<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press ServiceNSA Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/nsa/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/nsa/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Mon, 27 Apr 2026 14:10:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>2014: Solutions to Ten Conflicts</title>
		<link>https://www.ipsnews.net/2014/01/2014-solutions-ten-conflicts/</link>
		<comments>https://www.ipsnews.net/2014/01/2014-solutions-ten-conflicts/#respond</comments>
		<pubDate>Wed, 15 Jan 2014 18:06:30 +0000</pubDate>
		<dc:creator>Johan Galtung</dc:creator>
				<category><![CDATA[Aid]]></category>
		<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Development & Aid]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Humanitarian Emergencies]]></category>
		<category><![CDATA[Peace]]></category>
		<category><![CDATA[Population]]></category>
		<category><![CDATA[Poverty & SDGs]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Ceuta]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Dinka]]></category>
		<category><![CDATA[Ho Chi Minh]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Kurds]]></category>
		<category><![CDATA[Mali]]></category>
		<category><![CDATA[Malvinas/Falkland Islands]]></category>
		<category><![CDATA[Melilla]]></category>
		<category><![CDATA[Millennium Development Goals (MDGs)]]></category>
		<category><![CDATA[Northern Ireland]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Nuer]]></category>
		<category><![CDATA[Palestine]]></category>
		<category><![CDATA[Poverty & MDGs]]></category>
		<category><![CDATA[Sahrawi]]></category>
		<category><![CDATA[South Sudan]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Taft-Katsura]]></category>
		<category><![CDATA[Tuareg]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=130274</guid>
		<description><![CDATA[There are conflicts old and new crying for solution and reconciliation, not violence, with reasonable, realistic ways out. Take the South Sudan conflict between the Nuer and the Dinka. We know the story of the borders drawn by the colonial powers, confirmed in Berlin in 1884. Change a border by splitting a country &#8211; referendum [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Johan Galtung<br />ALFAZ, Spain, Jan 15 2014 (Columnist Service) </p><p>There are conflicts old and new crying for solution and reconciliation, not violence, with reasonable, realistic ways out.</p>
<p><span id="more-130274"></span>Take the <a href="https://www.ipsnews.net/2014/01/complicated-calculus-south-sudan/" target="_blank">South Sudan conflict</a> between the Nuer and the Dinka. We know the story of the borders drawn by the colonial powers, confirmed in Berlin in 1884. Change a border by splitting a country &#8211; referendum or not &#8211; and what do you expect opening Pandora&#8217;s box? More Pandora.</p>
<p>There is a solution: not drawing borders, making them irrelevant. The former Sudan could have become a federation with much autonomy, keeping some apart and others together in confederations-communities, also across borders. Much to learn from Switzerland, EU and ASEAN.</p>
<div id="attachment_126463" style="width: 310px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-126463" class="size-full wp-image-126463 " alt="Johan Galtung, rector of the TRANSCEND Peace University. Credit: IPS" src="https://www.ipsnews.net/Library/2013/08/Galtung-small.jpg" width="300" height="225" srcset="https://www.ipsnews.net/Library/2013/08/Galtung-small.jpg 300w, https://www.ipsnews.net/Library/2013/08/Galtung-small-200x149.jpg 200w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-126463" class="wp-caption-text">Johan Galtung, rector of the TRANSCEND Peace University. Credit: IPS</p></div>
<p>Take the Maghreb-<a href="https://www.ipsnews.net/2013/04/urgent-need-for-political-reform-in-mali-as-french-depart-report/" target="_blank">Mali</a>+ complex: a road to peace runs through Tuareg high autonomy and confederations of the autonomies, in addition to the state system. Proceeds from natural resources &#8211; oil, uranium, gold, metals &#8211; should benefit the owners, not former colonisers. The United Nations’ task is to make the West comply with socioeconomic human rights.</p>
<p>Take what is called the last colony (well, Ulster? Palestine?): <a href="https://www.ipsnews.net/2012/06/conflict-heats-up-in-the-sahara/" target="_blank">Sahrawi</a>, Spain&#8217;s shame for not having decolonised; the United Nations Charter Article 73 formula is not perfect but differential treatment is unacceptable.</p>
<p>Take <a href="https://www.ipsnews.net/2005/10/spain-from-the-berlin-wall-to-ceuta-and-melilla/" target="_blank">Ceuta and Melilla</a>, &#8220;Spanish&#8221; enclaves in Morocco, and Gibraltar, an &#8220;English&#8221; enclave in Spain: use the <a href="https://www.ipsnews.net/2012/02/one-country-two-systems-big-problem/" target="_blank">Hong Kong formula</a> with sovereignty for the owners, flag and garrison, and leave the system as it is.</p>
<p>Geography and history matter; sovereignty for one, system for the other. Not a bad formula for the <a href="https://www.ipsnews.net/2013/03/no-surprise-in-malvinasfalklands-referendum/" target="_blank">Falkland/Malvinas islands</a> or <a href="https://www.ipsnews.net/2011/07/dissident-resurgence-seen-in-northern-ireland/" target="_blank">Northern Ireland</a>, with a reborn Republic of Ireland in a Confederation of British Isles.</p>
<p>Back to Berlin 1884, institutionalising the outrageous sociocide, with genocide and ecocide, perpetrated on Africans on top of centuries of Arab-West slavery. But do not forget the Congress of Berlin six years earlier, in 1878, doing the same to the Balkans, with the infamous Article 25 giving the Dual Monarchy, Austria-Hungary, the right to occupy and administer Bosnia-Herzegovina temporarily.</p>
<p>On Oct. 6, 1908 they did exactly that, Turkey and Russia both being weak. What do you expect when annexing someone&#8217;s land? A resistance movement of course, and ultimately, on Jun. 28, 1914, the sacred date to the Serbs, having been defeated by the Turks 525 years earlier: Two shots rang out in Sarajevo.</p>
<p>One century later &#8220;historians&#8221; (who pay their salaries, states?) see the shots as the cause of World War I, not what caused the shots; like seeing the terrorists, not what causes terrorism.</p>
<p>Then as now the same two stories, nations made prisoners of states, and states-peoples made prisoners of empires. Sarajevo used against terrorism.</p>
<p>U.S. President Woodrow Wilson used self-determination to dismantle the beaten Prussian, Habsburg and Ottoman empires; but not the victors&#8217; empires as a young Vietnamese in Paris experiences, chased away from the U.S. Embassy: Ho Chi Minh, claiming the same for his people.</p>
<p>And the U.S. Versailles delegation rejected that claim by Sudeten Germans against Czechoslovakia; accepted by England, not to &#8220;appease&#8221; Adolf Hitler, but to rectify a wrong.</p>
<p>What a fantastic chance for German-Austrian foreign policy!</p>
<p>Start this 2014 centenary year preparing 150 anniversary conferences, in 2028 and 2034, apologising for 1914, undoing some harm, letting Africans be Africans and Balkans be Balkans of various kinds, stop blaming their victims for being unruly, restless, terrorist and so on. The peaceful century 1815-1914: some peace! Don&#8217;t miss the chance.</p>
<p>But they were not alone. In 1905 the U.S.-Japan, Taft-Katsura (later president and prime minister, respectively) agreed to U.S. rule in the Philippines and Japanese rule in Korea, in the interest of &#8220;peace in East Asia&#8221; &#8211; their peace, meaning rule. A good century later the Obama-Abe (president and prime minister, respectively) uneasy agreement on Japan&#8217;s aggressive policy.</p>
<p>The solution to the Korean Peninsula conflict is a peace treaty and normalisation with North Korea, a Korean nuclear free zone and work on the open border-confederation-federation-unitary state continuum.</p>
<p>If the U.S. fails to go along, why not go ahead, also multilaterally and via United Nations.</p>
<p>But they were not alone: in 1917 Balfour Jewish homeland followed the Sykes-Picot treason with four disastrous colonies. With a major difference, however: the Jews had been there before; some title to some land, but not to an ever-expanding Jewish state (just one word away from &#8220;only Jewish&#8221;).</p>
<p>The road to peace must pass through a pre-1967 <a href="https://www.ipsnews.net/2013/03/obama-visit-settles-it-a-little-for-israel/" target="_blank">Israel</a> with Jewish characteristics, Palestine recognised, a Middle East Community of Israel with border countries, an Organisation for Cooperation and Security in West Asia, with Syria (an upper chamber for the many nations with cultural autonomy &#8211; Ottoman millet), Iraq (maybe confederation, with no U.S. bases), the <a href="https://www.ipsnews.net/topics/kurds/" target="_blank">Kurds</a> (autonomy in the four countries for some land, a confederation of autonomies), <a href="https://www.ipsnews.net/topics/iran/" target="_blank">Iran</a> (an end to Benjamin Netanyahu extremism), a moderate Israel, and International Atomic Energy Agency (IAEA) inspection.</p>
<p>Afghanistan? Full U.S.-NATO withdrawal, an end to foreign bases, coalition government, Swiss-style constitution with much autonomy for villages and nations, and gender parity. But let Afghans be Afghans.</p>
<p>China&#8217;s claims on sea and air space? Too much, but the Chinese had been there before, 500-1500; some title to some sea, some air.</p>
<p>And <a href="https://www.ipsnews.net/2013/08/u-s-china-talk-peace-but-still-frenemies/" target="_blank">U.S.-China</a>: direct cooperation for mutual benefit, make it more equal; the U.S. is cheating itself, building warehouses, not factories.</p>
<p>U.S. spying on the world: the point is not clemency for Edward Snowden but to drop the NSA and punish those, also allies, who violated human rights.</p>
<p>The West tries to claim the moral high ground by changing discourse to something they think they have and others do not: democracy. Running a huge colonial-imperial system against the will of others? Some democracy.<br />
(END/COPYRIGHT IPS)</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/10/war-is-a-crime/" >War is a Crime!</a></li>
<li><a href="http://www.ipsnews.net/2013/11/the-nsa-and-the-end-of-the-u-s-empire/" >The NSA and the End of the U.S. Empire</a></li>
<li><a href="http://www.ipsnews.net/2013/10/there-are-solutions-to-u-s-calamities/" >There are Solutions to U.S. Calamities</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2014/01/2014-solutions-ten-conflicts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N. Will Censure Illegal Spying, But Not U.S.</title>
		<link>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/</link>
		<comments>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/#comments</comments>
		<pubDate>Mon, 28 Oct 2013 23:08:18 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[U.N. General Assembly]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=128438</guid>
		<description><![CDATA[When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping. A draft resolution currently in limited circulation &#8211; a [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="228" src="https://www.ipsnews.net/Library/2013/10/merkel640-300x228.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" srcset="https://www.ipsnews.net/Library/2013/10/merkel640-300x228.jpg 300w, https://www.ipsnews.net/Library/2013/10/merkel640-619x472.jpg 619w, https://www.ipsnews.net/Library/2013/10/merkel640.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The electronic surveillance of German Chancellor Angela Merkel (left, pictured with U.N. Secretary-General Ban Ki-moon) reportedly goes back to 2002, even before she was elected to office. Credit: UN Photo/Mark Garten</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Oct 28 2013 (IPS) </p><p>When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping.<span id="more-128438"></span></p>
<p>A draft resolution currently in limited circulation &#8211; a copy of which was obtained by IPS – criticises “the conduct of extra-territorial surveillance” and the “interception of communications in foreign jurisdictions”.</p>
<p>But it refuses to single out the NSA or the United States, which stands accused of spying on foreign governments, including political leaders in Germany, France, Brazil, Spain and Mexico, among some 30 others.</p>
<p>The draft says that while the gathering and protection of certain sensitive information may be justified on grounds of national security and criminal activity, member states must still ensure full compliance with international human rights.</p>
<p>The resolution will also emphasise “that illegal surveillance of private communications and the indiscriminate interception of personal data of citizens constitutes a highly intrusive act that violates the rights to freedom of expression and privacy, and threatens the foundations of a democratic society.”</p>
<p>Additionally, it will call for the establishment of independent oversight mechanisms capable of ensuring transparency and accountability of state surveillance of communications.</p>
<p>And the resolution will request the U.N. High Commissioner for Human Rights, Navi PIllay, to present an interim report on the issue of human rights and &#8220;indiscriminate surveillance, including on extra-territorial surveillance.&#8221;</p>
<p>This report is to be presented to the 69<sup>th</sup> session of the General Assembly next September, and a final report to its 70th session in 2015.</p>
<p>Chakravarthi Raghavan, a veteran Indian journalist who has been reporting on the U.N. and its activities since the 1960s, both in New York and later in Geneva, told IPS the resolution may help start a process under which the national security interests of every state, international security and right to privacy and human rights of people can be discussed and a balance found in some universal forum.</p>
<p>“Otherwise, the U.N. world order will break down, and no one will benefit or emerge unscathed,” he said.</p>
<p>Much will depend on the follow-up action that the General Assembly resolution calls for, and with what tenacity members pursue it.</p>
<p>“Frankly, I am not at all clear that some of the nations raising the issue now are really serious,&#8221; said Raghavan, editor-emeritus of the Geneva-based South-North Development Monitor SUNS. &#8220;If they were, any one of them in Europe would have granted asylum to Edward Snowden, and not play footsie with U.S. in its attempts to have him jailed in the U.S. on espionage charges.&#8221;</p>
<p>The revelations of U.S. spying have come mostly from documents released by Snowden, a former NSA contractor, who sought political asylum in Russia after he was accused of espionage by the United States.</p>
<p>One Third World diplomat, speaking on condition of anonymity, told IPS the draft could undergo changes by the time it reaches the General Assembly mid-November.</p>
<p>But he held out little hope the final resolution will specifically castigate the United States because of the political clout it wields at the United Nations, and Washington’s notoriety for exerting diplomatic pressure on its allies and aid recipients.</p>
<p>Besides which, he said, everybody plays the spying game, including the French, the Germans, the Chinese and the Russians &#8212; and therefore none of them can afford to take a “holier than thou” attitude.</p>
<p>Still, as the New York Times put it last week, “One thing is clear: the NSA’s Cold War-era argument, that everyone does it, seems unlikely to win the day.”</p>
<p>The co-sponsors of the resolution are Germany and Brazil, whose political leaders have already condemned the United States for electronically breaking into their communications networks. According to published reports Monday, the electronic surveillance of German Chancellor Angela Merkel goes back to 2002, even before she was elected to office.</p>
<p>The German magazine Der Spiegel said over the weekend that NSA spying in Germany originated in the U.S. embassy in Berlin.</p>
<p>There has been a longstanding tradition that the “Five Eyes” do not spy on each other, the five being the United States, Britain, Canada, Australia and New Zealand. But the surveillance of European political leaders has triggered a strong rejoinder from the 28-member European Union (EU).</p>
<p>Raghavan told IPS that even if other countries are not publicly feuding with the U.S. over this &#8212; and perhaps their own security apparatuses are secretly collaborating in this global &#8220;surveillance state&#8221; &#8212; the NSA activities at a minimum raise several systemic issues involving basic violations.</p>
<p>These include violations of the U.N. Charter; &#8220;unauthorised&#8221; and blatantly illegal invasions and/or intrusions into national space; World Trade Organisation (WTO) agreements, in particular the Trade-Related Intellectual Property Rights (TRIPS) Agreement and the General Agreement on Trade in Services (GATS); the International Telecommunication Union Treaty and Conventions; treaties and protocols of the World Intellectual Property Organisation (WIPO); the Universal Human Rights Declaration and conventions; and the Vienna diplomatic conventions and codes of behaviour among civilised nations.</p>
<p>“All these strike at the roots of the very basics of international law and international public law,” he said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/10/u-s-spying-worldwide-may-come-under-u-n-scrutiny/" >U.S. Spying Worldwide May Come Under U.N. Scrutiny</a></li>
<li><a href="http://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/" >Cybercrime Treaty Could Be Used to Go After Cyberespionage</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Groups Force Release of NSA Spying Documents</title>
		<link>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/</link>
		<comments>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/#respond</comments>
		<pubDate>Fri, 13 Sep 2013 13:34:50 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[FISC]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127502</guid>
