http://www.cbsnews.com/news/how-did-60-minutes-get-cameras-into-a-spy-agency/
Miller: NSA “just losing time” in wake of Snowden scandal
For the first time, the National Security Agency is talking about the secrets taken by Edward Snowden. The leader of the NSA’s internal investigation spoke to CBS News senior correspondent John Miller on “60 Minutes.” Rick Ledgett says the 1.7 million stolen documents include material that could cripple the NSA’s mission.
In the wake of the Snowden scandal, the NSA is just losing time, Miller said.
“If an adversary has that (information), and they say, ‘Here’s what we know about the adversary,’ they change all that,” Miller said. “And when they say, ‘Here’s what we don’t know about the adversary,’ they say we don’t have to worry about that now. Really, it tells them how to counter-program intelligence, and there’s not much the NSA can do about all that.”
Miller added on “CBS This Morning,” that the estimates of the people doing the damage control assessment say Snowden may have leaked about 200,000 of the documents to journalists, but are not, statistically speaking, most of the documents he left with.
“So one question is, if his agenda was to expose things that were a risk to American’s privacy, why did he take the…documents which basically tells the enemy what we know and what we don’t know since that has nothing do with it. And then the second question is what did he intend to do with the rest of them?”
Additionally, according to reports, the entirety of what Snowden took is unknown. Questions of whether Snowden bugged the system also remain, which led to a $26 million revamp of the computer systems in Hawaii.
“One of the things they did was because of Edward Snowden’s role as a system administrator, his access to those systems, and his background as a computer specialist, they went on the assumption that something could have been put in the system that could go off later,” Miller said. “So they really replaced — to the tune of $26 million, we believe — every computer, classified and unclassified, and most of the cables there in Hawaii.”
So how did Miller and “60 Minutes” team get the notoriously secret agency to open up about their story?
“We spent a number of months meeting down there and getting them to agree that, while they declassified everything and came out with a statement every time there was a Snowden leak, their story wasn’t getting out as a narrative and that there would be an opportunity in place to tell the whole thing,” Miller said.

Inside the NSA
“And this was hard for them,” Miller added. “This is not what they do. They’re not used to having cameras troop through or asking questions about classified programs. But the idea was, if we could sit down and have that conversation, a lot of people would be interested in it.”
Ex-Snoop Confirms Echelon Network
Global Network Monitors Phones And Email
- 2000Feb 24
- CORRESPONDENTCBSNews.com staff CBSNews.com staff
- MORE+
- STUMBLE
- COMMENTS
More About Echelon
|
“It’s not the world of fiction. That’s the way it works. I’ve been there,” Frost tells CBS News 60 Minutes Correspondent Steve Kroft. “I was trained by you guys,” says the former Canadian intelligence agent, referring to the United States’ National Security Agency.
The NSA runs Echelon with Canada, Britain, Australia and New Zealand as a series of listening posts around the world that eavesdrop on terrorists, drug lords and hostile foreign governments.
But to find out what the bad guys are up to, all electronic communications, including those of the good guys, must be captured and analyzed for key words by super computers.
That is a fact that makes Frost uncomfortable, even though he believes the world needs intelligence gathering capabilities like Echelon. “My concern is no accountability and nothing, no safety net in place for the innocent people who fall through the cracks,” he tells Kroft.
As an example of those innocent people, Frost cites a woman whose name and telephone number went into the Echelon database as a possible terrorist because she told a friend on the phone that her son had “bombed” in a school play. “The computer spit that conversation out. The analystwas not too sure what the conversation was referring to, so, erring on the side of caution, he listed that lady,” Frost recalls.
Democracies usually have laws against spying on citizens. But Frost says Echelon members could ask another member to spy for them in an end run around those laws.
For example, Frost tells Kroft that his Canadian intelligence boss spied on British government officials for Prime Minister Margaret Thatcher. “(Thatcher) had two ministers that she said, quote, ‘they weren’t on side,’ unquote…So my boss…went to McDonald House in London and did intercept traffic from these two ministers,” claims Frost. |”The British Parliament now have total deniability. They didn’t do anythingWe did it for them.”
America politicians may also have been eavesdropped on, says Margaret Newsham, a woman who worked at Menwith Hill in England, the NSA’s largest spy station. She says she was shocked to hear the voice of U.S. Sen. Strom Thurmond (R.-S.C.) on a surveillance headset about 20 years ago. “To my knowledge, all (the intercepted voices)…would be…Russian, Chinese… foreign,” she tells Kroft.
The exposing of such possible abuses of Echelon will surely add to the growing firestorm in Europe over the system.
On Feb. 23, the European Parliament issued a report accusing the U.S. of using Echelon for commercial spying on two separate occasions, to help American companies win lucrative contracts over European competitors. The U.S. State Department denies such spying took place and will not even acknowledge the existence of the top secret Echelon project.
Rep. Porter Goss (R.-Fla), chairman of the House Intelligence Committee, which has oversight of the NSA, does acknowledge that the U.S. has the capability to pick up any phone call, and that even his own conversations could have been monitored.
But Goss says there are methods to prevent the abuse of that information. “I cannot stop the dust in the ether…but what I can make sure, is that…the capability is not abused,” he tells Kroft.
