia has nowhere near the capacity for espionage that Australia and our close “five eyes” allies – the US, UK, Canada and New Zealand – posses.
    After the 2002 Bali bombings the DSD, Australian Federal Police and Telstra went to Indonesia and showed Indonesian intelligence agencies how to tap into the networks of the terrorist group Jemaah Islamiah (JI).
    Unlike Australia much of Indonesia’s electronic surveillance capacity is directed at internal problems such as the insurgencies in Aceh and West Papua.
    According to one of Australia’s leading experts on electronic spying, Professor Des Ball from the Australian National University, there is really no point in conducting such intercept operations unless a country has the whole picture. That is satellite communications, cable communications and radio communications.
    “Microwave mobile phone calls are very hit and miss,” he said.
    Australia owns the big picture thanks to an expensive and extensive network of listening posts in Jakarta, Bangkok and Port Moresby and powerful satellite ground stations at HMAS Harman in Canberra, Shoal Bay near Darwin, Morundah near Wagga in NSW, Cabarlah near Toowoomba in Qld and Geraldton in WA.
    This interception network is monitoring communications from Singapore to the Pacific Islands including Indonesia’s Palapa satellite.
    Professor Ball said there had been huge growth in Australia’s eavesdropping capacity in recent years. For example the number of dishes at Shoal Bay has gone from six to 15 and Geraldton has more than doubled its capacity including six American dishes for the exclusive use of the National Security Agency (NSA) whose lax security allowed Edward Snowden to abscond with top-secret information that is now being leaked.
    Unfortunately Australian taxpayers have no way of knowing how much is spent on these facilities or even how many staff are employed by the top-secret ASD. The numbers used to appear in the Defence annual report, but not anymore.
    Professor Ball said successive governments had allowed the electronic spooks to have a virtual free rein.
    “When briefings about the phone intercepts from SBY and his wife came in the government should have ordered the tapping to stop,” Professor Ball said.
    “It is important to have the capacity but you only use it when there is a conflict. Put it in, test it and keep it up to date, but don’t use it because unless you have to because it will come out.”
    Professor Ball also slammed Mr Abbott for saying that other countries (Indonesia) were doing exactly what Australia did, because they weren’t and they can’t.
    “They are not doing what we are doing and Abbott should have apologised or done what Bob Hawke did with Papua New Guinea in 1983.”
    Prime Minister Hawke went to Port Moresby after it was revealed that Australia spied on politicians there, but before he left he ordered the spooks switch to all monitoring equipment off for 48 hours. He was then able to say that Australia wasn’t doing it although as journalist Laurie Oakes pointed out he had to be “very careful with his tenses”.
    Tapping a friendly foreign leader’s phone is fraught enough. Recording the fact on clear power point slides and handing them to another country is just plain dumb.
    IAN MCPHEDRAN NATIONAL DEFENCE WRITER
    NEWS LIMITED NETWORK
    NOVEMBER 21, 2013 6:34PM
    Find this story at 21 November 2013
    News Ltd 2013 Copyright