		<description><![CDATA[After more than two years of fighting to prevent their release, the Department of Justice has released numerous documents related to domestic spying on U.S. citizens by the U.S. National Security Agency (NSA) and the previously-secret court opinions that authorised the NSA’s controversial programmes to go forward. On the evening of Sep. 10, the Justice [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Matthew Charles Cardinale<br />SPOKANE, Washington, Sep 13 2013 (IPS) </p><p>After more than two years of fighting to prevent their release, the Department of Justice has released numerous documents related to domestic spying on U.S. citizens by the U.S. National Security Agency (NSA) and the previously-secret court opinions that authorised the NSA’s controversial programmes to go forward.<span id="more-127502"></span></p>
<p>On the evening of Sep. 10, the Justice Department released the documents to the American Civil Liberties Union and the Electronic Frontier Foundation (EFF), which had sued to force their release. Both organisations also have separate litigation against the NSA challenging its domestic spying programmes altogether.“They fought tooth and nail to keep this information from getting out to the public." -- Trevor Timm of EFF<br /><font size="1"></font></p>
<p>The director of national intelligence, James Clapper, has also <a href="http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/927-draft-document">published the documents on the DNI website</a>.</p>
<p>At issue is a <a href="https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/">telephony metadata programme</a>, through which the NSA collects so-called “metadata” regarding every U.S. phonecall. The programme was revealed earlier this year by whistleblower Edward Snowden, who is currently living in Russia under the status of political asylum.</p>
<p>Some of the most significant documents that are part of the release are rulings by the Foreign Intelligence Surveillance Court (FISC) that authorised the telephony metadata programme to move forward over the last several years.</p>
<p>The document release “reveals a few things&#8221;, Trevor Timm, a policy analyst for EFF, told IPS.</p>
<p>&#8220;First the NSA admitted to the court [FISC] in 2009 it had not a single person in the NSA who was able to adequately understand their surveillance system, which is an extraordinary admission because… the surveillance system exists solely because the court authorised it based on the NSA’s explanations,” he said.</p>
<p>“This shows NSA is in charge of itself. They could get away with anything and not tell the court and there would be no repercussions or way for anybody to find out it,” Timm said.</p>
<p>On Jul. 19, the court ordered the Justice Department to meet with the parties seeking access to the FISC records and other records, to negotiate the voluntary release of as many records as possible.</p>
<p>According to EFF, some records have still not been released, but at least this has narrowed the scope of the records dispute remaining before the courts.</p>
<p>EFF is still waiting on at least one crucial FISC opinion that has yet to be released, specifically regarding the court’s interpretation of the word “relevant&#8221;. The word “relevant” appears in Section 215 of the amended Patriot Act and is the NSA’s justification for collecting all U.S. telephony metadata. The NSA argues every citizens’ metadata is relevant to national security.</p>
<p>“We still think we’re going to get that [document]. That will have the most direct effect on the lawsuit [challenging the programme],&#8221; Timm said.</p>
<p>In responding to the Jul. 19 court order, the Justice Department said it was able to release more records than it had been previously because of an Aug. 9 directive by President Barack Obama to release “as much information about these programmes as possible&#8221;.</p>
<p>However, EFF disputes the notion that the government has released the information voluntarily.</p>
<p>“The presidential directive was not the reason they started releasing information. It’s because the Court ordered them to start releasing information,” Timm said. “Because of the presidential directive, those negotiations turned out better than they normally would have.”</p>
<p>“They fought tooth and nail to keep this information from getting out to the public. They wouldn’t even tell us the number of pages involved. They said if we release even one word of this, it would cause significant and articulable harm to national security,” Timm said.</p>
<p>“Since the Snowden revelations, that’s been… [revealed] as ridiculous. Basically they’re just implementing public laws and explaining the legal standards for which they carry out these laws &#8211; this stuff should’ve been public years ago,” Timm said.</p>
<p>In January 2009, the NSA revealed to the court that it had failed to follow its own procedures to minimise the use of citizens’ constitutionally protected private information. The NSA had violated court orders on numerous occasions in which it queried citizens’ information without any suspicion of a connection to terrorism.</p>
<p>The NSA had a list of approximately 18,000 phone numbers that they had been not just collecting but using, but they only had reasonable suspicion of terrorist links for around 2,000 of them.</p>
<p>A Mar. 3, 2009 order, by FISC Judge Reggie B. Walton, obtained by the organisations, <a href="http://www.dni.gov/files/documents/section/pub_March%202%202009%20Order%20from%20FISC.pdf">describes a federal agency run amok</a>.</p>
<p>“The court at first authorised the collection of bulk metadata in 2006,&#8221; Patrick Toomey, attorney and national security fellow at the American Civil Liberties Union’s National Security Project, told IPS.</p>
<p>&#8220;In 2009 it describes the restrictions, the very rigorous restrictions that the court imposed on the use of this phone record metadata, and it describes the ways the government had defied or failed to comply with those restrictions.</p>
<p>“The most disturbing point probably that came out of these documents was the extent of the government’s failure to comply with the court order,” Toomey said.</p>
<p>The NSA argues there is no expectation of privacy for metadata under the Fourth Amendment because it is owned by the phone companies.</p>
<p>“They’ve clung to a case from 1970s that allowed law enforcement to collect one phone call for one person,” Timm said, referring to <a href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=442&amp;invol=735">Smith v. Maryland</a>, a 1979 case decided by the Supreme Court.</p>
<p>Collecting the telephony metadata of all U.S. residents is “not exactly what the U.S. Supreme Court intended or knew could happen when that decision was made,” Timm said.</p>
<p>The NSA has also argued that it is not violating citizens’ rights by merely collecting and storing citizens’ telephone metadata because it only uses the information when it needs to.</p>
<p>But the American Civil Liberties Union disagrees with that logic. “It doesn’t matter what the government does with the information. For Fourth Amendment and privacy purposes, the government has taken for itself information that discloses personal details, political, religious, even medical,” Toomey said.</p>
<p>“If the government took your diary and promised not to read it, it would still be a search, and not just because of your property interest in the paper,” Toomey said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-s-russian-rift-may-play-out-at-u-n/" >U.S.-Russian Rift May Play Out at U.N.</a></li>
<li><a href="http://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/" >Critics Question Obama’s Vows to Reform Spying Programme</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N.&#8217;s New Phone Network Vulnerable to Surveillance</title>
		<link>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/</link>
		<comments>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/#respond</comments>
		<pubDate>Mon, 26 Aug 2013 22:22:17 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Der Speigel]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126845</guid>
		<description><![CDATA[The U.S. National Security Agency&#8217;s (NSA) surveillance and telephone data collection programme has come under heavy fire for violating privacy laws, even as the U.N.&#8217;s new telephone network appears vulnerable to hackers and eavesdroppers. A five-year, 2.1-billion-dollar refurbishment of the U.N. headquarters building was aimed at modernising the 39-storey infrastructure, making it more energy efficient [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Thalif Deen<br />UNITED NATIONS, Aug 26 2013 (IPS) </p><p>The U.S. National Security Agency&#8217;s (NSA) surveillance and telephone data collection programme has come under heavy fire for violating privacy laws, even as the U.N.&#8217;s new telephone network appears vulnerable to hackers and eavesdroppers. <span id="more-126845"></span>A five-year, 2.1-billion-dollar refurbishment of the U.N. headquarters building was aimed at modernising the 39-storey infrastructure, making it more energy efficient and technologically advanced in order to keep pace with the global digital revolution.</p>
<p>As part of this process, however, the 63-year-old Secretariat has also been equipped with a sophisticated telephone network by Cisco Systems, which apparently has the capacity to collect phone data and track all incoming and outgoing calls made by staffers as well as diplomats, if they access U.N. phones in the delegates&#8217; lounge or elsewhere in the building.</p>
<p>&#8220;If and when the U.N. administration wants to intercept communications, it will now have the capacity to do so in violation of one&#8217;s privacy,&#8221; a U.N. source familiar with the new network told IPS.</p>
<p>But that does not necessarily mean the current administration is already doing so, he added.</p>
<p>Barbara Tavora-Jainchill, president of the United Nations Staff Union, told IPS, &#8220;Yes, we have this new phone system but never heard that it has this capability.&#8221;</p>
<p>&#8220;If it does, I believe the U.N. Administration should immediately act so that the information exchanged through telephone and internet by staff and diplomats is fully protected and kept private,&#8221; Tavora-Jainchill added.</p>
<p>She pointed out that each extension holder in the new phone network has a personalised access code, and outside calls are allowed only after the code is punched in.</p>
<p>Staff members allowed to make long distance calls also have to specify whether the call is for personal or business purposes, with the former being paid for by the staff member. This was true in the old phone system as well, she said, but &#8220;the capability of the new system is news to me.&#8221;</p>
<p>Asked for his comments, U.N. spokesperson Martin Nesirky, told IPS, &#8220;The Secretariat has indeed upgraded its telephony system to a modern &#8216;IP telephony&#8217; system that uses Cisco equipment and technology.&#8221; He said the upgraded system converges the data and voice communications infrastructure, resulting in cost savings and the ability to integrate the phone system into various information technology (IT) systems.</p>
<p>Nesirky insisted the system does not provide any additional &#8220;monitoring&#8221; features that were not already present in the old analog system, and it also does not provide a function to &#8220;monitor internet traffic&#8221;. However, he admitted, &#8220;the Secretariat already collects connection data about incoming and outgoing calls, in order to provide usage-based billing, and perform troubleshooting, diagnostics, statistical analysis and performance tuning.&#8221;</p>
<p>All such monitoring, he pointed out, is performed pursuant to a 2004 memo by then Secretary-General Kofi Annan (ST/SGB/2004/15) titled, &#8220;Use of information and communication technology resources and data&#8221;.</p>
<p>The U.N. source familiar with the workings of the network told IPS the phone logs are a treasure trove, with detailed history of all outgoing and incoming calls. &#8220;It&#8217;s an addition to logs on your entrances and exits&#8230;recorded at the turnstiles inside the building.&#8221; With these phones, he said, finding out about one&#8217;s calling activity is easy. He also said he does not know who has access to such logs and what confidentiality, if any, exists, and that calls could easily be recorded if someone is being investigated. &#8220;It is safe to assume all calls are monitored, and if you don&#8217;t want anybody to know that you are calling someone, it&#8217;s better not to use such phones, and use your cell phone or Skype,&#8221; he added.</p>
<p>The Germany-based Spiegel Online International reported last week that NSA technicians have managed to decrypt the U.N.&#8217;s internal video teleconferencing (VTC) system as part of its surveillance of the world body.</p>
<p>The combination of this new access to the U.N. and the cracked encryption code have led to &#8220;a dramatic improvement in VTC data quality and [the] ability to decrypt the VTC traffic,&#8221; the NSA agents have noted.</p>
<p>In the article, titled &#8220;How America Spies on Europe and the U.N.&#8221;, Spiegel said that within just under three weeks, the number of decrypted communications increased from 12 to 458. Meanwhile there have been published reports that Cisco Systems outside the U.N. have been hacked.</p>
<p>A January online article by Dan Goodin, information technologies editor at Ars Technica, says internet phones sold by Cisco Systems are vulnerable to stealthy hacks that turn them into remote bugging devices that eavesdrop on private calls and nearby conversations.</p>
<p>The networking giant warned of the vulnerability almost two weeks after a security expert demonstrated how people with physical access to the phones could cause them to execute malicious code.</p>
<p>Cisco has reportedly released a stop-gap software patch for the weakness, which affects several models in the CiscoUnified IP Phone 7900 series.</p>
<p>The vulnerability can also be exploited remotely over corporate networks, although Cisco has issued workarounds to make those hacks more difficult.</p>
<p>&#8220;Cisco recognises that while a number of network, device, and configuration based mitigations exist, there is no way to mitigate the physical attack vector on the affected devices,&#8221; the company&#8217;s advisory stated.</p>
<p>&#8220;To this end, Cisco will conduct a phased remediation approach and will be releasing an intermediate Engineering Special software release for affected devices to mitigate known attack vectors for the vulnerability documented in this advisory.&#8221;</p>
<p>The vulnerability is the latest reminder of privacy threat posed by today&#8217;s phones, computers, smartphones and other network-connected devices, according to the article.</p>
<p>Because the devices run on software that is susceptible to hacking, they can often surreptitiously be turned into listening and sometimes spying vehicles that capture business secrets or intimate moments, it added.</p>
<p>Spiegel said the NSA caught Chinese spying on the U.N. in 2011. And NSA agents succeeded in penetrating defences to &#8220;tap into Chinese SIGINT (signals intelligence) collection,&#8221; describing it as &#8220;how spies were spying on spies&#8221;.</p>
<p>Based on this source, the NSA has allegedly gained access to three reports on &#8220;high interest, high profile current events&#8221;. The internal NSA documents correspond to instructions from the State Department authorised by then-U.S. Secretary of State Hillary Clinton in Jul. 2009.</p>
<p>The 29-page report, &#8220;Reporting and Collection Needs: The United Nations&#8221;, called on its diplomats to collect information on key players at the United Nations. According to this document, the diplomats were asked to gather numbers for phones, mobiles, pagers and fax machines.</p>
<p>They were called on to amass phone and email directories, credit card and frequent-flier customer numbers, duty rosters, passwords and even biometric data.</p>
<p>When Spiegel reported on the confidential cable back in 2010, it said the State Department tried to deflect the criticism by saying it was merely helping out other agencies.</p>
<p>&#8220;In reality, though, as the NSA documents now clearly show, they served as the basis for various clandestine operations targeting the United Nations and other countries,&#8221; Spiegel added.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/" >ACLU Reveals FBI Hacking Contractors</a></li>
<li><a href="http://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/" >Eavesdropping on the Whole World</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ACLU Reveals FBI Hacking Contractors</title>
		<link>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/</link>
		<comments>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/#respond</comments>
		<pubDate>Sun, 25 Aug 2013 14:28:08 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126817</guid>
		<description><![CDATA[James Bimen Associates of Virginia and Harris Corporation of Florida have contracts with the U.S. Federal Bureau of Investigation (FBI) to hack into computers and phones of surveillance targets, according to Chris Soghoian, principal technologist at the American Civil Liberties Union&#8217;s Speech, Privacy and Technology Project. &#8220;Bimen and Harris employees actively hack into target computers [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 25 2013 (IPS) </p><p>James Bimen Associates of Virginia and Harris Corporation of Florida have contracts with the U.S. Federal Bureau of Investigation (FBI) to hack into computers and phones of surveillance targets, according to Chris Soghoian, principal technologist at the American Civil Liberties Union&#8217;s Speech, Privacy and Technology Project.<span id="more-126817"></span></p>
<p>&#8220;Bimen and Harris employees actively hack into target computers for the FBI,&#8221; Soghoian told CorpWatch.</p>
<p>James Bimen Associates did not return phone calls asking for comment. Jaime O&#8217;Keefe, a spokesman for Harris, and Jennifer Shearer, an FBI spokeswoman, both declined to comment for this story.</p>