60 MINUTES
Television Broadcast February 27, 2000
ECHELON; WORLDWIDE CONVERSATIONS BEING RECEIVED BY THE ECHELON SYSTEM MAY FALL INTO THE WRONG HANDS AND INNOCENT PEOPLE MAY BE TAGGED AS SPIES
STEVE KROFT, co-host:
If you made a phone call today or sent an e-mail to a friend, there’s a good chance what you said or wrote was captured and screened by the country’s largest intelligence agency. The top-secret Global Surveillance Network is called Echelon, and it’s run by the National Security Agency and four English-speaking allies: Canada, Great Britain, Australia and New Zealand.
The mission is to eavesdrop on enemies of the state: foreign countries, terrorist groups and drug cartels. But in the process, Echelon’s computers capture virtually every electronic conversation around the world.
How does it work, and what happens to all the information that’s gathered? A lot of people have begun to ask that question, and some suspect that the information is being used for more than just catching bad guys.
(Footage of satellite; person talking on cell phone; fax machine; ATM being used; telephone pole and wires; radio towers)
KROFT: (Voiceover) We can’t see them, but the air around us is filled with invisible electronic signals, everything from cell phone conversations to fax transmissions to ATM transfers. What most people don’t realize is that virtually every signal radiated across the electromagnetic spectrum is being collected and analyzed.
How much of the world is covered by them?
Mr. MIKE FROST (Former Spy): The entire world, the whole planet–covers everything. Echelon covers everything that’s radiated worldwide at any given instant.
KROFT: Every square inch is covered.
Mr. FROST: Every square inch is covered.
(Footage of Frost; listening post)
KROFT: (Voiceover) Mike Frost spent 20 years as a spy for the CSE, the Canadian equivalent of the National Security Agency, and he is the only high-ranking former intelligence agent to speak publicly about the Echelon program. Frost even showed us one of the installations where he says operators can listen in to just about anything.
Mr. FROST: Everything from–from data transfers to cell phones to portable phones to baby monitors to ATMs…
KROFT: Baby monitors?
Mr. FROST: Oh, yeah. Baby monitors give you a lot of intelligence.
(Footage of listening posts)
KROFT: (Voiceover) This listening post outside Ottawa is just part of a network of spy stations, which are hidden in the hills of West Virginia, in remote parts of Washington state, even in plain view among the sheep pastures of Europe.
This is Menwith Hill Station in the Yorkshire countryside of Northern England. Even though we’re on British soil, Menwith Hill is an American base operated by the National Security Agency. It’s believed to be the largest spy station in the world.
(Footage of Menwith Hill Station; aerial footage of NSA headquarters; supercomputers)
KROFT: (Voiceover) Inside each globe are huge dishes which intercept and download satellite communications from around the world. The information is then sent on to NSA headquarters at Fort Meade, Maryland, where acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.
Mr. FROST: Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or–or a person’s name. And people are getting caught, and–and that’s great.
(Footage of National Security Agency; Carlos the Jackal; two Libyans in court)
KROFT: (Voiceover) The National Security Agency won’t talk about those successes or even confirm that a program called Echelon exists. But it’s believed the international terrorist Carlos the Jackal was captured with the assistance of Echelon, and that it helped identify two Libyans the US believes blew up Pan-Am Flight 103.
Is it possible for people like you and I, innocent civilians, to be targeted by Echelon?
Mr. FROST: Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a–a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w–was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.
KROFT: This is not urban legend you’re talking about. This actually happened?
Mr. FROST: Factual. Absolutely fact. No legend here.
(Vintage footage of Fonda; Spock; King; congressional hearing; the Capitol building)
KROFT: (Voiceover) Back in the 1970s, the NSA was caught red-handed spying on anti-war protesters like Jane Fonda and Dr. Benjamin Spock, and it turns out they had been recording the conversations of civil rights leaders like Martin Luther King in the 1960s. When Congress found out, it drafted strict, new laws prohibiting the NSA from spying on Americans, but today, there’s enough renewed concern about potential abuses that Congress is revisiting the issue.
Representative BOB BARR (Republican, Georgia): (From C-SPAN) One such project known as Project Echelon engages in the interception of literally millions of communications involving United States citizens.
(Footage of Barr; NSA sign; Goss and Kroft)
KROFT: (Voiceover) But even members of Congress have trouble getting information about Echelon. Last year, the NSA refused to provide internal memoranda on the program to Porter Goss, the chairman of the House Intelligence Committee.
What exactly was it that you requested?
Representative PORTER GOSS (Chairman, House Intelligence Committee): Well, I can’t get too specific about it, but there was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.
(Footage of Goss and Kroft)
KROFT: (Voiceover) But only after Goss threatened to cut the NSA’s budget. He still believes, though, that the NSA does not eavesdrop on innocent American citizens.
If the NSA has capabilities to screen enormous numbers of telephone calls, faxes, e-mails, whatnot, how do you filter out the American conversations, and how do you–how can you be sure that no one is listening to those conversations?
Rep. GOSS: We do have methods for that, and I am relatively sure that those procedures are working very well.
(Footage of Madsen; epic.org Web site; Amnesty International gathering; Greenpeace members in a boat; Princess Diana)
KROFT: (Voiceover) Others aren’t so sure. Wayne Madsen works with a group called the Electronic Privacy Information Center, which is suing the NSA to get a copy of the documents that were finally turned over to Congressman Goss. Madsen, a former naval officer who used to work for the NSA, is concerned about reports that Echelon has listened in on groups like Amnesty International and Greenpeace. Last year, the NSA was forced to acknowledge that it had more than 1,000 pages of information on the late Princess Diana.
