U.S. Says It Gathers Online Data Abroad

Sergic08

Longterm Registered User
U.S. Says It Gathers Online Data Abroad
By Charlie Savage, Edward Wyatt and Peter Baker

The federal government has been secretly collecting information on foreigners overseas for nearly six years from the nation’s largest Internet companies like Google, Facebook and, most recently, Apple, in search of national security threats, the director of national intelligence confirmed Thursday night.

The confirmation of the classified program came just hours after government officials acknowledged a separate seven-year effort to sweep up records of telephone calls inside the United States. Together, the unfolding revelations opened a window into the growth of government surveillance that began under the Bush administration after the terrorist attacks of Sept. 11, 2001, and has clearly been embraced and even expanded under the Obama administration.

Government officials defended the two surveillance initiatives as authorized under law, known to Congress and necessary to guard the country against terrorist threats. But an array of civil liberties advocates and libertarian conservatives said the disclosures provided the most detailed confirmation yet of what has been long suspected about what the critics call an alarming and ever-widening surveillance state.

The Internet surveillance program collects data from online providers including e-mail, chat services, videos, photos, stored data, file transfers, video conferencing and log-ins, according to classified documents obtained and posted by The Washington Post and then The Guardian on Thursday afternoon.

In confirming its existence, officials said that the program, called Prism, is authorized under a foreign intelligence law that was recently renewed by Congress, and maintained that it minimizes the collection and retention of information “incidentally acquired†about Americans and permanent residents. Several of the Internet companies said they did not allow the government open-ended access to their servers but complied with specific lawful requests for information.

“It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States,†James Clapper, the director of national intelligence, said in a statement, describing the law underlying the program. “Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.â€

The Prism program grew out of the National Security Agency’s desire several years ago to begin addressing the agency’s need to keep up with the explosive growth of social media, according to people familiar with the matter.

The dual revelations, in rapid succession, also suggested that someone with access to high-level intelligence secrets had decided to unveil them in the midst of furor over leak investigations. Both were reported by The Guardian, while The Post, relying upon the same presentation, almost simultaneously reported the Internet company tapping. The Post said a disenchanted intelligence official provided it with the documents to expose government overreach.

Before the disclosure of the Internet company surveillance program on Thursday, the White House and Congressional leaders defended the phone program, saying it was legal and necessary to protect national security.

Josh Earnest, a White House spokesman, told reporters aboard Air Force One that the kind of surveillance at issue “has been a critical tool in protecting the nation from terror threats as it allows counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.†He added: “The president welcomes a discussion of the trade-offs between security and civil liberties.â€

The Guardian and The Post posted several slides from the 41-page presentation about the Internet program, listing the companies involved — which included Yahoo, Microsoft, Paltalk, AOL, Skype and YouTube — and the dates they joined the program, as well as listing the types of information collected under the program.

The reports came as President Obama was traveling to meet President Xi Jinping of China at an estate in Southern California, a meeting intended to address among other things complaints about Chinese cyberattacks and spying. Now that conversation will take place amid discussion of America’s own vast surveillance operations.

But while the administration and lawmakers who supported the telephone records program emphasized that all three branches of government had signed off on it, Anthony Romero of the American Civil Liberties Union denounced the surveillance as an infringement of fundamental individual liberties, no matter how many parts of the government approved of it.

“A pox on all the three houses of government,†Mr. Romero said. “On Congress, for legislating such powers, on the FISA court for being such a paper tiger and rubber stamp, and on the Obama administration for not being true to its values.â€

Others raised concerns about whether the telephone program was effective.

Word of the program emerged when The Guardian posted an April order from the secret foreign intelligence court directing a subsidiary of Verizon Communications to give the N.S.A. “on an ongoing daily basis†until July logs of communications “between the United States and abroad†or “wholly within the United States, including local telephone calls.â€

On Thursday, Senators Dianne Feinstein of California and Saxby Chambliss of Georgia, the top Democrat and top Republican on the Intelligence Committee, said the court order appeared to be a routine reauthorization as part of a broader program that lawmakers have long known about and supported.

“As far as I know, this is an exact three-month renewal of what has been the case for the past seven years,†Ms. Feinstein said, adding that it was carried out by the Foreign Intelligence Surveillance Court “under the business records section of the Patriot Act.â€

“Therefore, it is lawful,†she said. “It has been briefed to Congress.â€

While refusing to confirm or to directly comment on the reported court order, Verizon, in an internal e-mail to employees, defended its release of calling information to the N.S.A. Randy Milch, an executive vice president and general counsel, wrote that “the law authorizes the federal courts to order a company to provide information in certain circumstances, and if Verizon were to receive such an order, we would be required to comply.â€

Sprint and AT&T have also received demands for data from national security officials, according to people familiar with the requests. Those companies as well as T-Mobile and CenturyLink declined to say Thursday whether they were or had been under a similar court order.