<p>However, the FBI has not denied these capabilities. The agency &#8220;hires people who have hacking skill, and they purchase tools that are capable of doing these things,&#8221; a former official in the FBI&#8217;s cyber division told the Wall Street Journal recently. &#8220;When you do, it&#8217;s because you don&#8217;t have any other choice.&#8221;</p>
<p>Soghoian verified the information from other sources, after uncovering the information from Freedom of Information Act requests filed by the Electronic Freedom Foundation (EFF) and other publicly available information.</p>
<p>&#8220;The government doesn&#8217;t have the resources to directly monitor every American or let alone every foreigner but they want to read the communications of every foreigner and they want to collect information on every American,&#8221; explains Soghoian. &#8220;What do you do when you don&#8217;t have the manpower to collect everyone&#8217;s communications?&#8221;</p>
<p>The answer, he says, is spy software. This is not unprecedented among government agencies. For example, the U.S. Food and Drug Administration (FDA) bought commercial products from a company named SpectorSoft in Florida to track five staff whom they suspected of whistleblowing in 2009.</p>
<p>The software allowed them to capture &#8220;screen images from the government laptops of five scientists as they were being used at work or at home, tracked their keystrokes, intercepted their personal e-mails, copied the documents on their personal thumb drives and even followed their messages line by line as they were being drafted,&#8221; the New York Times reported last year.</p>
<p>Other companies like Gamma International from Germany and Hacking Team from Italy have also been aggressively marketing their products for purchase by local police officers. A number of national governments like Egypt and Mexico have also reportedly bought such systems that allow them to listen to regular phone and Skype conversations and read email.</p>
<p>But what agencies like the FBI are now worried about is that individuals are &#8220;going dark&#8221; by using freely available encryption software to prevent their email and phone conversations to be captured by law enforcement agencies.</p>
<p>In order to combat this, Soghoian says the FBI wanted custom designed products, so they turned to a little known internal team named the &#8220;Remote Operations Unit&#8221; inside the Operational Technology Division, which set up a project called &#8220;Going Dark&#8221;.</p>
<p>Eric Chuang, the head of the Remote Operations Unit in Quantico, Virginia, who has a doctorate in clinical psychology from Indiana University of Pennsylvania, and a law degree from Temple University in Philadelphia, was put in charge of this task.</p>
<p>Bimen Associates, which has its headquarters in McLean, Virginia, near the headquarters of the Central Intelligence Agency, provided custom designed software tools developed exclusively for the FBI to crack encrypted conversations, says Soghoian. Agency staff and contractors access computers of suspects remotely to install this software to allow them to watch everything that the target types or says.</p>
<p>In February 2008, Bimen Associates hired Amanda Hemmila, a former U.S. Air Force computer technician, who was working on an online undergraduate degree in computer science with Grantham University in Missouri, to help test their new software.</p>
<p>Hemmila&#8217;s LinkedIn resume says that she was responsible for &#8220;building, testing, deploying, maintaining and tracking software kits and hardware deployed from the Remote Operations Unit Deployment Operations Center&#8221; as well as training them in &#8220;processing and viewing software and providing End User phone support.&#8221; She also helped write policies, guidance and training material to keep the software secret.</p>
<p>After spending a little over a year at Bimen Associates, Hemmila returned to her studies and graduated in 2012. A few months after she left, Mark Muller, who had an undergraduate degree in information technology from George Mason university, went to work for Bimen Associates in Quantico.</p>
<p>Muller says he wrote up the standard operating procedures for the FBI to use proprietary company software &#8220;we use to gain access to criminal subject machines in the field.&#8221;</p>
<p>He also conducted &#8220;pre-deployment meetings with the FBI agents and management to coordinate details of a case and implement an operational plan to track a subject(s).&#8221; After the agents completed monitoring of a target, Muller says he archived information on &#8220;previous implant(s) installed on subject&#8217;s machine, if any, as a knowledge base for the field agents.&#8221;</p>
<p>Bimen Associates does not appear to be a big or well known intelligence contractor &#8211; the only public contract that the company has been awarded lists zero income &#8211; but it is well connected.</p>
<p>Jerry Menchhoff, president of Bimen Associates, has been with the company since it was founded in 1998, after working for Booz Allen Hamilton, a company famous for two other employees &#8211; James Clapper and Michael McConnell, both of whom have worked as U.S. director of national intelligence, the top spy job in the country.</p>
<p>(Booz also made the news more recently when Edward Snowden, another former employee, blew the whistle on the surveillance activities of the U.S. National Security Agency).</p>
<p>The other company that supplies tracking software to the FBI is Melbourne, Florida-based Harris Corporation, which has been awarded almost seven million dollars in contracts by the agency since 2001, mostly for radio communication equipment. In 1999 Harris designed the software for the agency&#8217;s National Crime Information Centre database that keeps track of criminal histories, fugitives, missing persons, and stolen property.</p>
<p>Harris made it into the news a couple of years ago when the Wall Street Journal revealed that the company was selling a gadget called a &#8220;Stingray&#8221; to the FBI that allows the agency to track cellphone locations of users without their knowledge.</p>
<p>At the time Sherry Sabol, chief of the Science &amp; Technology Office for the FBI&#8217;s Office of General Counsel, refused to provide any background on the subject because she said that information about Stingrays and related technology was &#8220;considered Law Enforcement Sensitive, since its public release could harm law enforcement efforts by compromising future use of the equipment.&#8221;</p>
<p>However, legal depositions by FBI agents, together with contract data dating back to 2002, confirmed the existence of the Stingray.</p>
<p>The big question is whether or not the FBI obtains warrants before using tracking software. In the case of the Stingray, the agency claimed that it was okay to use such devices without obtaining a warrant, on the grounds that it was like tracking down phone numbers, which the U.S. Supreme Court has ruled is permissible.</p>
<p>But privacy advocates say that tracking the &#8220;metadata&#8221; of phone and computer communications and the information on it involves a far greater invasion of privacy, and should require a warrant from a judge. (This discussion is still ongoing in the courts, notably after a U.S. court ruled it was okay for the government to track cell phone location data without a warrant).</p>
<p>Soghoian believes there needs to be a public debate on the use and potential misuse of these tools.</p>
<p>&#8220;There hasn&#8217;t been a (Congressional) debate about the FBI getting into the hacking business,&#8221; Soghoian told attendees at DEFCON, an annual hacker convention that took place earlier this month in Las Vegas. &#8220;People should understand that local cops are going to be hacking into surveillance targets. Particularly for dragnet searches where they want to do a keyword search or a social network analysis, you need everyone&#8217;s communications.&#8221;</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.CorpWatch.org">CorpWatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/" >Eavesdropping on the Whole World</a></li>
<li><a href="http://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/" >Glimmerglass Taps Undersea Cables for Spy Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Eavesdropping on the Whole World</title>
		<link>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/</link>
		<comments>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/#respond</comments>
		<pubDate>Sat, 24 Aug 2013 12:03:08 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Africa]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126807</guid>
		<description><![CDATA[How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic. These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 24 2013 (IPS) </p><p>How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic.<span id="more-126807"></span></p>
<p>These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead to wire the far reaches of its empire. Today a multi-billion dollar shipping industry continues to lay and maintain hundreds of such cables that crisscross the planet &#8211; over half a million miles of such cables are draped along the ocean floor and snaked around coastlines &#8211; to make landfall at special locations to be connected to national telecommunications systems.</p>
<p>The original cables were made of copper but about 25 years ago, they were replaced by fibre-optic cables. The oldest undersea cable was Trans Atlantic-8 (installed in 1988 by AT&amp;T to transmit data from Tuckerton, New Jersey to Bude, Cornwall) which transmitted data at 280 megabits per second.</p>
<p>The latest cables like Yellow/Atlantic Crossing 2 (installed in 2000 and upgraded in 2007 by Level Three Communications from Brookhaven, New York to Bude, Cornwall) is capable of transmitting data at an astonishing 640 gigabits per second, which is roughly equal to 7.5 million simultaneous phone calls.</p>
<p>In order to make sure that data and voice are transmitted quickly and accurately across the world even if cables break or equipment fails, cable companies break the data into separate tiny packets that are dispatched over what they call &#8220;redundant fibre optic paths&#8221; across the ocean before it is captured and re-assembled on the other side, where it also becomes easy to intercept the data unobtrusively.</p>
<p>This is where Glimmerglass, a northern California company that sells optical fibre technology, comes in. In September 2002, the company started to ship a pioneering technology to help transmit data accurately over multiple optical paths.</p>
<p>Their patented &#8220;3D Micro-Electro-Mechanical-System (MEMS) mirror array&#8221; is composed of 210 gold-coated mirrors mounted on microscopic hinges, each measuring just one millimeter in diameter, etched on a single wafer of silicon.</p>
<p>Each mirror can be individually managed by remote operators anywhere in the world to capture or bounce the light signals and even more importantly, communicate with the other mirrors to make sure that the rest of the array stays in place, allowing very accurate data transmission. This technology slashed the cost of optical switching by a factor of 100, and the company claims that the switches are very robust with an expected failure rate of once in 30 years.</p>
<p>For telecommunication companies, Glimmerglass offers three hardware racks to handle optical data &#8211; the entry level &#8220;100&#8221; system which can handle as many as 96&#215;96 fibre ports for traffic as high as 100 gigabits per second all the way up to the &#8220;600&#8221; system which can handle 192&#215;192 fibre ports. It also offers the &#8220;3000&#8221; system which can hold up to 12 racks.</p>
<p>A major advantage of the Glimmerglass technology, according to the company, is that operators can &#8220;monitor and test remote facilities&#8221; at undersea cable landings from a central office and then select any one of multiple optical signals to distribute it to multiple recipients, as well as the ability to redirect any signal.</p>
<p>&#8220;With Glimmerglass Intelligent Optical Systems, any signal travelling over fibre can be redirected in milliseconds, without adversely affecting customer traffic,&#8221; the company writes on its website. &#8220;At a landing site, this connectivity permits optical layer connections between the wet side and dry side to be re-provisioned in milliseconds from the Network Operations Center with a few clicks of a mouse.&#8221;</p>
<p>In another section of the public website the company also promotes a product named Glimmerglass Intelligent Optical System (IOS) that combines the 3D-MEMS switches with another Glimmerglass product called CyberSweep into an integrated product that has the ability to &#8220;monitor and selectively intercept communications&#8221;.</p>
<p>&#8220;Service Providers can use the speed and flexibility of the IOS to select and deliver signals to Law Enforcement Agencies (LEA),&#8221; add company brochures uncovered by Wikileaks. &#8220;The agency gains rapid access, not just to signals, but to individual wavelengths on those signals (and) make perfect photonic copies of optical signals for comprehensive analysis.&#8221;</p>
<p>Could the new Glimmerglass optical switching technology be the means by which the U.S. National Security Agency (NSA) is tapping international phone calls, as revealed by whistleblower Edward Snowden to the Guardian newspaper?</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p>But Glimmerglass has told industry media that it sells this technology to some major government intelligence agencies.</p>
<p>&#8220;We&#8217;ve become a gold standard in the intel and defence community. They&#8217;re managing these optical signals so they can acquire, split, move and obtain the necessary information to protect the country,&#8221; Robert Lundy, the CEO of Glimmerglass for the last nine years, told Fierce Telecom, an industry blog, in an interview about global malware threats.</p>
<p>&#8220;At their undersea landing locations, their major points of presence, on a selective basis they need to acquire and monitor those optical signals rather than wait to get it off somebody&#8217;s, when it hits a PC or cellphone.&#8221;</p>
<p>Keith May, his deputy in charge of business development, has gone even further. &#8220;We believe that our 3D MEMS technology &#8211; as used by governments and various agencies &#8211; is involved in the collection of intelligence from sensors, satellites and undersea fibre systems,&#8221; May told the magazine. &#8220;We are deployed in several countries that are using it for lawful interception.&#8221;</p>
<p><strong>Fulfilling a dream</strong></p>
<p>Analysis of bulk telecommunications data to track as yet unknown targets has long been on the NSA wish list. For decades, the agency stuck to following specific individuals because there was no way to capture and analyse everything.</p>
<p>In 2000, two rival projects were commissioned to try to collect &#8220;all the signals all the time&#8221;. Science Applications International Corporation, based in Tyson&#8217;s Corner, Virginia, was given a contract to design a collection system called TrailBlazer, while the NSA&#8217;s in-house Signals Intelligence Automation Research Center (SARC) worked on a project called ThinThread.</p>
<p>TrailBlazer was eventually jettisoned as unworkable after 1.2 billion dollars had been spent. ThinThread was more successful, according to its proponents, because it was able to selectively process important information and dump the rest. The designers also created controls to anonymise the data collection to avoid violating privacy laws.</p>
<p>ThinThread could &#8220;correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other &#8216;attributes&#8217; that an analyst might find useful in pinpointing &#8216;the bad guys,'&#8221; writes Jane Mayer in the New Yorker magazine, based on her interviews with former NSA staff.</p>
<p>Unfortunately for the SARC team, ThinThread was vetoed by upper management at the NSA in August 2001. But after the Sep. 11, 2001 attacks, the NSA is believed to have returned to the drawing board. Rumor has it that the project was restarted, stripped of any privacy controls.</p>
<p>Some of the scientists who worked on the project recently came forward to say that they had made a mistake.</p>
<p>&#8220;I should apologise to the American people,&#8221; William Binney, a former NSA staffer who was in charge of designing ThinThread, told Mayer. &#8220;It&#8217;s violated everyone&#8217;s rights. It can be used to eavesdrop on the whole world.&#8221;</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.CorpWatch.org">CorpWatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/" >Glimmerglass Taps Undersea Cables for Spy Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Glimmerglass Taps Undersea Cables for Spy Agencies</title>
		<link>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/</link>
		<comments>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/#respond</comments>
		<pubDate>Fri, 23 Aug 2013 14:18:55 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126783</guid>
		<description><![CDATA[Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables. The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;. Could this be the technology that the [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 23 2013 (IPS) </p><p>Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables.<span id="more-126783"></span></p>
<p>The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;.</p>
<p>Could this be the technology that the U.S. National Security Agency (NSA) is using to tap global communications? The company says it counts several intelligence agencies among its customers but refuses to divulge details. One thing is certain &#8211; it is not the only company to offer such capabilities &#8211; so if such data mining is not already taking place, that day is not far off.<div class="simplePullQuote"><b>The GCHQ Advantage</b><br />
<br />
Why go overseas to collect the data? Well, there are legal obstacles in the U.S. to collecting phone calls made by U.S. citizens - such a programme would violate the fourth amendment to the U.S. constitution that protects individuals against invasion of privacy. (Exceptions are granted for communications with foreigners if government agencies suspect terrorism under a 1981 presidential executive order, although they still need approval of the U.S. Attorney General).<br />