Mr. WAYNE MADSEN (Electronic Privacy Information Center): Princess Diana, in her campaign against land mines, of course, was completely at odds with US policy, so her activities were of tremendous interest to–to the US policy-makers, of course, and–and, therefore, to the National Security Agency eavesdroppers.
KROFT: Do you think the–the NSA only monitored her conversations that involved land mines?
Mr. MADSEN: Well, when NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?
(Footage of newspaper headlines; Menwith Hill Station)
KROFT: (Voiceover) In the early 1990s, some of Diana’s personal conversations, as well as those of some others associated with the royal family, mysteriously appeared in the British tabloids. Could some of those conversations have been picked up by that US spy station in England?
Mr. MADSEN: (Voiceover) There’s been some speculation that Menwith Hill may have been involved in the intercepts of those communications as–as well.
And how–how could that be legal? Well, British intelligence could say, ‘Well, we didn’t eavesdrop on members of the British royal family. These happened to be conducted by, you know, one of our strategic partners.’ And, therefore, they would skirt the–skirt the British laws against intercepts of communications.
(Footage of National Security Agency sign)
KROFT: (Voiceover) The US admits it often shares intelligence with its allies, but never to get around the law.
Mr. FROST: Never, Steve, will governments admit that they can circumvent legislation by asking another country to do for them what they can’t do for themselves. They will never admit that. But that sort of thing is so easy to do. It is so commonplace.
KROFT: Do you have any first-hand experience?
Mr. FROST: I do have first-hand experience where CSE did some dirty work for Margaret Thatcher when she was prime minister. She…
KROFT: What kind of dirty work?
Mr. FROST: Well, at the time, she had two ministers that she said, quote, “They weren’t on side,” unquote, and she wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers. The British Parliament now have total deniability. They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.
(Footage of Newsham and Kroft)
KROFT: (Voiceover) One of the few people to acknowledge that they have listened to conversations over the Echelon system is Margaret Newsham, who worked at Menwith Hill in England back in 1979. She had a top secret security clearance.
So who–you–you knew that conversations were being pulled off satellites.
Ms. MARGARET NEWSHAM: Yes. But to my knowledge, all it was going to be would be like Russian, Chinese or, y–you know, foreign.
(Footage of Newsham)
KROFT: (Voiceover) But soon, she says, she discovered it wasn’t only the Russians and the Chinese who were the targets.
Ms. NEWSHAM: I walked into the office building and a friend said, ‘Come over here and listen to–to this thing.’ And–and he had headphones on, so I took the headphones and I listened to it, and–and I looked at him and I’m going, ‘That’s an American.’ And he said, ‘Well, yeah.’
KROFT: And it was definitely an American voice?
Ms. NEWSHAM: It was definitely an American voice, and it was a voice that was distinct. And I said, ‘Well, who is that?’ And he said it was Senator Strom Thurmond. And I go, ‘What?’
KROFT: Do you think this kind of stuff goes on?
Mr. FROST: Oh, of course it goes on. Been going on for years. Of course it goes on.
KROFT: You mean the National Security Agency spying on politicians in…
Mr. FROST: Well, I–I…
KROFT: …in the United States?
Mr. FROST: Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys.
Rep. GOSS: Certainly possible that something like that could happen. The question is: What happened next?
KROFT: What do you mean?
Rep. GOSS: It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused–the capability’s not abused, and that’s what we do.
KROFT: Much of what’s known about the Echelon program comes not from enemies of the United States, but from its friends. Last year, the European Parliament, which meets here in Strasbourg, France, issued a report listing many of the Echelon’s spy stations around the world and detailing their surveillance capabilities. The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.
(Footage of report; plane; report; Raytheon sign; Ford and Kroft)
KROFT: (Voiceover) The European Parliament report alleges that the NSA ‘lifted all the faxes and phone calls’ between the European aircraft manufacturer Airbus and Saudi Arabian Airlines, and that the information helped two American companies, Boeing and McDonnell Douglas, win a $ 6 billion contract. The report also alleges that the French company Thomson-CSF lost a $ 1.3 billion satellite deal to Raytheon the same way. Glen Ford is the member of the European Parliament who commissioned the report.
Mr. GLEN FORD (European Parliament Member): It’s not the–if you want, the Echelon system that’s the problem. It’s how it’s being used. Now, you know, if we’re catching the bad guys, we’re completely in favor of that, whether it’s you catching the bad guys, us or anybody else. We don’t like the bad guys. What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on–on some global deal.
(Footage of encryption machine; Clinton and several men walking; Ford)
KROFT: (Voiceover) Increasingly, European governments and corporations are turning to something called encryption, a system of scrambling phone, fax or e-mail transmissions so that the Echelon system won’t be able to read them. The US is worried about the technology falling into the hands of terrorists or other enemies. The Clinton administration has been trying to persuade the Europeans to give law enforcement and intelligence agencies a key with which they can unlock the code in matters of national security. Glen Ford, the European parliamentarian, agrees it’s a good idea, in principle.
Mr. FORD: However, if we are not assured that that is n–not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In the United Kingdom, it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and–and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.