Lawmakers and administration officials who support the phone program defended it in part by noting that it was only for “metadata†— like logs of calls sent and received — and did not involve listening in on people’s conversations.

The Internet company program appeared to involve eavesdropping on the contents of communications of foreigners. The senior administration official said its legal basis was the so-called FISA Amendments Act, a 2008 law that allows the government to obtain an order from a national security court to conduct blanket surveillance of foreigners abroad without individualized warrants even if the interception takes place on American soil.

The law, which Congress reauthorized in late 2012, is controversial in part because Americans’ e-mails and phone calls can be swept into the database without an individualized court order when they communicate with people overseas. While the newspapers portrayed the classified documents as indicating that the N.S.A. obtained direct access to the companies’ servers, several of the companies — including Google, Facebook, Microsoft and Apple — denied that the government could do so. Instead, the companies have negotiated with the government technical means to provide specific data in response to court orders, according to people briefed on the arrangements.

“Google cares deeply about the security of our users’ data,†the company said in a statement. “We disclose user data to government in accordance with the law and we review all such requests carefully. From time to time, people allege that we have created a government ‘backdoor’ into our systems, but Google does not have a ‘backdoor’ for the government to access private user data.â€

While murky questions remained about the Internet company program, the confirmation of the calling log program solved a mystery that has puzzled national security legal policy observers in Washington for years: why a handful of Democrats on the Senate Intelligence Committee were raising cryptic alarms about Section 215 of the Patriot Act, the law Congress enacted after the 9/11 attacks.

Section 215 made it easier for the government to obtain a secret order for business records, so long as they were deemed relevant to a national security investigation.

Section 215 is among the sections of the Patriot Act that have periodically come up for renewal. Since around 2009, a handful of Democratic senators briefed on the program — including Ron Wyden of Oregon — have sought to tighten that standard to require a specific nexus to terrorism before someone’s records could be obtained, while warning that the statute was being interpreted in an alarming way that they could not detail because it was classified.

On Thursday, Mr. Wyden confirmed that the program is what he and others have been expressing concern about. He said he hoped the disclosure would “force a real debate†about whether such “sweeping, dragnet surveillance†should be permitted — or is even effective.

But just as efforts by Mr. Wyden and fellow skeptics, including Senators Richard J. Durbin of Illinois and Mark Udall of Colorado, to tighten standards on whose communications logs could be obtained under the Patriot Act have repeatedly failed, their criticism was engulfed in a clamor of broad, bipartisan support for the program.

“If we don’t do it,†said Senator Lindsey Graham, Republican of South Carolina, “we’re crazy.â€

And Representative Mike Rogers, Republican of Michigan and the chairman of the House Intelligence Committee, claimed in a news conference that the program helped stop a significant domestic terrorist attack in the United States in the last few years. He gave no details.

It has long been known that one aspect of the Bush administration’s program of surveillance without court oversight involved vacuuming up communications metadata and mining the database to identify associates — called a “community of interest†— of a suspected terrorist.

In December 2005, The New York Times revealed the existence of elements of that program, setting off a debate about civil liberties and the rule of law. But in early 2007, Alberto R. Gonzales, tn the attorney general, announced that after months of extensive negotiation, the Foreign Intelligence Surveillance Court had approved “innovative†and “complex†orders bringing the surveillance programs under its authority.
 
Is this a surprise? US government is all over sites such as this gathering intelligence. I bet if the admin looks at the server logs he will find lots of IP addresses that on a lookup will return unknown.unknown, there will be IP address when looked up are not assigned to a network and there will be hits from US .gov addresses including innocuous ones like voa. It's automated and has been in place for many years. This is how some people outside the United States expressing implied hostility to the United States suddenly find temselves on no fly lists.
 
[video=youtube;5yB3n9fu-rM]http://www.youtube.com/watch?v=5yB3n9fu-rM&feature=player_embedded[/video]

Edward Snowden comes forward as source of NSA leaks
By Barton Gellman, Aaron Blake and Greg Miller

A 29-year-old man who says he is a former undercover CIA employee said Sunday that he was the principal source of recent disclosures about *top-secret National Security Agency programs, exposing himself to possible prosecution in an acknowledgment that had little if any precedent in the long history of U.S. intelligence leaks.