    Spying rocks Indonesia-Australia relations

    Indonesia has officially downgraded the relationship, after Australia refused to apologise for espionage.
    A spy scandal involving an Australian attempt to tap the phone of Indonesia’s president has jeopardised crucial people smuggling and counter-terrorism co-operation between the two countries, officials have said.
    President Susilo Bambang Yudhoyono has temporarily suspended co-coordinated military operations with Australia, including those which target people-smuggling, after significant public outcry in Indonesia over the reports.
    “I find it personally hard to comprehend why the tapping was done. We are not in a cold war era,” President Yudhoyono said.
    Find out more with our exclusive interactive feature
    “I know Indonesians are upset and angry over what Australia has done to Indonesia. Our reactions will determine the future of the relationship and friendship between Indonesia and Australia – which actually have been going well.”
    Angry crowds mobbed Australia’s embassy in Jakarta, burning Australian and American flags on Thursday. Indonesia has officially downgraded its relationship with Australia and recalled its ambassador from Canberra.
    ‘Reasonable’ surveillance
    The country’s prime minister, Tony Abbott, has refused to apologise for what he calls “reasonable” surveillance, but promised to respond to the president’s request for an explanation “swiftly and courteously”.
    “I want to express … my deep and sincere regret about the embarrassment to the president and to Indonesia that’s been caused by recent media reporting,” Abbott told parliament.
    “As always, I am absolutely committed to building the closest possible relationship with Indonesia because that is overwhelmingly in the interests of both our countries.”
    I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities
    Tony Abbott, Australian Prime Minister
    The situation erupted after documents leaked by former US National Security Agency contractor Edward Snowden, showed Australia’s Defence Signal’s Directorate recorded personal communications of President Yudhoyono, his wife, Ani Yudhoyono, and senior officials in 2009.
    The surveillance is understood to be part of a longstanding spying arrangement with the UK, USA, Canada and New Zealand, known as the “five eyes” intelligence partners.
    “I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities,” Abbott told Australia’s parliament on Tuesday.
    “Importantly, in Australia’s case, we use all our resources including information to help our friends and allies, not to harm them,” Abbott said.
    The document leaked by Snowden was dated November 2009 and was published jointly by Guardian Australia and the Australian Broadcasting Corporation state television network.
    It details the attempted interception of various targets’ mobile phones and lists their specific phone models with slides marked “top secret” and the Australian Signals Directorate’s slogan: “Reveal their secrets, protect our own.”
    This leak came after previous documents released by Snowden revealed Australian embassies had participated in
    widespread US surveillance across Asia, including in Cambodia, China, Indonesia, Malaysia, Myanmar and Thailand.
    Strained relations
    The combined revelations have strained a bilateral relationship already under pressure over the Abbott government’s hardline asylum seeker policy to “turn back” boats coming to Australia, a controversial and highly emotive issue in the country.
    Professor Greg Fealy is an Indonesian politics specialist at the Australian National University. He told Al Jazeera the situation was becoming increasingly serious.
    “Every new day brings new sanctions from the Indonesian side and so far the Abbott government hasn’t responded well to it,” Fealy said.
    He believes relations between the two countries have not been this strained since the East Timor crisis in 1999, when Australia’s military went into East Timor during its transition from an Indonesian territory to independence.
    “It has the potential to get worse, with the Indonesians withdrawing further cooperation [with Australia] in many fields,” Fealy said.
    “If there is a sufficiently wide range of retaliation then this could possibly be worse than the crisis of 15 years ago.”
    Prime Minister Abbott has been encouraged to reassure President Yudhoyono that no further surveillance is taking place – similar to the conversation between US President Barack Obama and German Chancellor Angela Merkel after
    revelations her phone was also tapped.
    John McCarthy, a former Australian ambassador to Indonesia, said Abbott must contact Yudhoyono to make amends.
    “There is nothing, frankly, to prevent the prime minister saying to the president that it’s not happening and it’s not going to happen in the future. That’s what Obama did with Angela Merkel and I don’t see a problem with that,”
    McCarthy said.
    “It can’t be allowed just to fester. If it festers it will get worse and it will be much harder to deal with, particularly as the politics get hotter in Indonesia.”
    US blame
    Australian officials would also be expressing their frustration with the United States over this situation, according to Michael Wesley, professor of national security at the Australian National University.
    “There are a number of reasons Australian officials can legitimately be very irritated with the Americans. We’re in this mess because of an American security lapse,” Wesley told Al Jazeera.
    “I’m actually gobsmacked at both Snowden and Bradley Manning, at their ability to get highly classified documents and download them. It would be absolutely impossible for people of their level of access to do that in Australia.”
    “There should be real questions asked in the American intelligence community how this could have happened,” Professor Wesley said.
    Former NSA senior executive Thomas Drake said the “five eyes” utilise each other’s services for information on other nations.
    “Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” Drake told ABC.
    Indonesia’s minister for religious affairs, Suryadharma Ali, also cancelled a planned visit to Australia following the response from Yudhoyono.
    Author and Indonesian political expert Professor Damien Kingsbury was due to host Ali at an event in Melbourne, and
    told Al Jazeera the snub was a concerning sign of the deterioration in relations.
    “It is still quite significant that a senior minister felt he couldn’t come to Australia at this time,” Kingsbury said.
    “It’s pretty disastrous, the issue has effectively ended ongoing diplomatic engagement between Australia and Indonesia.”
    “We’ve seen the cancellation and suspension of a number of points of engagement and that has quite distinct implications for Australian government policy in some areas. There is the possibility this matter could continue to escalate if it’s not adequately resolved,” Kingsbury said.
    ‘Uncomfortable’
    The bilateral relationship between the two nations will be “uncomfortable” but it will pass, according to former US assistant secretary of state for East Asia, Kurt Campbell.
    “The relationship will be strong again, but there is a ritual quality that I’m afraid you [Australia] will have to go through, and very little you can say now or do is going to ease the next couple of months,” Campbell told ABC.
    He said the practice of phone-tapping was an acceptable part of international relations.
    “I can tell you that some of the most sensitive spying is done by allies and friends.”
    “Some of the most difficult foreign policy challenges – terrorist attacks – actually emanated in Indonesia. Australia has good cause to understand the delicate dynamics that play out behind the scenes with regard to how Indonesia’s thinking about some of those movements and some of the actors inside its country,” Campbell said.
    Australian opposition leader Bill Shorten said the “vital” relationship between the two countries must be repaired.
    “No-one should underestimate what is at stake in maintaining this critical relationship on the best possible terms.
    “Co-operation between our countries is fundamental to our national interest – working together on people smuggling, terrorism, trade,” Shorten wrote in an opinion piece for The Guardian.
    Prime Minister Abbott is expected to respond to Indonesia’s request for a full written explanation into the phone tapping in the coming days.
    Geraldine Nordfeldt Last updated: 22 Nov 2013 15:00
    Find this story at 22 November 2013