KROFT: Y–you said that you think that this is basically a good idea, that we have to do this at some…
Mr. FROST: Oh, in a perfect world, we would not need the NSA, we would not need CSE. But, you know, we have to. We have to in the areas of terrorism, drug lords. We–we’d be lost without them. My concern is no accountability and nothing–no safety net in place for the innocent people that fall through the cracks. That’s my concern.
KROFT: Accountability isn’t the only issue that’s of interest to Congress. There is growing concern within the intelligence community that encryption and the worldwide move to fiber-optic cables, which Echelon may not be able to penetrate, will erode the NSA’s ability to gather the intelligence vital to national security. The agency is looking for more money to develop new technologies.
NSA employees spied on their lovers using eavesdropping programme
Staff working at America’s National Security Agency – the eavesdropping unit that was revealed to have spied on millions of people – have used the technology to spy on their lovers.

11:18AM BST 24 Aug 2013
The employees even had a code name for the practice – “Love-int” – meaning the gathering of intelligence on their partners.
Dianne Feinstein, a senator who chairs the Senate intelligence committee, said the NSA told her committee about a set of “isolated cases” that have occurred about once a year for the last 10 years. The spying was not within the US, and was carried out when one of the lovers was abroad.
One employee was disciplined for using the NSA’s resources to track a former spouse, the Associated Press said.
Last week it was disclosed that the NSA had broken privacy rules on nearly 3,000 occasions over a one-year period.
John DeLong, NSA chief compliance officer, said that those errors were mainly unintentional, but that there have been “a couple” of wilful violations in the past decade.
“When we make mistakes, we detect, we correct and we report,” said Mr DeLong.
The NSA issued a statement on Friday saying: “NSA has zero tolerance for wilful violations of the agency’s authorities” and responds “as appropriate.”
Mrs Feinstein said: “Clearly, any case of noncompliance is unacceptable, but these small numbers of cases do not change my view that NSA takes significant care to prevent any abuses and that there is a substantial oversight system in place.
“When errors are identified, they are reported and corrected.”
The extent of American spying on its citizens and foreigners through the NSA and its “Prism” programme were revealed by Edward Snowden, a whistleblower, who fled to Russia where he has claimed temporary asylum.
NSA goes on 60 Minutes: the definitive facts behind CBS’s flawed report

The National Security Agency is telling its story like never before. Never mind whether that story is, well, true.
On Sunday night, CBS’s 60 Minutes ran a remarkable piece that provided NSA officials, from director Keith Alexander to junior analysts, with a long, televised forum to push back against criticism of the powerful spy agency. It’s an opening salvo in an unprecedented push from the agency to win public confidence at a time when both White Housereviews and pending legislation would restrict the NSA’s powers.
But mixed in among the dramatic footage of Alexander receiving threat briefings and junior analysts solving Rubik’s cubes in 90 seconds were a number of dubious claims: from the extent of surveillance to collecting on Google and Yahoo data centers to an online “kill-switch” for the global financial system developed by China.
Reporter John Miller, a former official with the Office of the Director of National Intelligence and an ex-FBI spokesman, allowed these claims to go unchallenged. The Guardian, not so much. Here’s our take:
Surveillance is just about what you say and what you write
If there’s a consistent thread to the NSA’s public defense of itself, it’s that the stuff NSA collects from Americans in bulk doesn’t actually impact their privacy. After all, as Keith Alexander told Miller, it’s just metadata – data about your phone calls, not what you said on the phone.
“There’s no reason that we would listen to the phone calls of Americans,” Alexander told Miller. “There’s no intelligence value in that. There’s no reason that we’d want to read their email. There is no intelligence value in that … How do you know when the bad guy who’s using those same communications that my daughters use, is in the United States trying to do something bad? The least intrusive way of doing that is metadata.”
When Miller said the bulk metadata collection “sounds like spying on Americans”, Alexander replied: “Right, and that’s wrong. That’s absolutely wrong.”
Notice the tension here. It’s the metadata – who you called, who called you, for how long, how frequently you communicate – that has intelligence value, not, in Alexander’s telling, what you actually say on the phone. The NSA is relying for its defense on a public conception of surveillance as the interception of the content of your communications, even while it’s saying that what’s actually important is your network of connections – which the agency is very, very interested in collecting.
Senator Ron Wyden, an intelligence committee member who has emerged as a leading opponent of bulk collection, says the metadata provides NSA with a “human relations database”. For many, surveillance occurs when someone else collects anything on their interactions, movements, or communications, rather than when that other party collects certain kinds of information. And it hardly makes sense to say, as Alexander did, that surveillance on Americans doesn’t occur when NSA collects the sort of information that it believes actually has intelligence value.
Snowden and the NSA’s hiring boom
The NSA, for obvious reasons, isn’t fond of whistleblower Edward Snowden. It portrayed him to 60 Minutes as a weirdo. He wore “a hood that covered the computer screen and covered his head and shoulders”, NSA official Richard Ledgett said. He allegedly stole answers to a test to gain NSA employment and boasted about its hires of young geniuses ready to tackle NSA’s persistent intelligence and data challenges.
The obvious question here is why the NSA considers it exculpatory to say an obvious eccentric was able to abscond with an unprecedented amount of data. That sounds uncomfortably like an admission that the NSA is less able to safeguard its vast storehouses of information than it lets on. Let’s also pause to savor the irony of a spy agency complaining that one of its employees cheated on an employment test. (Meanwhile, for an alternative take on Snowden, an anonymous NSA colleague told Forbes that Snowden was a “genius among geniuses” and said the NSA offered him a job at its elite Tailored Access Operations directorate.)
