Posts

By Cracking Cellphone Code, NSA has Capacity for Decoding Private Conversations

Photo Credit: AP

Photo Credit: AP

The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day.

While the military and law enforcement agencies long have been able to hack into individual cellphones, the NSA’s capability appears to be far more sweeping because of the agency’s global signals collection operation. The agency’s ability to crack encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.

U.S. law prohibits the NSA from collecting the content of conversations between Americans without a court order. But experts say that if the NSA has developed the capacity to easily decode encrypted cellphone conversations, then other nations likely can do the same through their own intelligence services, potentially to Americans’ calls, as well.

Encryption experts have complained for years that the most commonly used technology, known as A5/1, is vulnerable and have urged providers to upgrade to newer systems that are much harder to crack. Most companies worldwide have not done so, even as controversy has intensified in recent months over NSA collection of cellphone traffic, including of such world leaders as German Chancellor Angela Merkel.

The extent of the NSA’s collection of cellphone signals and its use of tools to decode encryption are not clear from a top-secret document provided by former contractor Edward Snowden. But it states that the agency “can process encrypted A5/1” even when the agency has not acquired an encryption key, which unscrambles communications so that they are readable.

Read more from this story HERE.

Americans’ Personal Data Shared with CIA, IRS, Others in Security Probe

Photo Credit: MELINA YINGLING AND DANNY DOUGHERTY — MCTU.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.

Federal officials gathered the information from the customer records of two men who were under criminal investigation for purportedly teaching people how to pass lie detector tests. The officials then distributed a list of 4,904 people – along with many of their Social Security numbers, addresses and professions – to nearly 30 federal agencies, including the Internal Revenue Service, the CIA, the National Security Agency and the Food and Drug Administration.

Although the polygraph-beating techniques are unproven, authorities hoped to find government employees or applicants who might have tried to use them to lie during the tests required for security clearances. Officials with multiple agencies confirmed that they’d checked the names in their databases and planned to retain the list in case any of those named take polygraphs for federal jobs or criminal investigations.

It turned out, however, that many people on the list worked outside the federal government and lived across the country. Among the people whose personal details were collected were nurses, firefighters, police officers and private attorneys, McClatchy learned. Also included: a psychologist, a cancer researcher and employees of Rite Aid, Paramount Pictures, the American Red Cross and Georgetown University.

Moreover, many of them had only bought books or DVDs from one of the men being investigated and didn’t receive the one-on-one training that investigators had suspected. In one case, a Washington lawyer was listed even though he’d never contacted the instructors. Dozens of others had wanted to pass a polygraph not for a job, but for a personal reason: The test was demanded by spouses who suspected infidelity.

Read more from this story HERE.

Privacy Becomes a Conservative Cause

Photo Credit: APAs Congress takes a closer look at Internet privacy with this week’s Federal Trade Commission oversight hearing in the House, conservatives have a unique opportunity.

Privacy used to be a dirty word among many conservatives because the liberal Warren Court of the 1960s used concepts such as “penumbras” – words not expressly found in the Constitution — to overturn state laws that protected traditional moral precepts or valid law enforcement.

In recent years, however, beginning with the passage of the USA Patriot Act during the George W. Bush years, but expanded seemingly without limit under Barack Obama, conservatives have awakened to the threat of the massive surveillance state.

Some of the leading Republican presidential prospects are taking a hatchet to the Obama administration over the scandal. Sen. Rand Paul (R-Ky.) has introduced a bill to rein in the National Security Agency’s sweeping powers, and Sen. Ted Cruz (R-Texas) recently knocked President Obama for allowing an “unprecedented and intrusive surveillance system” to take hold, eroding Americans’ privacy rights.

House conservatives have joined the fight, too. An amendment to shut down the NSA’s sweeping Internet and phone data collection programs sponsored by Rep. Justin Amash (R-Mich.) was narrowly defeated after leadership stepped in to vote it down. And just recently, Rep. Marsha Blackburn (R.-Tenn.), a Tea Party favorite, resumed a series of briefings focused on the growing threats to privacy and the collection of personal data.

Read more from this story HERE.

Get Ready to Talk About your Meds, Guns and Lifestyle

Photo Credit: WND Americans are increasing their calls for lawmakers to fight Obamacare because of worries over an abundance of personal information that soon will be in the government’s hands.

The Healthcare.gov website calls for information such as name, address, Social Security number and income, while Obamacare will implement online medical records that include details about ailments, conditions, mental state, drug use, gun ownership and other personal details.

That has people worried that the sum total of information could be mishandled by the government, or worse yet, be let loose. There were more than 12.6 million victims of identity theft in the U.S. last year, and the federal government’s collection of Americans’ personal health and financial data offers a treasure trove of possibilities for criminals.

This week, the Los Angeles Times reported an Alahambra, Calif., medical clinic admitted that two laptops that contained more than 700,000 patient medical records were stolen during an office break-in.

The thieves have not been caught.

Read more from this story HERE.

A Government of Secrecy and Fear

Photo Credit: APEvery American who values the rights to life, liberty and the pursuit of happiness, every American who enjoys the right to be different and the right to be left alone, and every American who believes that the government works for us and we don’t work for the government should thank Edward Snowden for his courageous and heroic revelations of the National Security Agency’s gargantuan spying operations. Without Snowden’s revelations, we would be ignorant children to a paternalistic government and completely in the dark about what the government sees of us and knows about us. And we would not know that it has stolen our freedoms.

When I saw Snowden’s initial revelation — a two-page order signed by a federal judge on the FISA court — I knew immediately that Snowden had a copy of a genuine top-secret document that even the judge who signed it did not have. The NSA reluctantly acknowledged that the document was genuine and claimed that all its snooping on the 113,000,000 Verizon customers covered by that order was lawful because it had been authorized by that federal judge. The NSA also claims that as a result of its spying, it has kept us safe.