<br />
But given that U.S. laws stop at the border, foreign spy agencies like GCHQ can legally pick up and store any and all information from data that travels outside the country, suggest reporters at the Guardian newspaper.<br />
<br />
"We know the NSA is forbidden from spying on American citizens; in the case of (Faizal) Shahzad (the would-be Times Square bomber in New York), this question remains - was GCHQ doing it for them?" ask the Guardian reporters, noting that the GCHQ now has the "opportunity to build such a complete record of someone's life through their texts, conversations, emails and search records" allowing it to make a "unique contribution to the NSA in providing insights into some of their highest priority targets."</div></p>
<p>&#8220;Revolutions in communications technologies are usually followed by revolutions in collection capabilities,&#8221; said Jeffrey Richelson, a senior fellow at the National Security Archives and the author of the definitive guide to the U.S. intelligence agencies.</p>
<p>The recent leaks by whistleblower Edward Snowden to the Guardian newspaper specifically suggest that the NSA is tapping undersea cables, although no details on the specific technology have yet been published. Notably Snowden has revealed evidence that the NSA paid 15.5 million pounds (25 million dollars) in 2009 to &#8220;radically&#8221; upgrade a listening station operated by its U.K. equivalent &#8211; the Government Communications Head Quarters (GCHQ) in Bude, north Cornwall, England, where many of the cables surface.</p>
<p>If GCHQ and the NSA installed Glimmerglass&#8217;s commercial optical fibre switching technology on the undersea cables to tap the torrent of data that crosses the Atlantic, they will be able to pair it up with CyberSweep to make sense of the information, according to advertising claims made in a treasure trove of documents on dozens of surveillance contractors released by Wikileaks.</p>
<p>Privacy experts say that if the NSA is using this Glimmerglass technology, it will prove whistleblower Edward Snowden&#8217;s claim that the government is collecting everyone&#8217;s communications, regardless of their citizenship or innocence.</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment to IPS on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p><strong>CyberSweep</strong></p>
<p>On the Glimmerglass website, the company claims that CyberSweep can process optical signals to &#8220;extract the data source format&#8221; and aggregate the data for &#8220;probes&#8221; to uncover &#8220;actionable information from the flood of data on persons of interest, known and unknown targets, anticipated and known threats.&#8221;</p>
<p>More details on what Glimmerglass claims CyberSweep can do are explained in &#8220;Paradigm Shifts&#8221; &#8211; a confidential 18 page Powerpoint presentation made in 2011 by Jim Donnelly, the Glimmerglass vice president of North American sales. The document was released by Wikileaks as part of the Spy Files series in December of that year.</p>
<p>On page five of the presentation, Glimmerglass notes that CyberSweep is an &#8220;end to end cyber security solution&#8221; that can &#8220;select, extract and monitor&#8221; all &#8220;mobile and fixed line data, voice and video, internet, web 2.0 and social networking&#8221; with &#8220;probes and sniffers.&#8221; On the following page, it notes that its product can be used at &#8220;submarine landing stations&#8221; &#8211; a reference to the locations where the undersea cables are connected to terrestrial systems.<div class="simplePullQuote"><b>Are Companies Helping Invade Privacy?</b><br />
<br />
Civil liberties experts have denounced the practice of wholesale data collection. "By injecting the N.S.A. into virtually every crossborder interaction, the U.S. government will forever alter what has always been an open exchange of ideas," says Jameel Jaffer, the deputy legal director of the American Civil Liberties Union.<br />
<br />
Such collection would also violate numerous legal principles that safeguard individual privacy. In addition to the fourth amendment to the U.S. constitution, human rights experts say that it would violate Article 8 of the European Convention on Human Rights and Article 12 of the Universal Declaration of Human Rights.<br />
<br />
The big questions now are what role did the telecommunication companies play in the data interception and are intelligence contractors like Glimmerglass helping to design the collection and analysis system?<br />
<br />
"Tempora would not have been possible without the complicity of these undersea cable providers," says Eric King, head of research at Privacy International. "What we, and the public, deserve to know is this: To what extent are companies cooperating with disproportionate intelligence gathering, and are they doing anything to protect our right to privacy?"<br />
</div></p>
<p>On page eight, Glimmerglass provides specific examples of what it can gather &#8211; like Gmail, Yahoo! Mail as well as Facebook and Twitter. Over the next four pages it offers screenshots of these capabilities.</p>
<p>One display of what CyberSweep is capable of is a visual grid of Facebook messages of a presumably fictional person named John Smith. His profile is connected to a number of other individuals with arrows indicating how often he connected to each of them. Each individual can be identified with images, user names and IDs. Another pane shows the detailed chat records. Yet another graphic shows Facebook connections between multiple individuals, presumably to identify networks.</p>
<p>A third graphic is a grid of phone calls made by an individual with a pane that allows an operator to select and listen to audio of any specific conversation. Other images show similar demonstrations of monitoring webmail and instant message chats.</p>
<p>Where is this product being used? In a product video on the company website, Glimmerglass states that their optical data management products have been used by the U.S. intelligence agencies for the last five years. The video specifically mentions data transmissions from Predator drones and well as the tapping of undersea fibre optic cables, but it does not go into any details.</p>
<p>&#8220;The challenge of managing information has become the challenge of managing the light,&#8221; says an announcer. &#8220;With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them.&#8221;</p>
<p>The description mirrors the technology described in documents provided by Edward Snowden to the Guardian newspaper.</p>
<p><strong>Collecting all the signals</strong></p>
<p>In a document released by Snowden, Lieutenant General Keith Alexander, the NSA director, was quoted on a June 2008 visit to an intelligence facility in the U.K., saying: &#8220;Why can&#8217;t we collect all the signals all the time? Sounds like a good summer project.&#8221;</p>
<p>According to the leaked documents, a three year trial project was soon set up with a 25-million-dollar grant from the NSA to &#8220;radically enhance the infrastructure&#8221; at the Cyber Development Centre in Bude, Cornwall, as well as potentially at other sites like the GCHQ base in Cheltenham.</p>
<p>Probes were installed on 200 undersea cables and in the fall of 2011, a project code-named Tempora was launched with the help of NSA analysts who came to help at the Bude site. At least seven companies took part in the project &#8211; British Telecom, Global Crossing, Interoute, Level 3, Viatel, Verizon Business and Vodafone Cable &#8211; according to the German paper Suddeutsche Zeitung, all of whom manage major undersea cable systems.</p>
<p>Under Tempora, a three-day buffer of global internet traffic was held at any given time &#8211; totaling some 600 million &#8220;telephone events&#8221; a day or as much as 21 petabytes (million gigabytes) of data. While much of it was deleted through a process called Massive Volume Reduction for reasons of space, the meta-data (such as the details of who called whom, and when, but not the content) was held for as long as 30 days.</p>
<p>Snowden&#8217;s documents suggest that GCHQ now &#8220;produces larger amounts of metadata than NSA&#8221; which was being analysed by 300 U.K. analysts in addition to 250 NSA analysts, as of last May. The U.K. analysts were encouraged to dig deep since they had a less onerous oversight regime compared to the U.S.</p>
<p>&#8220;Over the last five years, GCHQ&#8217;s access to &#8216;light&#8217; (has) increased by 7,000 percent,&#8221; a Tempora official is quoted as saying in another Powerpoint document cited in the Guardian. &#8220;We will have exploited to the full our unique selling points of geography, partnerships, the UK&#8217;s legal regime and our skilled workforce.&#8221;</p>
<p>A recent interview of a &#8220;senior intelligence official&#8221; by the New York Times confirmed that &#8220;the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border&#8221; by making a &#8220;clone of selected communication links.&#8221; The official did not state where the communications were being intercepted.</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.Corpwatch.org">Corpwatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spying Scandal Engulfs Other U.S. Agencies</title>
		<link>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/</link>
		<comments>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/#respond</comments>
		<pubDate>Wed, 21 Aug 2013 20:51:31 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[DEA]]></category>
		<category><![CDATA[Drugs]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[IRS]]></category>
		<category><![CDATA[Law Enforcement Against Prohibition]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Special Operations Division]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126743</guid>
		<description><![CDATA[Earlier this month, Reuters revealed that a special division within the U.S. Drug Enforcement Administration (DEA) has been using intelligence intercepts, wiretaps, informants and a mass database of telephone records to secretly identify targets for drug enforcement actions. In the wake of these revelations, a former prosecutor tells IPS he believes he and his colleagues [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Matthew Charles Cardinale<br />SPOKANE, Washington, Aug 21 2013 (IPS) </p><p>Earlier this month, Reuters revealed that a special division within the U.S. Drug Enforcement Administration (DEA) has been using intelligence intercepts, wiretaps, informants and a mass database of telephone records to secretly identify targets for drug enforcement actions.<span id="more-126743"></span></p>
<p>In the wake of these revelations, a former prosecutor tells IPS he believes he and his colleagues may have been unwitting pawns in the federal government’s effort to deceive defendants and the court system, thereby violating citizens’ constitutional rights.“This is changing the rules of the game so they can conceal the source and use tainted information." -- former prosecutor Patrick Nightingale<br /><font size="1"></font></p>
<p>“None of us had any idea whatsoever there was a secret DEA programme that instructed DEA agents to conceal the source,” Patrick Nightingale, a former prosecutor for Allegheny County, Pennsylvania, and a member of <a href="http://www.leap.cc/">Law Enforcement Against Prohibition</a>, told IPS.</p>
<p>“My oath as an attorney and as a prosecutor was as an officer of the constitution, and not to win at all costs. This [programme] is a win at all costs mentality: whether it’s constitutional or not we’re going to use it and we can conceal it,” he said.</p>
<p>Called the Special Operations Division (SOD), it is comprised of some two dozen federal agencies, including the Federal Bureau of Investigation, Central Intelligence Agency, National Security Agency (NSA), Internal Revenue Service (IRS), and the Department of Homeland Security.</p>
<p>Everything about the SOD is secret, including the size of its budget and the location of its offices.</p>
<p>Reuters has also identified the IRS as a recipient of the information, pointing to a former IRS training manual that referenced the SOD programme.</p>
<p>As a routine practice, the SOD secretly provides the information to local authorities across the U.S., allowing them to start investigations against U.S. citizens under false pretenses, in a practice known as “parallel construction&#8221;.</p>
<p>For example, under parallel construction, local law enforcement will be instructed to find a reason to stop a particular vehicle &#8211; for example, through a routine traffic stop &#8211; and then once the drugs are found, the government will falsely state the drugs were found in the traffic stop.</p>
<p>The IRS training document details how government officials are instructed to conceal &#8211; from prosecutors, defence attorneys, and even the courts &#8211; the methods by which a suspected drug criminal is identified and then targeted for apprehension.</p>
<p>&#8220;Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,&#8221; the 2005 and 2006 IRS training manual says, according to Reuters.</p>
<p>&#8220;SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations,” the document states.</p>
<p>The Electronic Frontier Foundation (EFF), a group that defends free speech and privacy issues, calls it “<a href="https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering">intelligence laundering</a>&#8220;.</p>
<p>Since the revelations on Aug. 5, the Justice Department has said it is reviewing the programme, according to reports. But such a review does not address the constitutional violations that appear to have already occurred.</p>
<p>“Our criminal justice system is based on the presumption of innocence and our constitution demands fair play in criminal proceedings. It demands that prosecutors reveal to the defence both the good and the bad,” Nightingale said.</p>
<p>“If the source of this information is so sensitive that a law enforcement agency is told to keep the information from its own team [including federal and local prosecutors] because it knows members of its team are required to divulge it to the other side [the defence], then it’s a problem,” he said.</p>
<p>Nightingale told IPS he had no awareness of the programme as a prosecutor, even though he worked on many cases where he sought court approval for a Title 3 wiretap based on certain evidence. Now he does not know &#8211; nor does he have any way of knowing &#8211; how many of those cases originated from a secret SOD tip.</p>
<p>“This is changing the rules of the game so they can conceal the source and use tainted information, depriving&#8230; defence attorneys and defendants from being able to have a fair trial as defined by the Constitution,” he said.</p>
<p>Hanni Fakhoury, a staff attorney with EFF, told IPS, “The NSA data is being gathered on purpose, and then directed to a different purpose.” He said the information being gathered by the NSA “should” be something that the FISA Court has been approving, although there is no way to know.</p>
<p>“Those orders have a broad scope. The orders aren’t public, there isn’t insight into what the orders look like, or how the court operates really,” Fakhoury said.</p>
<p>“The big concern is they’re not being forthright about the fact that they’re using the information directed toward a purpose not related to national security, and they’re not telling the court or the defendants the true source of that information.</p>
<p>“It’s yet more proof what is being said publicly [by the NSA] is not all entirely accurate,&#8221; he said. “It’s another reason why we have to very carefully scrutinise the government’s justification for these types of programmes.&#8221;</p>
<p>Fakhouri says the SOD programme is unconstitutional because of the Fifth and Sixth Amendments combined.</p>
<p>Full and fair disclosure is enshrined in the U.S. Constitution as part of the Sixth Amendment, which states, “In all criminal prosecutions, the accused shall enjoy the right&#8230; to be informed of the nature and cause of the accusation.”</p>
<p>The Fifth Amendment provides, “No person shall be&#8230; deprived of life, liberty, or property, without due process of law.”</p>
<p>The revelations also raise the possibility that individuals who have been convicted over the last 20 years on drug charges, or perhaps IRS-related charges, will challenge those convictions in court on the basis that secret evidence may have been used in the investigative process.</p>
<p>“I think we’re going to see a lot of those types of arguments. How successful those will be &#8211; will be a tough sell. I think it will be an interesting thing to watch,” Fakhoury said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/05/obama-issues-landmark-open-government-rules/" >Obama Issues Landmark “Open Government” Rules</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2010/02/us-telecom-lobby-tests-pledge-of-transparency/" >U.S.: Telecom Lobby Tests Pledge of Transparency</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Critics Question Obama’s Vows to Reform Spying Programme</title>
		<link>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/</link>
		<comments>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/#respond</comments>
		<pubDate>Tue, 13 Aug 2013 00:58:06 +0000</pubDate>
		<dc:creator>Jared Metzker</dc:creator>
				<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126447</guid>
		<description><![CDATA[Civil liberties advocates are expressing doubt that promised reforms to a vast and controversial U.S. surveillance programme will allay concerns that the spying infringes on certain rights. On Friday, U.S. President Barack Obama announced that he would oversee reforms to his administration’s surveillance programme. Evidence of this programme, which was initially leaked in May, showed [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jared Metzker<br />WASHINGTON, Aug 13 2013 (IPS) </p><p>Civil liberties advocates are expressing doubt that promised reforms to a vast and controversial U.S. surveillance programme will allay concerns that the spying infringes on certain rights.<span id="more-126447"></span></p>