Then there are all the smart codebreakers, analysts, officials and contractors that make up the NSA’s estimated workforce of 35,000 people. An intelligence agency that large, with a workforce that’s only grown since 9/11, is going to find it increasingly hard to keep data secure from future Edward Snowdens in the next cubicle. The NSA says it’s implementing new measures post-Snowden to limit data access. But even after Snowden, the NSA told the New York Times this weekend it has yet to fully understand the depths of its vulnerabilities.


The Chinese financial sector kill-switch
Among the more eye-opening claims made by NSA is that it detected what CBS terms the “BIOS Plot” – an attempt by China to launch malicious code in the guise of a firmware update that would have targeted computers apparently linked to the US financial system, rendering them pieces of junk.
“Think about the impact of that across the entire globe,” NSA cyber-defense official Debora Plunkett told 60 Minutes. “It could literally take down the US economy.”
There are as many red flags surrounding the BIOS Plot as there are in all of China. First, the vast majority of cyber-intrusions in the US, particularly from China, are espionage operations, in which the culprits exfiltrate data rather than destroy computers. Second, the US economy is too vast, diversified, and chaotic to have a single point of cyber-failure. Third, China’s economy is so tied to the US’s that Beijing would ultimately damage itself by mass-bricking US computers.
Fourth, while malware can indeed turn a computer into scrap metal, no one has ever developed a cyber-weapon with the destructive capability of Plunkett’s scenario.
In 2004, for instance, Berkeley computer-science researcher Nicholas Weaver analyzed vulnerabilities to self-replicating malicious network attacks, including BIOS vulnerabilities, and concluded that a “worst-case worm” could cause “$50bn or more in direct economic damage”. That’s a lot, but not enough to “literally take down” the US economy.
Matt Blaze, a computer and information sciences professor at the University of Pennsylvania, said that BIOS could be overwritten by malware, bricking an unsuspecting computer. But the vagueness of the description of the “BIOS Plot” made him suspicious.
“It would take significant resources – and an extraordinary bit of co-ordination and luck – to actually deploy malware that could do this at scale,” Blaze said.
“And it’s not clear how you’d ‘thwart’ such a scheme if you found out about it if you were NSA, since it’s basically a combination of a large number of vulnerabilities spread among a zillion computers rather than one big problem that can be fixed with a single patch.”
The lack of specificity made cybersecurity expert Robert David Graham dubious that the plot NSA claimed to discover matched the one it described on TV. “All they are doing is repeating what Wikipedia says about BIOS,” Graham blogged, “acting as techie talk layered onto the discussion to make it believable, much like how Star Trek episodes talk about warp cores and Jeffries Tubes.”
NSA isn’t collecting data transiting between Google and Yahoo data centers, except when it is
Since it doesn’t own or operate any of the world’s telecommunications infrastructure, the NSA is significantly dependent on tech and telecommunications companies, such as Google and Yahoo. So when the Washington Post reported, based on Snowden documents, that the NSA intercepts data transiting between Google and Yahoo’s foreign data centers, the companies reacted with horror at what they considered a breach of trust – one that occurred without any court orders.
Alexander pushed back against the Post’s story to 60 Minutes. “That’s not correct. We do target terrorist communications. And terrorists use communications from Google, from Yahoo, and from other service providers. So our objective is to collect those communications no matter where they are. But we’re not going into a facility or targeting Google as an entity or Yahoo as an entity. But we will collect those communications of terrorists that flow on that network.”
If you take away Alexander’s “that’s not correct” line, the rest of his answer sounds remarkably like a confirmation of what the Post reported. “I think he confirmed it, feigning denial,” reporter Barton Gellman tweeted.
Indeed, the Post didn’t say the NSA went into a Google data facility or organized an operation going after Yahoo “as an entity”. Instead, it reported that NSA takes advantage of security vulnerabilities on data from Google and Yahoo customers as the data transits between its centers. The documents published by the Post indicate NSA got 181m records in a single month that way. How many of those were from “terrorists” remains unknown.
The disclosure created a major tension between the two tech giants and NSA, since both companies are involved in the NSA’s Prism effort at collecting foreign online communications, and all sides have said that court orders compel that collection. Google and Yahoo are unhappy about giving NSA data through the front door while the agency collects more through the back. And NSA lawyers have stated publicly that US companies like Google and Yahoo are “US persons”, meaning they have fourth amendment protections that may be implicated in the data-center transit collection.
The NSA wasn’t trying to break the law that got broken
Give Miller credit for at least mentioning that “a judge on the Fisa court” overseeing US surveillance was alarmed that the NSA “systematically transgressed” the agreed-upon limitations on its abilities to query its databases. Alexander’s response: “There was nobody willfully or knowingly trying to break the law.”
Actually, two different Fisa court judges – John Bates and Reggie Walton, the current presiding judge – raised major concerns about the way the NSA searches through its vast data troves on multiple occasions. Bates found that “virtually every” record generated under a now-defunct NSA program that collected Americans’ internet metadata in bulk included information that “was not authorized for collection”.
In a different case, in 2011, Bates assessed that the discovery of thousands of American emails in NSA content databases designed to collect foreign data meant the “volume and nature of the information [NSA] has been collecting is fundamentally different from what the court had been led to believe”.