I reject the argument that the government is empowered to take our liberties — here, the right to privacy — by majority vote or by secret fiat as part of an involuntary collective bargain that it needs to monitor us in private in order to protect us in public. The government’s job is to keep us free and safe. If it keeps us safe but not free, it is not doing its job.

Since the revelations about Verizon, we have learned that the NSA has captured and stored in its Utah computers the emails, texts, telephone conversations, utility bills, bank statements, credit card statements and digital phone books of everyone in America for the past two and a half years. It also has captured hundreds of millions of phone records in Brazil, France, Germany and Mexico — all U.S. allies — and it has shared much of the seized raw American data with intelligence agencies in Great Britain and Israel. Its agents have spied on their girlfriends and boyfriends literally thousands of times, and they have combed the collected raw data and selectively revealed some of it to law enforcement. All of this directly contradicts the Constitution.

Read more from this story HERE.

NSA Monitored Calls of 35 World Leaders after US Official Handed Over Contacts

Photo Credit: Guardian The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden.

The confidential memo reveals that the NSA encourages senior officials in its “customer” departments, such the White House, State and the Pentagon, to share their “Rolodexes” so the agency can add the phone numbers of leading foreign politicians to their surveillance systems.

The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately “tasked” for monitoring by the NSA.

The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel on Wednesday accused the US of tapping her mobile phone.

After Merkel’s allegations became public, White House press secretary Jay Carney issued a statement that said the US “is not monitoring and will not monitor” the German chancellor’s communications. But that failed to quell the row, as officials in Berlin quickly pointed out that the US did not deny monitoring the phone in the past.

Read more from this story HERE.

NSA Collects Millions of E-mail Address Books Globally

Photo Credit: Social BIz SolutionsThe National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.

The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.

Rather than targeting individual users, the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets.

During a single day last year, the NSA’s Special Source Operations branch collected 444,743 e-mail address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, according to an internal NSA PowerPoint presentation. Those figures, described as a typical daily intake in the document, correspond to a rate of more than 250 million a year.

Each day, the presentation said, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts.

Read more from this story HERE.

Welcome to the Era of Unlimited Government!

Photo Credit: Reason.comTelling coincidence that the latest scandalous revelation about the National Security Agency (NSA) is hitting the front pages just as the enrollment period specified by the Affordable Care Act (ACA, a.k.a. Obamacare) is getting started.

Each of these things underscores different but related aspects of the virtually unlimited state that has ruined the peaceful slumber of libertarian-minded Americans for decades. Whether we’re talking about surveilling citizens without any sort of serious legal oversight or forcing them to participate in economic activity in the name of health care über alles, the answer always seems to favor the growth and power of the state to control more and more aspects of our lives. Is it any wonder that a record-high percentage of Americans think the federal government is too powerful?

In an explosive story, The New York Times detailed the ways in which the NSA, which was originally supposed to spy on communications among foreign agents and provide intelligence on threats posed by noncitizen actors and governments, is increasingly focused on domestic activities. Since 2010, according to an NSA memo obtained by the Times, “The agency was authorized [by officials in the Obama administration] to conduct ‘large-scale graph analysis on very large sets of communications metadata without having to check foreignness’ of every e-mail address, phone number or other identifier.”

Through a process known as “contact chaining,” the NSA is able to suck up all sorts of email addresses, phone numbers, social-media-network information, and more without regard to the physical location or citizenship of each data point. The agency, reports the Times, then “enriches” that metadata “with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information,” and more. The result, as George Washington University law professor Orin Kerr puts it, is “the digital equivalent of tailing a suspect.”

The only restriction on the practice appears to be that the NSA must make a claim that their data-gathering serves a foreign-policy justification. Which is never a problem for the agency since, as a spokesperson told the Times, “All of NSA’s work has a foreign intelligence purpose.” While it’s clear that the contact chaining results in vast webs of information that rope in Americans completely uninvolved in terrorism, the NSA refuses to divulge any relevant numbers or incidents.

Read more from this story HERE.

Kentucky Obamacare Marketplace: WARNING: No Explicit or Implicit Expectation of Privacy

Photo Credit: Free Beacon

Photo Credit: Free Beacon

The Kentucky Obamacare marketplace has no “expectation of privacy,” warning its prospective customers that their information can be monitored and shared with government bureaucrats.

When clicking “let’s get started” on the state-run health insurance marketplace “kynect,” the user is quickly prompted to a “WARNING NOTICE.”

“This is a government computer system and is the property of the Commonwealth of Kentucky,” it states. “It is for authorized use only regardless of time of day, location or method of access. “

“Users (authorized or unauthorized) have no explicit or implicit expectation of privacy,” the disclaimer reads. “Any or all uses of this system and all files on the system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized state government and law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign.”

Such information includes Social Security numbers. When calling kynect to enroll in the marketplace a person is told to have their Social Security card, immigration status, pay stubs, alimony payments, student loan information, and current health insurance information at the ready.

Read more from this story HERE.

NSA and GCHQ Target Tor Network that Protects Anonymity of Web Users

Photo Credit: Felix Clay

Photo Credit: Felix Clay

The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.

Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency’s current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers, including access to files, all keystrokes and all online activity.

But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled ‘Tor Stinks’, states: “We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

Another top-secret presentation calls Tor “the king of high-secure, low-latency internet anonymity”.

Tor – which stands for The Onion Router – is an open-source public project that bounces its users’ internet traffic through several other computers, which it calls “relays” or “nodes”, to keep it anonymous and avoid online censorship tools.

Read more from this story HERE.