    Indonesia voices anger at Australia alleged spying

    (CNN) — Indonesia summoned the Australian ambassador Monday to voice its anger at allegations that Australia tried to listen into the phone calls of Indonesian President Susilo Bambang Yudhoyono.
    Greg Moriarty. Australia’s ambassador to Indonesia, “took careful note of the issues raised and will report back to the Australian Government,” the Australian embassy in Jakarta said.
    Indonesia’s objections stem from reports in the Australian Broadcasting Corporation (ABC) and Guardian Australia that said Australian intelligence tracked Yudhoyono’s mobile phone for 15 days in August 2009, monitoring the calls he made and received.
    ‘We live in a post-Snowden age’
    Stone: ‘We’ve bugged the whole world’
    Fareed’s Take: Spying on allies
    The intelligence agency also tried to listen in on what was said on at least one occasion. But the call was less than a minute long and could not be successfully tapped, ABC reported.
    The two media outlets cited documents provided by Edward Snowden, the U.S. national security contractor turned leaker.
    “The Australian Government urgently needs to clarify on this news, to avoid further damage,” Indonesian presidential spokesman Teuku Faizasyah tweeted.
    “The damage has been done and now trust must be rebuilt,” he said in another tweet.
    Asked in parliament to comment on the reports, Australian Prime Minister Tony Abbott said, “all governments gather information and all governments know that every other government gathers information.”
    “The Australian Government never comments on specific intelligence matters,” he added. “This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    By the CNN Staff
    November 18, 2013 — Updated 1033 GMT (1833 HKT)
    Find this story at 18 November 2013
    © 2013 Cable News Network. Turner Broadcasting System, Inc.

    << oudere artikelen  nieuwere artikelen >>