And for most of 2009, Walton prevented the NSA from searching through its domestic phone data hives because it found “daily” violations of its restrictions.
Very few people think the NSA is staffed by mustache-twirling villains who view the law as an obstacle to be overcome. The real concern is two-fold.
First, even if NSA doesn’t mean to break the law, the way its data dragnets work in practice incline toward overcollection. During a damage-control conference call in August, an anonymous US intelligence official told reporters that the technical problem bothering Bates in 2011 persists today. The NSA even conceded to Walton in 2009 that “from a technical standpoint, there was no single person who had a complete understanding” of the technical “architecture” of NSA’s phone data collection.
Second, there is a fundamental discrepancy in power between the Fisa court and the NSA. The court’s judges have lamented that they possess an inability to independently determine how the NSA’s programs work, and if they’re in compliance with the limits the judges secretly impose. That leaves them at the mercy of NSA, the director of national intelligence, and the Justice Department to self-report violations. When the facts of the collection and the querying are sufficiently divergent from what the court understands – something the court only learns about when it is told – that can become a matter of law.
In other words, it can be simultaneously true that NSA doesn’t intend to break the law and that NSA’s significant technical capabilities break the law anyway. Malice isn’t the real issue. Overbroad tools are. But that’s not something that NSA had to address during its prime-time spotlight inaugurating its publicity tour.
ECHELON Today: The Evolution of an NSA Black Program
Tom Burghardt
GlobalResearch
July 15th, 2013
Reader Views: 478
People are shocked by the scope of secret state spying on their private communications, especially in light of documentary evidence leaked to media outlets by former NSA contractor Edward Snowden.
While the public is rightly angered by the illegal, unconstitutional nature of NSA programs which seize and store data for retrospective harvesting by intelligence and law enforcement officials, including the content of phone calls, emails, geolocational information, bank records, credit card purchases, travel itineraries, even medical records–in secret, and with little in the way of effective oversight–the historical context of how, and why, this vast spying apparatus came to be is often given short shrift.
Revelations about NSA spying didn’t begin June 5, 2013 however, the day when The Guardian published a top secret FISA Court Order to Verizon, ordering the firm turn over the telephone records on millions of its customers “on an ongoing daily basis.”
Before PRISM there was ECHELON: the top secret surveillance program whose all-encompassing “dictionaries” (high-speed computers powered by complex algorithms) ingest and sort key words and text scooped-up by a global network of satellites, from undersea cables and land-based microwave towers.
Past as Prologue
Confronted by a dizzying array of code-named programs, the casual observer will assume the spymasters running these intrusive operations are all-knowing mandarins with their fingers on the pulse of global events.
Yet, if disastrous US policies from Afghanistan and Iraq to the ongoing capitalist economic meltdown tell us anything, it is that the American superpower, in President Nixon’s immortal words, really is “a pitiful, helpless giant.”
In fact, the same programs used to surveil the population at large have also been turned inward by the National Security State against itself and targets military and political elites who long thought themselves immune from such close attention.
Coupled with Snowden’s disclosures, those of former NSA officer Russell Tice (first reported here and here), revealed that the agency–far in excess of the dirt collected by FBI spymaster J. Edgar Hoover in his “secret and confidential” black files–has compiled dossiers on their alleged controllers, for political leverage and probably for blackmail purposes to boot.
While Tice’s allegations certainly raised eyebrows and posed fundamental questions about who is really in charge of American policy–elected officials or unaccountable securocrats with deep ties to private security corporations–despite being deep-sixed by US media, they confirm previous reporting about the agency.
When investigative journalist Duncan Campbell first blew the lid off NSA’s ECHELON program, his 1988 piece for New Statesman revealed that a whistleblower, Margaret Newsham, a software designer employed by Lockheed at the giant agency listening post at Menwith Hill in North Yorkshire, England, stepped forward and told the House Permanent Select Committee on Intelligence in closed session, that NSA was using its formidable intercept capabilities “to locate the telephone or other messages of target individuals.”
Campbell’s reporting was followed in 1996 by New Zealand investigative journalist Nicky Hager’s groundbreaking book, Secret Power, the first detailed account of NSA’s global surveillance system. A summary of Hager’s findings can be found in the 1997 piece that appeared in CovertAction Quarterly.
As Campbell was preparing that 1988 article, a report in the Cleveland Plain Dealer alleged that arch-conservative US Senator Strom Thurman was one target of agency phone intercepts, raising fears in political circles that “NSA has restored domestic, electronic, surveillance programmes,” said to have been dialed-back in the wake of the Watergate scandal.
Ironically enough, congressional efforts to mitigate abuses by the intelligence agencies exposed by the Church and Pike Committees in the 1970s, resulted in the 1978 creation of the Foreign Intelligence Surveillance Court. However, as The New York Times reported July 7, that court “in more than a dozen classified rulings . . . has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans,” a “parallel Supreme Court” whose rulings are beyond legal challenge.
In an 88-page report on ECHELON published in 2000 by the Electronic Privacy Information Center (EPIC) Newsham said that when she worked on the development of SILKWORTH at the secret US base, described as “a system for processing information relayed from signals intelligence satellites,” she told Campbell and other reporters, including CBS News’ 60 Minutes, that “she witnessed and overheard” one of Thurman’s intercepted phone calls.