<p>On Friday, U.S. President Barack Obama announced that he would oversee reforms to his administration’s surveillance programme. Evidence of this programme, which was initially leaked in May, showed that the U.S. National Security Agency (NSA) had gained access to the communication records of millions of U.S. citizens, sparking public outrage.“Intelligence agencies, by their nature, will always want to collect as much information as possible, and today there are very few technological limits left on what they can collect." -- Prof. David C. Unger<br /><font size="1"></font></p>
<p>“It’s good that President Obama has gotten the message that Americans are troubled to learn of the National Security Agency’s overreaching surveillance of their private communications,” David C. Unger, a professor of U.S. foreign policy at the Johns Hopkins University School of Advanced International Studies (SAIS), told IPS.</p>
<p>“But more transparency alone won’t be enough, especially if the president intends to keep his proposed review process within the executive branch itself.”</p>
<p>Rather, Unger says what is needed is a “reinvigorated system of checks and balances, with much more vigorous legislative and judicial oversight than we have today.”</p>
<p>In his remarks, Obama listed four reforms his administration was ready to make. The steps include working with Congress to reform the laws governing surveillance, pursuing measures to increase transparency, and establishing “a high-level group of outside experts” to assess how U.S. intelligence agencies utilise communications technology.</p>
<p>The reforms, he said, are intended to “strike the right balance between protecting our security and preserving our freedoms,” as well as “to give the American people additional confidence that there are additional safeguards against abuse.”</p>
<p>In a sign of sincerity about the reforms, on Monday the president sent a memorandum to the director of national intelligence (DNI), James Clapper, ordering him to establish a Review Group on Intelligence and Communications Technologies.</p>
<p>The Review Group’s primary assignment is to “assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.”</p>
<p>The committee will now have two months to carry out the review, after which it will present its findings to Obama through the DNI.</p>
<p><b>Right to ask questions</b></p>
<p>Speaking with reporters at the White House, Obama reminded U.S. citizens about the threat of terrorism the country continues to face. He also lamented the effects that high-profile leaks made by former intelligence analyst Edward Snowden have had on the country’s discourse about the power of its spy agencies.</p>
<p>“Unfortunately, rather than an orderly and lawful process to debate these issues and come up with appropriate reforms, repeated leaks of classified information have initiated the debate in a very passionate, but not always fully informed, way,” the president said.</p>
<p>Yet that opinion clashes with the widespread views of critics of the surveillance programme, who are encouraged that an impassioned public outcry has reached presidential ears.</p>
<p>“While we’re glad Obama is responding to the public’s concerns, we take [his] promises today with a healthy dose of scepticism,” the Electronic Frontier Foundation, a group which advocates for less government surveillance, said in a statement.</p>
<p>“He may be paying lip service to accountability and transparency, but the devil will be in the details when it comes to whether his proposals will be effective.”</p>
<p>The EFF also remarked that it is “glad” the Obama administration “has been forced to address the matter publicly as a result of the sustained public pressure from concerned voters as well as the ongoing press coverage of this issue.”</p>
<p>In his remarks on the subject, Obama did note that he had been influenced by a meeting held with civil liberties advocates at the beginning of this month. He also said he understood the concerns being expressed by those who oppose the more invasive spying techniques that his administration has reportedly used.</p>
<p>“[G]iven the history of abuse by governments, it’s right to ask questions about surveillance,” the president said, “particularly as technology is reshaping every aspect of our lives.”</p>
<p>Critics of the extensive spying programme agree the advancement of communication technology has played a part in enabling governments to gather vast amounts of information on private citizens.</p>
<p>“Intelligence agencies, by their nature, will always want to collect as much information as possible, and today there are very few technological limits left on what they can collect,” says SAIS’s Unger, author of “The Emergency State: America’s Pursuit of Absolute Security at All Costs.”</p>
<p><b>Maintaining principles</b></p>
<p>In his remarks, President Obama also made noteworthy comments on the importance of openness and adherence to the law, even when engaging in controversial surveillance activity. He suggested this was one way in which the United States distinguishes itself from other powers.</p>
<p>“[W]e show a restraint that many governments around the world don’t even think to do, refuse to show – and that includes, by the way, some of America’s most vocal critics,” the president stated.</p>
<p>U.S. leadership, Obama suggested, depends upon “the example of American democracy and American openness – because what makes us different from other countries is not simply our ability to secure our nation, it’s the way we do it.”</p>
<p>While those leery of extensive spying are aware that U.S. practices are often less abusive than some states that have criticised it, many continue to warn against using that fact as justification for the U.S. abandoning its ethical principles.</p>
<p>“Without a doubt there are worse actors in the world of espionage than the United States, including some of America’s critics,” SAIS’s Unger told IPS.</p>
<p>“[However,] none of that should or does absolve the United States from adhering to the principled standards it has historically set for itself and that are in its own long-term best interests.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-s-russia-rift-could-impact-upcoming-nuke-talks/" >U.S.-Russia Rift Could Impact Upcoming Nuke Talks</a></li>
<li><a href="http://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/" >Flap over Spying Shows Party Isn’t Everything in U.S. Politics</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flap over Spying Shows Party Isn&#8217;t Everything in U.S. Politics</title>
		<link>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/</link>
		<comments>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/#respond</comments>
		<pubDate>Fri, 26 Jul 2013 19:48:53 +0000</pubDate>
		<dc:creator>Jared Metzker</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[American Enterprise Institute]]></category>
		<category><![CDATA[Brookings Institution]]></category>
		<category><![CDATA[Cato Institute]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126057</guid>
		<description><![CDATA[Party allegiances apparently mean little in the U.S. when it comes to the debate over domestic government surveillance. A study released this morning by the Pew Research Center, a major U.S. polling agency, revealed that 57 percent of Democrats approve of government spying, along with 44 percent of Republicans. &#8220;There is a real division within [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jared Metzker<br />WASHINGTON, Jul 26 2013 (IPS) </p><p>Party allegiances apparently mean little in the U.S. when it comes to the debate over domestic government surveillance.<span id="more-126057"></span></p>
<p>A <a href="http://www.people-press.org/files/legacy-pdf/7-26-2013%20NSA%20release.pdf">study</a> released this morning by the Pew Research Center, a major U.S. polling agency, revealed that 57 percent of Democrats approve of government spying, along with 44 percent of Republicans.“There is a rising tide of public concern about the balance that’s being struck between national security and civil liberties." -- William A. Galston of the Brookings Institution<br /><font size="1"></font></p>
<p>&#8220;There is a real division within each party on this issue,&#8221; Norman J. Ornstein, a renowned expert on U.S. politics, told IPS.</p>
<p>This was evident in the U.S. Congress on Wednesday, when a vote to curtail domestic spying by the National Security Agency (NSA) sundered the Democratic and Republican parties alike.</p>
<p>The vote was the first of its kind to take place since the revelations by NSA whistleblower Edward Snowden which, when published by The Guardian newspaper, exposed a degree of domestic surveillance far greater in scale and scope than was previously understood by the public.</p>
<p>The 217-205 decision to reject an amendment blocking spending on NSA domestic spying was so close that one political commentator called it a “nail biter&#8221;. Of the 205 votes in favour, 111 were from Democrats and 94 from Republicans, and of the 217 votes opposed, 83 were from Democrats votes and 134 from Republicans.</p>
<p>&#8220;You&#8217;re not going to see many votes like this,” says Ornstein, who is a scholar at the American Enterprise Institute (AEI), a Washington-based neoconservative think tank.</p>
<p>William A. Galston, a senior fellow at the Brookings Institution, another think tank here, agrees that the outcome was unusual.</p>
<p>“It did not conform to standard party lines but instead saw an unusual coalition of the libertarian right and the liberal left voting against the centres of both parties,” Galston told IPS.</p>
<p>Julian Sanchez of the Cato Institute, a research organisation which advocates individual liberties and limited government, told IPS that there are historical reasons for civil liberties being a major issue for members of both parties.</p>
<p>“The libertarian strain is a natural dimension of Republican ideology which was diminished by the immediate reaction to [the attacks of Sep. 11, 2001], and now it is sort of naturally reasserting itself,” says Sanchez.</p>
<p>“[On the other hand,] progressive activists have frequently been the targets of abusive intelligence powers,” he added, citing historical examples of government crackdowns on unions, civil rights groups and other leftist organisations as lessons that help explain Democratic opposition to spying.</p>
<p><b>Rising Tide</b></p>
<p>Both Ornstein and Galston told IPS that the narrow decision in congress was reflective of public opinion.</p>
<p>“There is a rising tide of public concern about the balance that’s being struck between national security and civil liberties,” says Galston.</p>
<p>U.S. citizens, Ornstein told IPS, are &#8220;strongly divided as a whole&#8221;.</p>
<p>Indeed, the Pew poll indicates more U.S. citizens favour being surveilled by their own government, but only by a slim margin.</p>
<p>Of the 1480 adults surveyed, 50 percent overall said they approved of the domestic surveillance programme, while 44 percent actually said they disapproved.</p>
<p>In a separate question, 56 percent agreed that federal courts have failed to impose adequate limits on intelligence gathering.</p>
<p>Based on the Pew findings, age and gender seem to be factors in where citizens stand on the issue.</p>
<p>By a ratio of about two-to-one, 60 to 29 percent, young respondents said they were more concerned about the government doing too much to weaken civil liberties than they were about it doing too little to defend the nation from terror. In terms of gender, 51 percent of men agreed with this statement, as opposed to only 29 percent of women.</p>
<p>In the report, Pew concludes that the views of U.S. citizens on this issue are “complex&#8221;, a conclusion based in part on the relative lack of correlation with party leanings.</p>
<p><b>Spill Over</b></p>
<p>Ornstein believes that the cross-cutting divide splitting both major parties is &#8220;issue-specific&#8221; and unlikely to spill over into other major controversies, for example on social issues such as spending on health care.</p>
<p>To an extent, Galston agrees.</p>
<p>“The liberal left has strict views on economic questions that are poles apart from the views of the libertarians,” Galston says, “and it would be very hard for them to find common ground.”</p>
<p>Liberal Democrats, Galston explains, would have difficulty accepting the small-government solutions often championed by libertarian Republicans.</p>
<p>He notes, however, that more legislation on government spying will take place in the foreseeable future, and that the closeness of Wednesday’s vote was indicative of a strengthening bipartisan opposition to intrusive government tactics.</p>
<p>Cato’s Sanchez believes this like-mindedness could spill over into over issues, namely those related to civil liberties.</p>
<p>“There are civil libertarian wings of both parties, so I expect we could see cooperation on other things, such as free speech issues,” Sanchez says.</p>
<p>It is widely speculated that the de facto leader of the libertarian wing of the Republican Party, Senator Rand Paul, will make a run for the presidency in 2016. One early <a href="http://dailycaller.com/2013/07/25/rand-paul-top-pick-for-republicans-in-2016/">poll</a> has placed him as the current top contender for the Republican nomination.</p>
<p>Galston told IPS that this issue has opened the way for “conversation” between Paul’s faction of the right and the liberal left.</p>
<p>“Now that they’ve discovered each other, there is likely to be more conversation across party lines,” says Galston.  “This is probably a beginning rather than an end.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/" >Spy Contractor Bug in Ecuador Embassy Fails to Stop Wikileaks</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fight over NSA Spying Spills into U.S. Courts</title>
		<link>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/</link>
		<comments>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/#respond</comments>
		<pubDate>Fri, 19 Jul 2013 19:20:46 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Electronic Privacy Information Center]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125873</guid>
		<description><![CDATA[A wide variety of individuals and organisations have filed lawsuits challenging the National Security Agency (NSA) and other federal agencies and officials for conducting a massive, dragnet spying operation on U.S. citizens that was recently confirmed by whistleblower Edward Snowden. At least three ongoing lawsuits are challenging the NSA’s practice of indiscriminately collecting and storing [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="199" src="https://www.ipsnews.net/Library/2013/07/metadata640-300x199.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/07/metadata640-300x199.jpg 300w, https://www.ipsnews.net/Library/2013/07/metadata640-629x417.jpg 629w, https://www.ipsnews.net/Library/2013/07/metadata640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The U.S. government argues there is no expectation of privacy for so-called metadata collected by the NSA. Credit: Zofeen Ebrahim/IPS</p></font></p><p>By Matthew Charles Cardinale<br />ATLANTA, Georgia, Jul 19 2013 (IPS) </p><p>A wide variety of individuals and organisations have filed lawsuits challenging the National Security Agency (NSA) and other federal agencies and officials for conducting a massive, dragnet spying operation on U.S. citizens that was recently confirmed by whistleblower Edward Snowden.<span id="more-125873"></span></p>
<p>At least three ongoing lawsuits are challenging the NSA’s practice of indiscriminately collecting and storing information related to all phone calls to and from U.S. citizens &#8211; referred to as “telephony metadata” by the government &#8211; as in violation of several protections guaranteed under the constitution."Metadata is extraordinarily important. You could make a pretty clear map of your political views, your religious affiliations." -- Rebecca Jeschke of the Electronic Frontier Foundation<br />
<br /><font size="1"></font></p>
<p>In addition, at least one lawsuit challenges the NSA’s PRISM programme, which collects a variety of multimedia communications of non-U.S. citizens that are handled by U.S.-based companies such as Facebook, Google, MSN and Yahoo.</p>
<p>Snowden, a former contractor for Booz Allen Hamilton, a computer technology consulting firm that works with the NSA, revealed the NSA programmes in interviews with several publications, including the Guardian newspaper in the United Kingdom, which was the first to begin publishing related documents on Jun. 6.</p>
<p>Snowden has been stuck at an airport terminal in Russia for several weeks and is currently seeking asylum there, as he has said he fears he would be wrongfully prosecuted, tortured, or even killed by the U.S. government.</p>
<p>One of the <a href="https://www.eff.org/sites/default/files/filenode/firstunitarianvnsa-final.pdf">latest lawsuits</a> to challenge the telephonic spying programme, First Unitarian Church of Los Angeles, et al., v. National Security Agency, et al., was filed on Tuesday.</p>
<p>The plaintiffs “are organisations with members with First Amendment rights to freedom of association,&#8221; Rebecca Jeschke, a digital rights analyst with the Electronic Frontier Foundation, told IPS. &#8220;CALGUNS [a California-based gun rights advocacy group] is scared people won’t call their hotline.</p>
<p>&#8220;We have the First Unitarian Church as a plaintiff. They are concerned people won’t use the services they have, because they’re afraid they’re going to be associated with other services they have. Metadata is extraordinarily important. You could make a pretty clear map of your political views, your religious affiliations,” Jeschke said.</p>
<p>The government admits the telephonic spying programme collects the phone numbers, time and date, and durations of all U.S. phonecalls.</p>
<p>The plaintiffs argue the programme is a violation of the First Amendment because it has a chilling effect on the rights to free speech, assembly, practice of religion, and to petition the government for a redress of grievances; the Fourth Amendment right to be free from unreasonable searches and seizures; the Fifth Amendment right to due process; and various federal statutes related to electronic surveillance.</p>