Edward Snowden, a tech specialist who has contracted for the NSA and works for the consulting firm Booz Allen Hamilton, unmasked himself as a source after a string of stories in The Washington Post and the Guardian that detailed previously unknown U.S. surveillance programs. He said he disclosed secret documents in response to what he described as the systematic surveillance of innocent citizens.

In an interview Sunday, Snowden said he is willing to face the consequences of exposure.

“I’m not going to hide,†Snowden told The Post from Hong Kong, where he has been staying. “Allowing the U.S. government to intimidate its people with threats of retaliation for revealing wrongdoing is contrary to the public interest.â€

Asked whether he believes that his disclosures will change anything, he said: “I think they already have. Everyone everywhere now understands how bad things have gotten — and they’re talking about it. They have the power to decide for themselves whether they are willing to sacrifice their privacy to the surveillance state.â€

Snowden said nobody had been aware of his actions, including those closest to him. He said there was no single event that spurred his decision to leak the information, but he said President Obama has failed to live up to his pledges of transparency.

“My sole motive is to inform the public as to that which is done in their name and that which is done against them,†he said in a note that accompanied the first document he leaked to The Post.

The Guardian was the first to publicly identify Snowden, at his request.

The White House said late Sunday that it would not have any comment on the matter.

In a brief statement, a spokesman for the Office of the Director of National Intelligence said the intelligence community is “reviewing the damage†the leaks have done. “Any person who has a security clearance knows that he or she has an obligation to protect classified information and abide by the law,†said the spokesman, Shawn Turner.

Snowden said he is seeking “asylum from any countries that believe in free speech and oppose the victimization of global privacy,†but the law appears to provide for his extradition from Hong Kong, a semiautonomous territory of China, to the United States.

Although any extradition proceeding could take months or even years, experts said Snowden has not put himself in a favorable position.

“The fact that he outed himself and basically said, from what I understand he has said, ‘I feel very comfortable with what I have done’ . . . that’s not going to help him in his extradition contest,†said Douglas McNabb, a lawyer and extradition expert.

The Justice Department said it is in the “initial stages of an investigation†into the unauthorized disclosure of classified information but declined to comment further.

A stunning revelation

Current and former U.S. intelligence officials said the revelation of Snowden’s role in the leaks will lead to a sweeping reexamination of security measures at the CIA and the NSA, and they described his decision to come forward as a stunning conclusion to a week of disclosures that rattled the intelligence community.

“This is significant on a number of fronts: the scope, the range. It’s major, it’s major,†said John Rizzo, a former general counsel of the CIA who worked at the agency for decades. “And then to have him out himself . . . I can’t think of any previous leak case involving a CIA officer where the officer raised his hand and said, ‘I’m the guy.’ â€

A half-dozen former intelligence officials, including one who now works at Booz Allen Hamilton, said they did not know Snowden or anything about his background. Several former officials said he easily could have been part of a surge in computer experts and technical hires brought in by the CIA in the years after the Sept. 11, 2001, attacks as its budget and mission swelled.

“Like a lot of things after 9/11, they just went on a hiring binge, and in the technical arena young, smart nerds were in high demand,†a former U.S. intelligence official said. “There were battalions of them.â€

Officials said the CIA and other spy agencies did not relax their screening measures as the workforce expanded. Still, several officials said the CIA will now undoubtedly begin reviewing the process by which Snowden may have been hired, seeking to determine whether there were any missed signs that he might one day betray national secrets.

More broadly, the CIA and the NSA may be forced to reexamine their relationships with contractors, who were employed in roles ranging from technical support to paramilitary operations before concerns about the outsourcing of such sensitive assignments prompted a backlash in Congress and pledges from the agencies to begin thinning their contracting ranks.

Some former CIA officials said they were troubled by aspects of Snowden’s background, at least as he described it to The Post and the Guardian.

For instance, Snowden said he did not have a high school diploma. One former CIA official said that it was extremely unusual for the agency to have hired someone with such thin academic credentials, particularly for a technical job, and that the terms Snowden used to describe his agency positions did not match internal job descriptions.

Snowden’s claim to have been placed under diplomatic cover for a position in Switzerland after an apparently brief stint at the CIA as a systems administrator also raised suspicion. “I just have never heard of anyone being hired with so little academic credentials,†the former CIA official said. The agency does employ technical specialists in overseas stations, the former official said, “but their breadth of experience is huge, and they tend not to start out as systems administrators.â€

A former senior U.S. intelligence official cited other puzzling aspects of Snowden’s account, questioning why a contractor for Booz Allen at an NSA facility in Hawaii would have access to something as sensitive as a court order from the Foreign Intelligence Surveillance Court.