Like Thomas Drake, the senior NSA official prosecuted by the Obama administration under the 1917 Espionage Act, for information he provided The Baltimore Sun over widespread waste, fraud and abuse in the agency’s failed Trailblazer program, Newsham had testified before Congress and filed a lawsuit against Lockheed over charges of sexual harassment, “corruption and mis-spending on other US government ‘black’ projects.”
A year earlier, in a 1999 on the record interview with the Danish newspaper Ekstra Bladet, Newsham spoke to journalists Bo Elkjaer and Kenan Seeberg, telling them of her “constant fear” that “certain elements” within the US secret state would “try to silence her”; a point not lost on Edward Snowden today.
“As a result,” the newspaper reported, “she sleeps with a loaded pistol under her mattress, and her best friend is Mr. Gunther–a 120-pound German shepherd that was trained to be a guard and attack dog by a good friend in the Nevada State Police.”
“To me,” the whistleblower said, “there are only two issues at stake here: right or wrong. And the longer I worked on the clandestine surveillance projects, the more I could see that they were not only illegal, but also unconstitutional.”
“Even then,” between 1974 and 1984 when she worked on ECHELON, it “was very big and sophisticated.”
“As early as 1979 we could track a specific person and zoom in on his phone conversation while he was communicating,” Newsham averred. “Since our satellites could in 1984 film a postage stamp lying on the ground, it is almost impossible to imagine how all-encompassing the system must be today.”
When queried about “which part of the system is named Echelon,” Newsham told the reporters: “The computer network itself. The software programs are known as SILKWORTH and SIRE, and one of the most important surveillance satellites is named VORTEX. It intercepts things like phone conversations.”
Despite evidence presented in her congressional testimony about these illegal operations, “no substantive investigation took place, and no report was made to Congress,” Campbell later wrote.
“Since then,” the British journalist averred, “investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident, but was designed into the system from the start.” (emphasis added)
This would explain why members of Congress, the federal Judiciary and the Executive Branch itself, as Tice alleges, tread lightly when it comes to crossing NSA. However, as information continues to emerge about these privacy-killing programs it should also be clear that the agency’s prime targets are not “terrorists,” judges or politicians, but the American people themselves.
In fact, as Snowden stated in a powerful message published by WikiLeaks: “In the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised–and it should be.”
How did we get here? Is there a direct line from Cold War-era programs which targeted the Soviet Union and their allies, and which now, in the age of capitalist globalization, the epoch of planet-wide theft and plunder, now targets the entire world’s population?
ECHELON’s Roots: The UKUSA Agreement
Lost in the historical mists surrounding the origins of the Cold War, the close collaboration amongst Britain and the United States as they waged war against Nazi Germany and Imperial Japan, by war’s end had morphed into a permanent intelligence-military alliance which predated the founding of NATO. With the defeat of the Axis powers, a new global division of labor was in the offing led by the undisputed superpower which emerged from the conflagration, the United States.
Self-appointed administrator over Europe’s old colonial holdings across Africa, Asia and the Middle East (the US already viewed Latin America as its private export dumping ground and source for raw materials), the US used its unparalleled position to benefit the giant multinational American firms grown larger and more profitable than ever as a result of wartime economic mobilization managed by the state.
By 1946, the permanent war economy which later came to be known as the Military-Industrial Complex, a semi-command economy directed by corporate executives, based on military, but also on emerging high-tech industries bolstered by taxpayer-based government investments, was already firmly entrenched and formed the political-economic base on which the so-called “American Century” was constructed.
While resource extraction and export market domination remained the primary goal of successive US administrations (best summarized by the slogan, “the business of government is business”), advances in technology in general and telecommunications in particular, meant that the system’s overlords required an intelligence apparatus that was always “on” as it “captured” the flood of electronic signals coursing across the planet.
The secret British and US agencies responsible for cracking German, Japanese and Russian codes during the war found themselves in a quandary. Should they declare victory and go home or train their sights on the new (old) adversary–their former ally, the Soviet Union–but also on home grown and indigenous communist and socialist movements more generally?
In opting for the latter, the UK-US wartime partnership evolved into a broad agreement to share signals and communications intelligence (SIGINT and COMINT), a set-up which persists today.
In 1946, Britain and the United States signed the United Kingdom-United States of America Agreement (UKUSA), a multilateral treaty to share signals intelligence amongst the two nations and Britain’s Commonwealth partners, Canada, Australia and New Zealand. Known as the “Five Eyes” agreement, the treaty was such a closely-guarded secret that Australia’s Prime Minister was kept in the dark until 1973!
In 2010, the British National Archives released previously classified Government Communications Headquarters (GCHQ) files that provide an important historical overview of the agreement. Also in 2010, the National Security Agency followed suit and published formerly classified files from their archives. Accompanying NSA’s release was a 1955 amended version of the treaty.
It’s secretive nature is clearly spelled out: “It will be contrary to this Agreement to reveal its existence to any third party unless otherwise agreed by the two parties.”
In 2005, 2009 and 2013, The National Security Archive published a series of previously classified documents obtained from NSA under the Freedom of Information Act that revealed agency thinking on a range of subjects, from global surveillance to cyberwar.
