In the early days of the Usenet distributed bulletin board system, some of us used to include randomĀ collections of suspicious-sounding keywords in everything we posted (usually in the signature block). We did this because we were paranoid enough to assume government agencies were watching everyone’s posts, and we thought it would be funny to sneak tons of spurious messages through their keyword filters.
Eventually, I gave up. Not because I thought they weren’t watching — an FBI agent had already told me they were — but because it seemed kind of pointless in the modern internet. Government agencies were less likely to spy on private email messages or social networking clusters.
But I could be very wrong about that, as revealed in a jaw-dropping Washinton Post story by Ā Barton Gellman, Laura Poitras, Julie Tate, and Robert OāHarrow Jr. It turns out the government is spying on our internet traffic rather a lot.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind.
My condolences to the NSA. For an intelligence agency, it really sucks to have your sources and methods exposed, let alone splashed all over the news.
How did this program come about?
Between 2004 and 2007, Bush administration lawyers persuaded federal FISA judges to issue surveillance orders in a fundamentally new form. Until then the government had to show probable cause that a particular ātargetā and āfacilityā were both connected to terrorism or espionage.
In four new orders, which remain classified, the court defined massive data sets as āfacilitiesā and agreed to occasionally certify that the government had reasonable procedures in place to minimize collection of āU.S. personsā data without a warrant.
Is the program vulnerable in any ways?
Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISMās most sensitive secret, fearing that they would withdraw from the program if exposed. ā98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we donāt harm these sources,ā the briefingās author wrote in his speakerās notes.
Oh, well then I guess this exposure really sucks.
Analysts who use the system from a Web portal at Fort Meade key in āselectors,ā or search terms, that are designed to produce at least 51 percent confidence in a targetās āforeignness.ā That is not a very stringent test.
I’ll say.
Training materials obtained by The Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report but add that āitās nothing to worry about.ā
Well, not for the analysts. But the rest of us should probably be worried.
Say, what happens to all that non-foreign data? You know, the stuff of ours that the NSA is not supposed to have?
Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.), who had classified knowledge of the program as members of the Senate Intelligence Committee, were unable to speak of it when they warned in a Dec. 27, 2012, floor debate that the FISA Amendments Act had what both of them called a āback-door search loopholeā for the content of innocent Americans who were swept up in a search for someone else.
āAs it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans.ā
What sort of data can they get?
There has been ācontinued exponential growth in tasking to Facebook and Skype,ā according to the PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebookās āextensive search and surveillance capabilities against the variety of online social networking services.ā
According to a separate āUserās Guide for PRISM Skype Collection,ā that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of āaudio, video, chat, and file transfersā when Skype users connect by computer alone. Googleās offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.
I hope everyone is as outraged as I am.
In conclusion, I would just like to say uranium, FBI, phosgene, isopropyl alcohol, vengeance, knives, Khalid Sheikh Mohammad, ethanol, soman, sovereign citizen, World Trade Center, terrorism, killing, sarin, guns, militia, death, JulianĀ Assange, pseudoephedrine, Semtex, trinitrotoluene, Don’t Tread On Me, VX, Timothy McVeigh, Golden Gate Bridge, ANFO, Turner Diaries, tabun, marijuana, anthrax, Area 51, cobalt, RDX, plutonium, TreasuryĀ Department, NSA, P2P, arsenic, botulinus toxin, chlorine, ricin, Ramzi Yousef, Pentagon, PosseĀ Comitatus, heroin, bombs, stinger, IED, C-4, Willis Tower, diisopropylaminoethanol, Empire StateĀ Building, Homeland Security, crack, phosphorus trichloride, Jihad, methylphosphonyl difluoride, Bradley Manning, Al-Qaeda, isopropylamine, claymore, CIA, cyanide, smallpox.
Leave a Reply