“I don’t know why he would have had access to those . . . orders out in Hawaii,†the former official said.

The Guardian initially reported the existence of a program that collects data on all phone calls made on the Verizon network. Later in the week, the Guardian and The Post reported the existence of a separate program, code-named PRISM, that collects the Internet data of foreigners from major Internet companies.

Snowden expressed hope that the NSA surveillance programs will now be open to legal challenge for the first time. This year, in Amnesty International v. Clapper, the Supreme Court dismissed a lawsuit against the mass collection of phone records because the plaintiffs could not prove exactly what the program did or that they were personally subject to surveillance.

“The government can’t reasonably assert the state-secrets privilege for a program it has acknowledged,†Snowden said.

Journalists criticized

Snowden’s name surfaced as top intelligence officials in the Obama administration and Congress pushed back against the journalists responsible for revealing the existence of sensitive surveillance programs and called for an investigation into the leaks.

Clapper, in an interview with NBC that aired Saturday night, condemned the leaker’s actions but also sought to spotlight the journalists who first reported the programs, calling their disclosures irresponsible and full of “hyperbole.†Earlier Saturday, he issued a statement accusing the media of a “rush to publish.â€

“For me, it is literally — not figuratively — literally gut-wrenching to see this happen because of the huge, grave damage it does to our intelligence capabilities,†Clapper said.

On Sunday morning, before Snowden’s unmasking, House Intelligence Committee Chairman Mike Rogers (R-Mich.) had harsh words for the leaker and for the journalist who first reported the NSA’s collection of phone records, the Guardian’s Glenn Greenwald.

Greenwald “doesn’t have a clue how this thing works; neither did the person who released just enough information to literally be dangerous,†Rogers said on ABC’s “This Week,†adding: “I absolutely think [the leaker] should be prosecuted.â€

Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) agreed that whoever leaked the information should be prosecuted, and she sought to beat back media reports suggesting that the Obama administration overplayed the impact of the programs.

After opponents of the programs questioned their value last week, anonymous administration officials pointed to the thwarting of a bomb plot targeting the New York City subway system in 2009. Soon after, though, reporters noted that public documents suggested that regular police work was responsible for thwarting the attack, rather than a secret government intelligence program.

Feinstein said the programs were valuable in both the New York case and in another involving an American plotting to bomb a hotel in India in 2008. She noted that she could talk about those two cases because they have been declassified, but she suggested that the surveillance programs also assisted in other terrorism-related cases.

A chief critic of the efforts, Sen. Rand Paul (R-Ky.), said he is considering filing a lawsuit against the governme and called on 10 million Americans to join in.

“I’m going to be asking all the Internet providers and all of the phone companies, ask your customers to join me in a class-action lawsuit,†Paul said on “Fox News Sunday.â€
 
This guy SNOWDEN is an "arse wipe whinning legend in his own mind"!
First off his claim to be a former CIA under cover operative is BS. The reality is, he was a high school dropout and eventually acquiring a GED diploma. He eventually entered the US Army and breaks his leg. Instead of the US Army keeping him on a medical hold and retaining him, they dumped his sorry arse out!
If he was a "hi speed low drag' operative in the Army, the CIA would have told him to grab himself a real college education, graduate and come see them for a job. The closet thing this computer nerd got to chasing bad guys was playing "Call to Duty" computer games.
Now he's hanging out in China, the cyber poaching capital of the world. SNOWDEN is nothing more than a self serving member of the "Me Generation". Lets not forget, while he is hanging out in China and having his brains picked by the Chinese, he's a F'n defector! Rant Over- Barc out


Don't mess with Old Guys.... Age and Treachery will always overcome youth and skill!
BS and Brilliance only comes with Age and Experience.
 
Sorry am I missing something, where's the surprise.?

Excuse me OJ, who said there was a surprise? Oh... do you mean you expected us to welcome you back with one? Gee, sorry about that, I'll have to talk to Vis to see if he can recommend a suitable nice gadget to match your famous umbrella. :)
 
"Now he's hanging out in China, the cyber poaching capital of the world. "

It's quite possible that the Chinese are debating whether Snowden has any real knowledge that could assist their computer hacking efforts. If YES - they may let hime stay in Hong Kong. But I'd be inclined to think the actual answer is NO .. in which case they will quickly put him on a plane out of there.

KL
 
Back
Top