What we have learned from these sources and reporting by Duncan Campbell and Nicky Hager, are that the five agencies feeding the surveillance behemoth, America’s NSA, Britain’s GCHQ, Canada’s Communications Security Establishment (CSE), Australia’s Defence Signals Directorate (DSD) and New Zealand’s Government Communications Security Bureau (GCSB), are subdivided into first and second tier partners, with the US, as befitting a hyperpower, forming the “1st party” and the UK, Australia, Canada and New Zealand forming “2nd party” partners.
Under terms of UKUSA, intelligence “products” are defined as “01. Collection of traffic. 02. Acquisition of communications documents and equipment. 03. Traffic analysis. 04. Cryptanalysis. 05. Decryption and translation. 06. Acquisition of information regarding communications organizations, procedures, practices and equipment.”
“Such exchange,” NSA informed us, “will be unrestricted on all work undertaken except when specifically excluded from the agreement at the request of either party and with the agreement of the other.”
“It is the intention of each party,” we’re told, “to limit such exceptions to the absolute minimum and to exercise no restrictions other than those reported and mutually agreed upon.”
This certainly leaves wide latitude for mischief as we learned with the Snowden disclosures.
Amid serious charges that “Five Eyes” were illegally seizing industrial and trade secrets from “3rd party” European partners such as France and Germany, detailed in the European Parliament’s 2001 ECHELON report, it should be clear by now that since its launch in 1968 when satellite communications became a practical reality, ECHELON has evolved into a global surveillance complex under US control.
The Global Surveillance System Today
The echoes of those earlier secret programs reverberate in today’s headlines.
Last month, The Guardian reported that the “collection of traffic” cited in UKUSA has been expanded to GCHQ’s “ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.”
Then on July 6, The Washington Post disclosed that NSA has tapped directly into those fiber optic cables, as AT&T whistleblower Mark Klein described to Wired Magazine in 2006, and now scoops-up petabyte scale communications flowing through the US internet backbone. The agency was able to accomplish this due to the existence of “an internal corporate cell of American citizens with government clearances.”
“Among their jobs documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.”
Following up on July 10, the Post published a new PRISM slide from the 41-slide deck provided to the paper by Edward Snowden.
The slide revealed that “two types of collection” now occur. One is the PRISM program that collects information from technology firms such as Google, Apple and Microsoft. The second source is “a separate category labeled ‘Upstream,’ described as accessing ‘communications on fiber cables and infrastructure as data flows past’.”
Recently, Der Spiegel, reported that NSA averred the agency “does NOT target its 2nd party partners, nor request that 2nd parties do anything that is inherently illegal for NSA to do.” This is an outright falsehood exposed by former Canadian Communications Security Establishment (CSE) officer Mike Frost.
In a 1997 CovertAction Quarterly exposé, Frost recounted how “CSE operated alone or joined with NSA or GCHQ to: intercept communications in other countries from the confines of Canadian embassies around the world with the knowledge of the ambassador; aid politicians, political parties, or factions in an allied country to gain partisan advantage; spy on its allies; spy on its own citizens; and perform ‘favors’ that helped its allies evade domestic laws against spying.”
“Throughout it all,” Frost insisted, “I was trained and controlled by US intelligence which told us what to do and how to do it.”
Everyone else, Der Spiegel reports, is fair game. “For all other countries, including the group of around 30 nations that are considered to be 3rd party partners, however, this protection does not apply. ‘We can, and often do, target the signals of most 3rd party foreign partners,’ the NSA boasts in an internal presentation.”
It should also be clear that targeting isn’t strictly limited to the governments and economic institutions of “3rd party foreign partners,” but extends to the private communications of their citizens. Der Spiegel, citing documents supplied by Snowden, reported that the agency “gathered metadata from some 15 million telephone conversations and 10 million Internet datasets.” The newsmagazine noted that “the Americans are collecting from up to half a billion communications a month in Germany,” describing the surveillance as “a complete structural acquisition of data.”
Despite hypocritical protests by European governments, on the contrary, Snowden disclosed that those “3rd party” partners are joined at the hip with their “Five Eyes” cousins.
In a recent interview with Der Spiegel, Snowden was asked if “German authorities or German politicians [are] involved in the NSA surveillance system?”
“Yes, of course. We’re in bed together with the Germans the same as with most other Western countries. For example, we tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hacker’s girlfriend in a totally unrelated third country–and they hand them over to us. They don’t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously they’re violating global privacy.”
Disclosing new information on how UKUSA functions today, Snowden told the German newsmagazine: “In some cases, the so-called Five Eye Partners go beyond what NSA itself does. For instance, the UK’s General [sic] Communications Headquarters (GCHQ) has a system called TEMPORA.”
“TEMPORA,” the whistleblower averred, “is the signals intelligence community’s first ‘full-take’ Internet buffer that doesn’t care about content type and pays only marginal attention to the Human Rights Act. It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit.”
“Right now,” Snowden said, “the buffer can hold three days of traffic, but that’s being improved. Three days may not sound like much, but remember that that’s not metadata. ‘Full-take’ means it doesn’t miss anything, and ingests the entirety of each circuit’s capacity. If you send a single ICMP packet and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughter’s medical records get processed at a London call center . . . well, you get the idea.”
We do; and thanks to Edward Snowden we now know that everyone is a target.
Delivered by The Daily Sheeple
– See more at: http://www.thedailysheeple.com/echelon-today-the-evolution-of-an-nsa-black-program_072013#sthash.lpYdYXqA.dpuf