<p>The federal government has said it collects and stores the metadata for several years &#8211; in order to preserve it &#8211; but only uses it when it decides there is a national security reason to search the information.</p>
<p>The government also argues there is no expectation of privacy for metadata under the Fourth Amendment because it is owned by the phone companies.</p>
<p>“The Fourth Amendment question is in part going to turn on the scope of search and the reasonableness. Accessing metadata for persons for which some level of suspicion [exists] is one thing, accessing metadata for everybody is a different matter,” Prof. Gerry Weber, an adjunct professor at Emory School of Law specialising in constitutional law, told IPS.</p>
<p>“This is all an evolving technology area, where the Supreme Court has generally been hit or miss. They’re dealing with new electronic technologies as they come,” Weber said.</p>
<p>On Jun. 9, Larry Klayman, the former chairman of Judicial Watch, and two other citizens filed a <a href="http://www.scribd.com/doc/146930457/PRISM-Class">federal class action lawsuit</a> challenging the telephonic surveillance programme.</p>
<p>On Jun. 11, the American Civil Liberties Union (ACLU) <a href="http://www.aclu.org/national-security/aclu-v-clapper-complaint">also sued</a> over the telephonic spying programme.</p>
<p>The ACLU had previously sued the NSA in 2008, challenging the constitutionality of the Foreign Intelligence Surveillance Act (FISA) of 1978 Amendments Act of 2008 &#8211; which the government has used as part of its secret legal justification for its programme &#8211; but their complaint was dismissed by the U.S. Supreme Court in February 2013 on the grounds that the ACLU could not prove it had been monitored by the government.</p>
<p>However, given the recent revelations, and given that the ACLU is a Verizon subscriber, the organisation should now have standing.</p>
<p>Verizon, a phone service provider, was subject to a previously-secret court order dated Apr. 25 by U.S. Foreign Intelligence Surveillance Court Judge Roger Vinson compelling it to turn over customers’ phone records to the NSA.</p>
<p>But advocates are confident that Verizon is not the only participant.</p>
<p>“The director of National Intelligence, James Clapper, acknowledged the Verizon order was part of a large programme from the NSA. It would be surprising if it were only Verizon. That’s [just] the document that’s leaked. We do have intelligence officials saying it was a wide-ranging programme&#8230; ‘broad in scope,’” Jeschke said.</p>
<p>Klayman has also sued over the multi-media eavesdropping programme, PRISM.</p>
<p>In addition, the Electronic Privacy Information Center (EPIC) filed a <a href="http://epic.org/EPIC-FISC-Mandamus-Petition.pdf">Petition for a Writ of Mandamus</a> and Prohibition, or a Writ of Certiorari, with the Supreme Court on Jul. 8. The petition asks the court to vacate the Apr. 25 order by the FISA Court that had compelled Verizon to send telephony metadata to the NSA.</p>
<p>In addition to arguments similar to those made in the other cases, the petition also argues the NSA telephonic spying programme violates attorney-client privilege, and is a violation of separation of powers because the NSA is also collecting phone records of Congress and the judiciary.</p>
<p>Meanwhile, in separate, ongoing class action litigation the EFF has had against the NSA since 2008, Jewel v. NSA, a federal judge last week rejected a motion by the federal government to dismiss the suit. That case alleged ongoing, dragnet surveillance by the NSA on millions of U.S. citizens, even years prior to Snowden&#8217;s revelations.</p>
<p>“We’ve asked this case to be associated with Jewel v. NSA. There were other leaks. The fact that this programme was ongoing was something that many people were aware of before these leaks came out &#8211; it’s just the documents from the FISA Court confirmed it,” Jeschke said.</p>
<p>A whistleblower with AT&amp;T, who had wired a room that he believed was for the government to track U.S. citizens’ phonecalls, came to EFF in 2006.</p>
<p>“He realised he was wiring up Big Brother and came to us,” Jeschke said.</p>
<p>Meanwhile, in a U.S. House Judiciary Committee hearing this week on the NSA spying programmes, members of Congress of both parties told representatives of the NSA and the Federal Bureau of Investigation that they believe the administration has abused the authority granted to it by Congress.</p>
<p>Rep. Jim Sensenbrenner, a powerful Republican from Wisconsin, warned that if the administration did not stop collecting the phone records of U.S. citizens indiscriminately, that a provision, Section 215 of the Patriot Act, known as the business records provision, will expire, and that there will not be enough votes in Congress to renew it.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/" >Brazil Wide Open to Cyber Invasion</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/" >Spy Contractor Bug in Ecuador Embassy Fails to Stop Wikileaks</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Brazil Wide Open to Cyber Invasion</title>
		<link>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/</link>
		<comments>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/#respond</comments>
		<pubDate>Tue, 16 Jul 2013 14:15:44 +0000</pubDate>
		<dc:creator>Fabiana Frayssinet</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Cyber-espionage]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125760</guid>
		<description><![CDATA[Brazil, reportedly one of the main targets of U.S. signals spying, is attempting to untangle a web of hi-tech espionage with low-tech equipment reminiscent of a novel by British author John le Carré. Brazilian foreign affairs expert Marcos Azambuja told IPS he was surprised by the extent of Washington’s spying on Brazil, as revealed by [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="168" src="https://www.ipsnews.net/Library/2013/07/Snowden-small-300x168.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/07/Snowden-small-300x168.jpg 300w, https://www.ipsnews.net/Library/2013/07/Snowden-small.jpg 629w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Edward Snowden, interviewed in Hong Kong. Credit: The Guardian/Glenn Greenwald and Laura Poitras</p></font></p><p>By Fabiana Frayssinet<br />RIO DE JANEIRO, Jul 16 2013 (IPS) </p><p>Brazil, reportedly one of the main targets of U.S. signals spying, is attempting to untangle a web of hi-tech espionage with low-tech equipment reminiscent of a novel by British author John le Carré.</p>
<p><span id="more-125760"></span>Brazilian foreign affairs expert Marcos Azambuja told IPS he was surprised by the extent of Washington’s spying on Brazil, as revealed by the Globo newspaper based on information from former U.S. intelligence contractor and whistle blower Edward Snowden.</p>
<p>“The violations of privacy and spying on phone conversations and email were so vast and invasive that it is hard to find any parallel in the past,” he said.</p>
<p>“In the past, spying had a specific target. It was very low-tech, and action was taken on the basis of suspicions,” said Azambuja, who between 1989 and 2003 served as head of the country’s delegation on disarmament issues and human rights to the United Nations in Geneva, secretary general of foreign relations in the foreign ministry, and ambassador to Argentina and France.</p>
<p>“But now, le Carré’s novels look like they were written in the Middle Ages,” he said. “We are looking at a qualitative and quantitative change in espionage.”</p>
<p>The governments of Brazil and other South American countries reacted angrily to news of the spying.</p>
<p>Brasilia asked for explanations from U.S. ambassador to Brazil Thomas Shannon, and launched an investigation to find out whether local telecoms companies were accomplices.</p>
<p>The government also reported that it would press for better multilateral rules governing telecoms security and would present initiatives in the U.N. with the aim of preventing abuses and the invasion of the privacy of users of social networking sites and protecting national sovereignty.</p>
<p>But Brazil “is still in diapers” in terms of cyber-security, Defence Minister Celso Amorim told Congress.</p>
<p>Less than 44 million dollars were earmarked for cyber-security in the 2013 budget – one quarter of what the United Kingdom spends, for example.</p>
<p>The documents reported on by Globo indicate that over the past decade, the U.S. National Security Agency (NSA) and foreign companies operating in Brazil spied on Brazilian citizens and companies and foreigners travelling or living in the country.</p>
<p>In January, Brazil came second only to the United States in terms of the number of phone conversations and emails intercepted – 2.3 billion – indicating that it was one of the top priorities for espionage, along with China, Russia, Iran and Pakistan.</p>
<p>It was reported that at least until 2002, Brasilia was a base for satellite espionage by the NSA and the CIA (Central Intelligence Agency), a “privilege” shared by just 15 other countries around the world. The base was the only one in South America, although neighbouring countries were also apparently spied on.</p>
<p>“I’m surprised by the importance given to Brazil, which has a marginal role to play in the fight against terrorism,” said Azambuja.</p>
<p>The only concern voiced by Washington in that respect is the tri-border region shared by Brazil, Argentina and Paraguay. According to the U.S. government, there is a supposed presence of Islamist groups in the area – an allegation that has been systematically denied by the three South American countries.</p>
<p>But the United States’ illegal activities would be more serious, the diplomat said, if the espionage was carried out for “even less justifiable reasons.”</p>
<p>Today Brazil is the world’s sixth largest economy, where giant ultra-deep offshore oil fields have been discovered in recent years. It is also developing nuclear technology for peaceful purposes, its fast-growing aviation sector competes in international bidding and tendering processes, and it has other companies operating abroad in areas like oil, mining and construction.</p>
<p>Clóvis Brigagão, a professor at the Cándido Mendes University, told IPS the reason for the espionage could be “Brazil’s independent stance in international politics.”</p>
<p>He added that Washington “may have found another phantom enemy in this country” because of Brazil’s aim to win a permanent seat on the U.N. Security Council, or its stance towards Turkey and Iran.</p>
<p>Raw materials, “which in Brazil involve strategic resources,” and the U.S. “obsession to maintain its hegemony in this area” also play a role, he said.</p>
<p>Celso Pereira, a professor at the Rio de Janeiro Federal University, said the espionage could be explained by “Brazil’s international weight and the stature of its economy.”</p>
<p>“The Brazilian government is not irresponsible, it has normal relations with Iran and with the Arab countries,” while maintaining “close ties with Venezuela, Ecuador and Bolivia,” all of which have “significant conflicts with the United States,” he said.</p>
<p>“It’s not that things are different from the times of the Cold War,” Pereira told IPS. “The novelty here is that we are looking at a new kind of espionage by means of the Internet, which facilitates the invasion of sovereignty and people’s privacy,” and not only by the United States, Pereira told IPS.</p>
<p>Rules without rules</p>
<p>“What are the rules in this new game? I don’t know,” said Azambuja. “In the past, it was rival countries that were spied on, with almost artisanal techniques, but now we are experiencing an unprecedented moment in international relations, marked by the penetration capacity of the global communications system, through supercomputers.”</p>
<p>It is a new international order or “disorder,” the diplomat said, which requires greater technological development at a national level, in first place to determine the scope of the espionage, which in the past was “selective, limited.”</p>
<p>In that sense, Brazil is staking its bets on the launch of a national satellite, undersea fibre optic cables, and an Internet data collection centre.</p>
<p>But there are still risks of cyber invasion.</p>
<p>The U.S. ambassador, who denied that such surveillance was carried out in Brazil and said there was no agreement with Brazilian companies to gather data in this country, reportedly admitted that the U.S. does collect “metadata” &#8211; records of addresses, telephone numbers, the date and time emails are sent – but supposedly without accessing the content of messages.<br />
”Even if we protect data with encryption software, the mere detection of this kind of contact is already information of analytical value to an eventual adversary of the country,” said Minister Amorim.</p>
<p>Brigagão said the region was looking at a new kind of international cyber-espionage crime that must be placed on the world agenda.</p>
<p>Pereira was pessimistic. “In South America, we don’t have the technological conditions that the U.S. has to spy and carry out counterespionage. This is going to keep happening,” he said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/denial-of-airspace-to-bolivian-leader-resonates-at-u-n/" >Denial of Airspace to Bolivian Leader Resonates at U.N.</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/snowden-is-no-trifling-matter/" >Snowden Is No Trifling Matter</a></li>
<li><a href="http://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/" >Snowden Defies White House, Still Caught in Limbo</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spy Contractor Bug in Ecuador Embassy Fails to Stop Wikileaks</title>
		<link>https://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/</link>
		<comments>https://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/#respond</comments>
		<pubDate>Fri, 05 Jul 2013 13:03:28 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Ecuador]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Evo Morales]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Surveillance Group Limited]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125486</guid>
		<description><![CDATA[Spy equipment from the Surveillance Group Limited, a British private detective agency based in Worcester, England, has been found in the Ecuadorean embassy in London where Julian Assange, editor of Wikileaks, has taken refuge. At a press conference in Quito on Wednesday, Ricardo Patiño, the foreign minister of Ecuador, held up a photo of a [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />WASHINGTON, Jul 5 2013 (IPS) </p><p>Spy equipment from the Surveillance Group Limited, a British private detective agency based in Worcester, England, has been found in the Ecuadorean embassy in London where Julian Assange, editor of Wikileaks, has taken refuge.<span id="more-125486"></span></p>
<p>At a press conference in Quito on Wednesday, Ricardo Patiño, the foreign minister of Ecuador, held up a photo of a &#8220;spy microphone&#8221; that was found on Jun. 14 inside a small white box that was placed in an electrical outlet behind a bookshelf. The device contained a telephone SIM card allowing it to broadcast any conversations that it picked up.</p>
<p>&#8220;We are requesting backing from the British government to continue with the investigation of the device found,&#8221; Patiño told reporters.</p>
<p>The device was discovered by embassy security staff just two days before Patiño met with Assange to discuss his predicament. It coincided with revelations from Edward Snowden, a former U.S. Central Intelligence Agency (CIA) staffer, of the extent of U.S. National Security Agency global surveillance of ordinary citizens.</p>
<p>Nobody has yet come forward to claim the device and the company has denied any role. &#8220;The Surveillance Group do not and have never been engaged in any activities of this nature,&#8221; said Timothy Young, the company CEO in a press statement issued Thursday. &#8220;This is a wholly untrue assertion.&#8221;</p>
<p>However, a casual web search reveals that the Surveillance Group boasts of its ability to install tracking devices anywhere.</p>
<p>&#8220;We can justifiably claim to be the only company in the world to offer an internationally accredited, covert camera construction, concealment and deployment course,&#8221; a company website claims. &#8220;We can provide a range of bespoke, unmanned, covert camera options to gather vital video evidence in the most challenging environment or scenarios. The cameras can further be supported by the use of micro tracking devices for deployment with customer property or vehicles.&#8221;</p>
<p>Bugging places is just one of the services that the Surveillance Group provides to corporations and police forces.</p>
<p>&#8220;We are the acknowledged experts in providing Professional Witness surveillance to the police and local authorities in relation to drugs, prostitution, gang violence, hate crime and antisocial behavior,&#8221; the company says on another page on its website.</p>
<p>&#8220;Our work in this arena includes the detection of malpractice by employees relative to the passing of confidential company information or the infringement of restrictive covenants and breaches of contract.&#8221;</p>
<p>Company web pages show pictures of hooded youth smashing store windows, as well as testimonials from companies like Nike who congratulated them on helping find addresses of vendors selling counterfeit goods.</p>
<p>&#8220;I am extremely impressed with the service provided by the team at The Surveillance Group and would definitely recommend them for brand protection work,&#8221; Chloe Young, a Nike official, was quoted as saying.</p>
<p>The Surveillance Group also offers &#8220;professional diplomas&#8221; in &#8220;tactical counter surveillance&#8221; for 5,190 pounds (8,000 dollars)</p>
<p>However, the company appears to have completely failed to foil the plans of Julian Assange and Edward Snowden, which were likely hatched in the very building that was being bugged and most certainly did not dissuade them from launching a daring international escape for the former spy, that was worthy of Hollywood.</p>
<p>On Jun. 23, Wikileaks staffer Sarah Harrison spirited Snowden out of Hong Kong &#8211; where he had been staying &#8211; to Moscow, taking the intelligence agencies by surprise.</p>
<p>The listening device is not the only way that Ecuador suspects that it is being monitored. An article in the Wall Street Journal last week quoted extensively from email correspondence between aides of President Rafael Correa, revealing that someone was hacking internal government communications.</p>
<p>&#8220;I suggest talking to Assange to better control the communications,&#8221; the newspaper quoted Nathalie Cely, Ecuador&#8217;s ambassador to the U.S., in a message to presidential spokesman Fernando Alvarado. &#8220;From outside… [Assange] appears to be &#8216;running the show&#8217;.&#8221;</p>
<p>The Journal said that it obtained the emails from Univision Networks, a U.S.-based Spanish TV network, but Wikileaks says that the U.S. government could well have provided them with the raw material.</p>
<p>It should be noted that a number of private vendors around the world provide technology to hack email communications for &#8220;lawful interception&#8221; purposes.</p>
<p>These incidents have stirred deep anger among government officials in Quito.</p>
<p>The Ecuadorian government is being &#8220;infiltrated from all sides&#8221;, said Patiño. &#8220;This is a testament to the loss of ethics at an international level in the relations that we have with other governments.&#8221;</p>
<p>However, the interception of emails from South American governments appears to have been just as useless as the bugging at foiling Snowden&#8217;s plans. On Tuesday, the U.S. government sparked a diplomatic crisis by attempting to block a flight by President Evo Morales of Bolivia, under the suspicion that he was transporting Snowden. Morales was detained at Vienna airport for 14 hours but eventually completed his journey.</p>
<p>&#8220;Sieging/bugging of Ecuador&#8217;s London embassy and the blockading of Morales jet shows that imperial arrogance is the gift that keeps on giving,&#8221; tweeted Wikileaks.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/snowden-is-no-trifling-matter/" >Snowden Is No Trifling Matter</a></li>
<li><a href="http://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/" >Snowden Defies White House, Still Caught in Limbo</a></li>
<li><a href="http://www.ipsnews.net/2013/07/the-new-fascism/" >The New Fascism</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Snowden Defies White House, Still Caught in Limbo</title>
		<link>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/</link>
		<comments>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/#respond</comments>
		<pubDate>Tue, 02 Jul 2013 18:02:32 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Booz Allen]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125402</guid>
		<description><![CDATA[Late on Monday night, Sarah Harrison, a Wikileaks activist, hand-delivered 21 letters to Kim Shevchenko, the duty officer at the Russian consulate office in Moscow&#8217;s Sheremetyevo airport, on behalf of Edward Snowden, the U.S. National Security Agency (NSA) whistleblower. The letters that Harrison delivered were requests for asylum addressed to embassy officials of the following [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />WASHINGTON, Jul 2 2013 (IPS) </p><p>Late on Monday night, Sarah Harrison, a Wikileaks activist, hand-delivered 21 letters to Kim Shevchenko, the duty officer at the Russian consulate office in Moscow&#8217;s Sheremetyevo airport, on behalf of Edward Snowden, the U.S. National Security Agency (NSA) whistleblower.<span id="more-125402"></span></p>
<p>The letters that Harrison delivered were requests for asylum addressed to embassy officials of the following countries: Austria, Bolivia, Brazil, China, Cuba, Ecuador, Finland, France, Germany, Iceland, India, Italy, Ireland, the Netherlands, Nicaragua, Norway, Poland, Russia, Spain, Switzerland and Venezuela.</p>
<p>&#8220;Although I am convicted of nothing, [the U.S. government] has unilaterally revoked my passport, leaving me a stateless person,&#8221; Snowden wrote in a statement for the public that was posted on the Wikileaks website. &#8220;Without any judicial order, the administration now seeks to stop me exercising a basic right. A right that belongs to everybody. The right to seek asylum.&#8221;</p>
<p>Washington is furious because Snowden has released dozens of top secret documents that prove that the U.S. government has been tapping global internet and phone systems on a massive scale. As many as one trillion documents have been intercepted under one scheme &#8211; codenamed &#8220;ShellTrumpet.&#8221; Other secret projects include &#8220;Prism&#8221; which allows the NSA to harvest information on ordinary citizens from servers belonging to companies like Google and Facebook.</p>
<p>Snowden coordinated the releases from a hotel in Hong Kong in late May, working principally with two U.S. reporters &#8211; Glenn Greenwald and Laura Poitras &#8211; and the Guardian newspaper in the UK. Der Spiegel in Germany and the Washington Post in the U.S. also were given some material.</p>
<p>For these revelations, the 30-year-old former U.S. Central Intelligence Agency (CIA) staffer &#8211; is now a wanted man. The U.S. government has charged him with espionage in a court order issued Jun. 14 and signed by John Anderson, a judge in Virginia, and canceled his U.S. passport.</p>
<p>Informed that the Chinese authorities would allow him to depart without hindrance, Snowden fled from Hong Kong to Moscow on Jun. 23 with Harrison&#8217;s assistance after she arrived to help him with safe passage papers issued by Fidel Narvaez, an Ecuadorean consular officer in London.</p>
<p>The pair, however, are now marooned in the Russian capital because Ecuador has since canceled the papers it issued to Snowden.</p>
<p>Snowden&#8217;s 21 letters requesting asylum reflect his perilous state, given that the U.S. government is now working the phones to ask governments around the world to prevent him from escaping to freedom.</p>
<p>Russia has said that it will not deport Snowden from Moscow airport, but it has also refused to grant him asylum unless he agrees to stop releasing documents.</p>
<p>&#8220;Russia never hands anybody over anywhere and doesn&#8217;t intend to do so. If he wants to go somewhere and somebody will host him &#8211; no problem,&#8221; Putin said at a news conference in Moscow. &#8220;If he wants to stay here, there is one condition: He must stop his work aimed at harming our American partners.&#8221;</p>
<p>Ecuadorean President Rafael Correa has also backed away from helping Snowden after he got a personal call from U.S. Vice President Joe Biden. Correa now says that Narvaez had made a mistake in giving Snowden papers.</p>
<p>&#8220;The consul, in his desperation, issued a safe conduct document without validity, without authorisation, without us even knowing,&#8221; Correa told the Guardian newspaper. &#8220;It was a mistake on our part.&#8221;</p>
<p>Snowden&#8217;s top hope is now Venezuela, which has expressed an interest in him. &#8220;If this young man is punished, nobody in the world will ever dare to tell the truth,&#8221; Venezuelan President Nicolás Maduro has told the media, hinting strongly that his government would offer Snowden asylum.</p>
<p>By coincidence, Maduro is in Moscow attending talks on oil and gas. In theory he could whisk Snowden away to safety on his presidential jet.</p>
<p>While Snowden is living in limbo, he has not arrived at this extraordinary situation without some forethought.</p>
<p>The computer programmer, who has never attended college, previously worked for the CIA in Geneva where he first became troubled by the NSA&#8217;s massive dragnet for global communications and decided to do something about it.</p>
<p>Several months ago Snowden applied for a job as an &#8220;infrastructure analyst&#8221; with Booz Allen Hamilton, a Virginia intelligence contractor, in order to acquire documents to prove what the NSA was doing. He was hired by the company in March at a salary of 122,000 dollars a year at an NSA station in Hawaii until late May when he left for Hong Kong.</p>
<p>&#8220;My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked,&#8221; Snowden told the South China Morning Post.</p>
<p>Most significantly he found evidence that the NSA was storing huge quantities of data for as much as five years under a secret interpretation of the law. Armed with these documents, he left for Hong Kong on May 20 after telling his supervisor that he had to get medical assistance for epilepsy.</p>
<p>While Snowden now faces an uncertain future, he says he remains &#8220;unbowed&#8221; in his convictions and that he placed his trust in his supporters to fight back against the NSA and the White House.</p>
<p>&#8220;The Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless,&#8221; Snowden wrote in his statement issued last night. &#8220;No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised &#8211; and it should be.&#8221;</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/" >How Booz Allen Made the Revolving Door Redundant</a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Snowden Asylum Request &#8216;Could Take Months&#8217;</title>
		<link>https://www.ipsnews.net/2013/06/snowden-asylum-request-could-take-months/</link>
		<comments>https://www.ipsnews.net/2013/06/snowden-asylum-request-could-take-months/#respond</comments>
		<pubDate>Thu, 27 Jun 2013 16:36:28 +0000</pubDate>
		<dc:creator>AJ Correspondents</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[Ecuador]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Freedom of Information]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125267</guid>
		<description><![CDATA[A decision on whether or not Edward Snowden, the whistleblower who is facing charges of espionage in the U.S., will be given asylum in Ecuador could take months, officials there say. Richard Patiño, the country&#8217;s foreign minister, said on Wednesday during a state visit to Malaysia that it took two months for the country to [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By AJ Correspondents<br />DOHA, Jun 27 2013 (Al Jazeera) </p><p>A decision on whether or not Edward Snowden, the whistleblower who is facing charges of espionage in the U.S., will be given asylum in Ecuador could take months, officials there say.</p>
<p><span id="more-125267"></span>Richard Patiño, the country&#8217;s foreign minister, said on Wednesday during a state visit to Malaysia that it took two months for the country to make a decision in the case of Julian Assange, the founder of whistleblowing website Wikileaks, and that Snowden&#8217;s case would take at least as long from the time the request was filed.</p>
<div id="attachment_125269" style="width: 330px" class="wp-caption alignright"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-125269" class="size-full wp-image-125269" alt="Hong Kong rally in support of whistleblower Edward Snowden. Credit: See-ming Lee/CC BY 2.0" src="https://www.ipsnews.net/Library/2013/06/Snowden.jpg" width="320" height="213" srcset="https://www.ipsnews.net/Library/2013/06/Snowden.jpg 320w, https://www.ipsnews.net/Library/2013/06/Snowden-300x199.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /><p id="caption-attachment-125269" class="wp-caption-text">Hong Kong rally in support of whistleblower Edward Snowden. Credit: See-ming Lee/CC BY 2.0</p></div>
<p>Snowden is currently in hiding in the transit area of the Sheremetyevo airport near Moscow, the Russian capital.</p>
<p>Also on Wednesday, a senior U.S. politician issued a strong warning to cut ties with Ecuador if that country takes him in.</p>
<p>Robert Menendez, the chairman of the U.S. Senate Foreign Relations Committee, said that he would seek to end the preferential treatment for goods if the South American nation offers political asylum to Snowden.</p>
<p>Menendez said he would lead the effort to prevent the renewal of Ecuador&#8217;s duty-free access to U.S. markets under the Generalised System of Preferences programme, and also to block the renewal of the Andean Trade Promotion and Drug Eradication Act, both of which expire at the end of next month.</p>
<p>Ecuador exported 5.4 billion dollars worth of oil, 166 million dollars of cut flowers, 122 million dollars of fruits and vegetables and 80 million dollars of tuna to the U.S. under the Andean trade programme in 2012.</p>
<p>Ecuador said that pending its decision on Snowden&#8217;s request, Washington should argue its case for extraditing the former National Security Agency contractor back to the United States.</p>
<p>U.S. Defence Secretary Chuck Hagel also called on Russia for Snowden’s extradition on Wednesday, telling the U.S. media that his leaks of classified information on widespread U.S. surveillance programmes had been a &#8220;serious security breach&#8221; that damaged U.S. national security.</p>
<p><b>Diplomatic spat</b></p>
<p>Russia says that since Snowden is in the transit area of the airport, he has technically not entered the country and hence cannot be extradited.</p>
<p>Snowden arrived at the Moscow airport from Hong Kong.</p>
<p>Hong Kong, a semi-autonomous Chinese territory, said an earlier U.S. request to arrest Snowden while he was there did not fully comply with its legal requirements.</p>
<p>But White House spokesperson Jay Carney lashed out at Beijing, saying its failure to &#8220;honour extradition obligations&#8221; had dealt a &#8220;serious setback&#8221; to efforts to build trust with China&#8217;s new president, Xi Jinping.</p>
<p>Meanwhile, Venezuelan President Nicolas Maduro has said he would &#8220;almost certainly&#8221; grant political asylum to Snowden.</p>
<p>&#8220;If he asked us for it, we would think about it and we would almost certainly give it to him, because political asylum is an international human rights institution to protect the persecuted,&#8221; Maduro said.</p>
<p>The U.S. has been seeking Snowden&#8217;s custody since he leaked details of secret U.S. government surveillance programmes. There was no sign on Wednesday of him registering for onward flights out of Russia.</p>
<p>&#8220;They are not flying today and not over the next three days,&#8221; an Aeroflot representative at the transfer desk at Sheremetyevo said when asked whether Snowden and his legal adviser, Sarah Harrison, were due to fly out.</p>
<p>* Published under an agreement with Al Jazeera.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/" >How Booz Allen Made the Revolving Door Redundant</a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/06/snowden-asylum-request-could-take-months/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Booz Allen Made the Revolving Door Redundant</title>
		<link>https://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/</link>
		<comments>https://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/#respond</comments>
		<pubDate>Mon, 17 Jun 2013 20:37:23 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Booz Allen]]></category>
		<category><![CDATA[Director of National Intelligence]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Foreign Intelligence Surveillance Act]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[James Woolsey]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=119983</guid>
		<description><![CDATA[Edward Snowden, a low-level employee of Booz Allen Hamilton who blew the whistle on the U.S. National Security Agency (NSA), unexpectedly exposed a powerful and seamless segment of the military-industrial complex &#8211; the world of contractors that consumes some 70 percent of this country&#8217;s 52-billion-dollar intelligence budget. Some commentators have pounced on Snowden&#8217;s disclosures to [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />WASHINGTON, Jun 17 2013 (IPS) </p><p>Edward Snowden, a low-level employee of Booz Allen Hamilton who blew the whistle on the U.S. National Security Agency (NSA), unexpectedly exposed a powerful and seamless segment of the military-industrial complex &#8211; the world of contractors that consumes some 70 percent of this country&#8217;s 52-billion-dollar intelligence budget.</p>
<p><span id="more-119983"></span>Some commentators have pounced on Snowden&#8217;s disclosures to denounce the role of private contractors in the world of government and national security, arguing such spheres are best left to public servants. But their criticism misses the point.</p>
<p>It is no longer possible to determine the difference between the two: employees of the NSA &#8211; along with agencies like the Central Intelligence Agency (CIA) &#8211; and the employees of companies such as Booz Allen have integrated to the extent that they slip from one role in industry to another in government, cross-promoting each other and self-dealing in ways that make the fabled revolving door redundant, if not completely disorienting.</p>
<p>Snowden, a systems administrator at the NSA&#8217;s Threat Operations Centre in Hawaii, had worked for the CIA and Dell before joining Booz Allen. But his rather obscure role pales in comparison to those of others."It is no longer possible to determine the difference between employees of the NSA and employees of companies such as Booz Allen."<br /><font size="1"></font></p>
<p>To best understand this tale, one must first turn to R. James Woolsey, a former director of CIA, who appeared before the U.S. House of Representatives in the summer of 2004 to promote the idea of integrating U.S. domestic and foreign spying efforts to track &#8220;terrorists&#8221;.</p>
<p>One month later, he appeared on MSNBC television, where he spoke of the urgent need to create a new U.S. intelligence czar to help expand the post-9/11 national surveillance apparatus.</p>
<p>On neither occasion did Woolsey mention that he was employed as senior vice president for global strategic security at Booz Allen, a job he held from 2002 to 2008.</p>
<p>&#8220;The source of information about vulnerabilities of and potential attacks on the homeland will not be dominated by foreign intelligence, as was the case in the Cold War. The terrorists understood us well, and so they lived and planned where we did not spy (inside the U.S.),&#8221; said Woolsey in prepared remarks before the U.S. House Select Committee on Homeland Security on Jun. 24, 2004.</p>
<p>In a prescient suggestion of what Snowden would later reveal, Woolsey went on to discuss expanding surveillance to cover domestic, as well as foreign sources.</p>
<p>&#8220;One source will be our vulnerability assessments, based on our own judgments about weak links in our society&#8217;s networks that can be exploited by terrorists,&#8221; he said. &#8220;A second source will be domestic intelligence. How to deal with such information is an extraordinarily difficult issue in our free society.&#8221;</p>
<p>One month later, Woolsey appeared on MSNBC&#8217;s &#8220;Hardball&#8221;, a news-talk show hosted by Chris Matthews, and told Matthews that the federal government needed a new high-level office &#8211; a DNI, if you will &#8211; to straddle domestic and foreign intelligence. Until then, the director of the CIA served as the head of the entire intelligence community (IC).</p>
<p>&#8220;The problem is that the intelligence community has grown so much since 1947, when the position of director of central intelligence was created, that it&#8217;s [become] impossible to do both jobs, running the CIA and managing the community,&#8221; he said.</p>
<p>Both these suggestions would lead to influential jobs and lucrative sources of income for his employer and colleagues.</p>
<p><strong>The Director of National Intelligence</strong></p>
<p>Fast forward to 2007. Vice Admiral Michael McConnell (ret.), Booz Allen&#8217;s then-senior vice president of policy, transformation, homeland security and intelligence analytics, was hired as the second czar of the new &#8220;Office of the Director of National Intelligence&#8221;, a post that oversees the work of Washington&#8217;s 17 intelligence agencies, which was coincidentally located just three kilometres from the company&#8217;s corporate headquarters.</p>
<p>Upon retiring as DNI, McConnell returned to Booz Allen in 2009, where he serves as vice chairman to this day. In August 2010, Lieutenant General James Clapper (ret), Booz Allen&#8217;s former vice president for military intelligence from 1997 to 1998, was hired as the fourth intelligence czar, a job he has held ever since. Indeed, one-time Booz Allen executives have filled the position five of the eight years of its existence.</p>
<p>When these two men were put in charge of the national-security state, they helped expand and privatise it as never before.</p>
<p>McConnell, for example, asked Congress to alter the Foreign Intelligence Surveillance Act to allow the NSA to spy on foreigners without a warrant if they were using Internet technology that routed through the United States.</p>
<p>&#8220;The resulting changes in both law and legal interpretations (and the) new technologies created a flood of new work for the intelligence agencies &#8211; and huge opportunities for companies like Booz Allen,&#8221; <a href="http://www.nytimes.com/2013/06/16/us/after-profits-defense-contractor-faces-the-pitfalls-of-cybersecurity.html?pagewanted=all">wrote</a> David Sanger and Nicole Perlroth in a profile of McConnell published in the New York Times Jun. 15.</p>
<p>Last week, Snowden revealed to the Guardian&#8217;s Glenn Greenwald that the NSA had created a secret system called &#8220;Prism&#8221; that allowed the agency to spy on electronic data of ordinary citizens around the world, both within and outside the United States.</p>
<p>Snowden&#8217;s job at Booz Allen&#8217;s offices in Hawaii was to maintain the NSA&#8217;s information technology systems. While he did not specify his precise connection to Prism, he <a href="http://www.scmp.com/news/hong-kong/article/1260175/chinese-state-media-chide-us-over-edward-snowdens-allegations">told the South China Morning Post</a> newspaper that the NSA hacked &#8220;network backbones &#8211; like huge Internet routers, basically &#8211; that give us access to the communications of hundreds of thousands of computers without having to hack every single one&#8221;.</p>
<p>Woolsey had argued in favour of such surveillance following the disclosure of the NSA&#8217;s warrantless wiretapping by the New York Times in December 2005.</p>
<p>&#8220;Unlike the Cold War, our intelligence requirements are not just overseas,&#8221; he told a Senate Judiciary Committee hearing on the NSA in February 2006. &#8220;Courts are not designed to deal with fast-moving battlefield electronic mapping in which an al Qaeda or a Hezbollah computer might be captured which contains a large number of email addresses and phone numbers which would have to be checked out very promptly.&#8221;</p>
<p><strong>Close ties</strong></p>
<p>Exactly what Booz Allen does for the NSA&#8217;s electronic surveillance system revealed by Snowden is classified, but one can make an educated guess from similar contracts it has in this field &#8211; a quarter of the company&#8217;s 5.86 billion dollars in annual income comes from intelligence agencies.</p>
<p>The NSA, for example, hired Booz Allen in 2001 in an advisory role on the five-billion-dollar Project Groundbreaker to rebuild and operate the agency&#8217;s &#8220;nonmission-critical&#8221; internal telephone and computer networking systems.</p>
<p>Booz Allen also won a chunk of the Pentagon&#8217;s infamous Total Information Awareness contract in 2001 to collect information on potential terrorists in America from phone records, credit card receipts and other databases &#8211; a controversial programme defunded by Congress in 2003 but whose spirit survived in the Prism and other initiatives disclosed by Snowden.</p>
<p>The CIA pays a Booz Allen team led by William Wansley, a former U.S. Army intelligence officer, for &#8220;strategic and business planning&#8221; for its National Clandestine Service, which conducts covert operations and recruits foreign spies.</p>
<p>The company also provides a 120-person team, headed by a former U.S. Navy cryptology lieutenant commander and Booz Allen senior executive adviser Pamela Lentz, to support the National Reconnaissance Organisation, the Pentagon agency that manages the nation&#8217;s military spy satellites.</p>
<p>In January, Booz Allen was one of 12 contractors to win a five-year contract with the Defence Intelligence Agency that could be worth up to 5.6 billion dollars to focus on &#8220;computer network operations, emerging and disruptive technologies, and exercise and training activity&#8221;.</p>
<p>Last month, the U.S. Navy picked Booz Allen as part of a consortium to work on yet another billion-dollar project for &#8220;a new generation of intelligence, surveillance and combat operations&#8221;.</p>
<p>Booz Allen wins these contracts in several ways. In addition to its connections with the DNI, it boasts that half of its 25,000 employees are cleared for top secret-sensitive compartmented intelligence, one of the highest possible security ratings. (One third of the 1.4 million people with such clearances work for the private sector.)</p>
<p>A key figure at Booz Allen is Ralph Shrader, current chairman, CEO and president, who came to the company in 1974 after working at two telecommunications companies &#8211; Western Union, where he was national director of advanced systems planning, and RCA, where he served in the company&#8217;s government communications system division.</p>
<p>In the 1970s, Western Union and RCA both took part in a secret surveillance programme known as Minaret, where they agreed to give the NSA all their clients&#8217; incoming and outgoing U.S. telephone calls and telegrams.</p>
<p>Minaret and similar snooping programmes led to an explosive series of Congressional hearings in the 1970s by the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, chaired by Frank Church of Idaho in 1975.</p>
<p>*Jim Lobe contributed to this article.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2003/11/politics-expert-draws-attention-to-business-of-counter-terrorism/" >POLITICS: ‘Expert’ Draws Attention to Business of Counter-terrorism</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NSA Leaks Prompt Lawsuit and U.N. Action</title>
		<link>https://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/</link>
		<comments>https://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/#respond</comments>
		<pubDate>Wed, 12 Jun 2013 23:11:23 +0000</pubDate>
		<dc:creator>George Gao</dc:creator>
				<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[FISA]]></category>
		<category><![CDATA[ICCPR]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NYCLU]]></category>
		<category><![CDATA[UNESCO]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=119778</guid>
		<description><![CDATA[Edward Snowden, 29, left behind a comfortable lifestyle in Hawaii as a private contractor for the Pentagon&#8217;s National Security Agency (NSA) because he did not want to help create an &#8220;architecture for oppression&#8221; for fellow citizens. Snowden blew the whistle on a series of invasive activities that the NSA conducts domestically and internationally under the [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="227" src="https://www.ipsnews.net/Library/2013/06/3754271881_2f1436cf13_b-300x227.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/06/3754271881_2f1436cf13_b-300x227.jpg 300w, https://www.ipsnews.net/Library/2013/06/3754271881_2f1436cf13_b.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The National Security Agency has access to data from numerous telephone and internet companies. Credit: Ed Yourdon/CC by 2.0</p></font></p><p>By George Gao<br />UNITED NATIONS, Jun 12 2013 (IPS) </p><p>Edward Snowden, 29, left behind a comfortable lifestyle in Hawaii as a private contractor for the Pentagon&#8217;s National Security Agency (NSA) because he did not want to help create an &#8220;architecture for oppression&#8221; for fellow citizens.</p>
<p><span id="more-119778"></span>Snowden blew the whistle on a series of invasive activities that the NSA conducts domestically and internationally under the banner of &#8220;national security&#8221; – activities that intensified after Al Qaeda attacks against the United States on Sep. 11, 2001.</p>
<p>The NSA has access to a variety of online and telephone metadata banks, including from Verizon Communications, a leading telephone provider. Verizon metadata displays the duration of phone calls, the location of callers, the phone numbers being connected and the dates phone calls were made, according to the Guardian<i>. </i></p>
<p>The NSA also collects data from AT&amp;T and Sprint Nextel, as well as from credit card transactions, according to the Wall Street Journal.</p>
<p>Through its &#8220;Prism&#8221; programme, the NSA has direct access to central data from nine major internet companies – Google, Yahoo, Microsoft, Facebook, AOL, Apple, PalTalk, Skype and YouTube – including access to U.S. citizens&#8217; email content and chat logs, reported the Guardian and the Washington Post, the recipients of the documents leaked by Snowden.</p>
<p>The NSA revelations have prompted <a href="http://bestbits.net/prism-nsa/">civil society demands</a> for the U.N. Human Rights Council to address privacy rights in the face of increased state surveillance worldwide. They also underscore the warnings of a <a href="http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=13400&amp;LangID=E">Jun. 4 report</a> by U.N. Special Rapporteur Frank La Rue that addressed the increasing use of such surveillance.</p>
<p>&#8220;National laws regulating what constitutes the necessary, legitimate and proportional state involvement in communications surveillance are often inadequate or simply do not exist,&#8221; said La Rue."The surveillance being undertaken by the NSA...is a breach of international guarantees of freedom of expression."<br />
-- Toby Mendel, <br /><font size="1"></font></p>
<p>La Rue&#8217;s report noted that surveillance technologies are developing much faster than legal frameworks can adapt to regulate them. It cautioned specifically against the U.S.&#8217;s Foreign Intelligence Surveillance Act (FISA), which paved the way for NSA activities.</p>
<p>The report argued that unfettered state access to surveillance technologies could compromise human rights to privacy and freedom of expression, as protected by the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR), which the United States has adopted and ratified, respectively.</p>
<p>The report warned too against the use of &#8220;an amorphous concept of national security&#8221; as a reason to invade people&#8217;s rights to privacy and freedom of expression, arguing that such an invasion potentially &#8220;threatens the foundations of a democratic society&#8221;.</p>
<p>La Rue&#8217;s report followed a <a href="http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/global-survey-on-internet-privacy-and-freedom-of-expression/">2012 global survey</a> on Internet privacy and freedom of expression produced by the United Nations Educational, Scientific and Cultural Organization (UNESCO).</p>
<p>The UNESCO report noted that the right to communicate anonymously strengthens political accountability and encourages people to speak out in the public interest without fear of reprisal.</p>
<p>&#8220;The surveillance being undertaken by the NSA, if the [news] reports are correct, is a breach of international guarantees of freedom of expression,&#8221; said Toby Mendel, co-author of the UNESCO report and executive director of the Centre for Law and Democracy in Canada.</p>
<p>&#8220;The idea that the NSA is tracking vast volumes of communication data, potentially based on little or no evidence of a crime having been committed, will exert a significant chilling effect on all kinds of communications,&#8221; he told IPS.</p>
<p>Mendel also noted that the within the European Union, companies are being asked to store communication tracking data for up to two years for potential government use, with some protective barriers.</p>
<p>EU countries expressed initial outrage over the NSA&#8217;s activities, according to the Associated Press, with some officials promising to raise the issue of surveillance with the U.S. government. But analysts argue that under the surface, the EU benefits from NSA intelligence without having to do the dirty work itself.</p>
<p>Later this month, the U.N. Human Rights Committee will review the U.S. government&#8217;s compliance with the ICCPR and may highlight the U.S.&#8217;s surveillance program, <a href="http://www.aclu.org/blog/national-security-technology-and-liberty/un-human-rights-report-foreshadows-recent-surveillance">according to Allison Frankel</a> at the <a href="aclu.org">American Civil Liberties Unio</a>n&#8217;s (ACLU) human rights programme.</p>
<p>Meanwhile, the ACLU and the New York Civil Liberties Union (NYCLU) filed a lawsuit against U.S. President Barack Obama&#8217;s administration.</p>
<p>&#8220;Those programmes&#8230;constitute unreasonable intrusions into American&#8217;s private lives that&#8217;s protected by the Fourth Amendment [on search and seizure],&#8221; said Brett Kaufman, the national security fellow at ACLU&#8217;s National Security Project.</p>
<p>What is most disturbing, Kaufman told IPS, is that NSA activities were approved by all three branches of the U.S. government – Congress and the judiciary, as well as the executive &#8211; without appropriate input from U.S. citizens.</p>
<p>&#8220;In a democracy, the authority for this kind of intrusion into privacy must come from the people themselves,&#8221; he said.<b><br />
</b></p>
<p>Jun. 10 <a href="http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic/">polls</a> from the Pew Research Centre in Washington – conducted after the NSA leaks – shows that U.S. public perception of government surveillance has not changed much since 2001 and 2006, with 56 percent accepting NSA phone monitoring and 45 accepting email intrusions.</p>
<p>Jun. 12 polls from <a href="http://www.gallup.com/poll/163043/americans-disapprove-government-surveillance-programs.aspx">Gallup</a>, however, show a 53 percent public disapproval rating of NSA surveillance activities.</p>
<p>Snowden&#8217;s leaked NSA documents may only show the tip of the iceberg of U.S. government surveillance activities.</p>
<p>Ryan Calo, an assistant professor at the University of Washington School of Law in Seattle and an expert on privacy issues, said that limited, public knowledge of NSA surveillance may take a psychological toll on some U.S. citizens.</p>
<p>&#8220;I believe the resulting discomfort and fear – the state of oblique awareness without really knowing the details – constitutes a form of <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1641487">privacy harm</a>,&#8221; he told IPS.</p>
<p>Calo described a privacy &#8220;<a href="http://www.theatlantic.com/technology/archive/2013/03/the-catch-22-that-prevents-us-from-truly-scrutinizing-the-surveillance-state/273738/">Catch-22</a>&#8221; that is often the case in attempts to hold secretive government agencies accountable. &#8220;The courts won&#8217;t let you challenge secret surveillance because you cannot confirm it exists,&#8221; he said.</p>
<p>Such was the case in <i>Clapper v. Amnesty International </i>when the plaintiffs, including the ACLU, could not prove that they had been monitored by the NSA. But the ACLU, in its status as a Verizon customer, may now have the standing necessary to renew its lawsuit.</p>
<p>Asked by the Guardian<i> </i>about his actions, risks and sacrifices, Snowden said, &#8220;You can get up every day. You can go to work. You can collect your large paycheck for relatively little work against the public interest and go to sleep at night after watching your shows.&#8221;</p>
<p>&#8220;But if you realise that that&#8217;s the world you helped create, and it&#8217;s going to get worse with the next generation…to extend the capabilities of this sort of architecture of repression, you realise that you might be willing to accept any risk…so long as the public gets to make their own decisions about how that&#8217;s applied,&#8221; he said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/04/cyber-bill-fails-in-u-s-senate-but-online-privacy-concerns-live-on/" >Cyber Bill Fails in U.S. Senate, but Online Privacy Concerns Live On</a></li>
<li><a href="http://www.ipsnews.net/2012/05/journalists-and-netizens-in-govt-crosshairs/" >Journalists and Netizens in Govt Crosshairs</a></li>
<li><a href="http://www.ipsnews.net/2012/12/drones-come-home-to-u-s-privacy-activists-dismay/" >Drones Come Home, to U.S. Privacy Activists’ Dismay</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
