Archive for the ‘NSA’ Category

NSA whistleblower shows how candidate Trump could have been wiretapped – American Thinker (blog)

A former top intelligence official-turned-whistleblowerat the National Security Agency says surveillance programs by the NSA could have been keeping tabs on the Trump campaign and that their intelligence could have been shared with other agencies.

William Binney, a legend at the NSA, laid out the case for warrantless wiretapping of Trump Tower and how other intel agencies like the CIA could have had access to the wiretaps.

Fox News national security correspondent James Rosen himself bugged by the Obama administration says Trump may be right:

ZeroHedge Blog:

Washington's Blog asked the highest-level NSA whistleblower in history - Bill Binney - whether he thought Trump had been bugged.

Binney is the NSA executive whocreatedthe agencys mass surveillance program for digital information, who served as theseniortechnical director within the agency, who managedsix thousandNSA employees.

He was a 36-year NSA veteran widely regarded as a legend within the agency and the NSAsbest-everanalyst and code-breaker.

Binney also mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (in the 1970s, he decrypted the Soviet Unions command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons).

Binney told Washington's Blog:

NSA has all the data through the Upstream programs (Fairview/Stormbrew/Blarney) [background] and backed up by second and some third party country collection.

Plus the FBI and CIA plus others, as of the last month of the Obama administration, have direct access to all the NSA collection (metadata and content on phones,email and banking/credit cards etc.) with no attempt at oversight by anybody [background]. This is all done under Executive Order 12333 [the order whichallows unlimited spyingno matter what intelligence officials claim] ....

FBI would only ask for a warrant if they wanted to be able to take it into court at some point given they have something meaningful as evidence. This is clearly true given the fact the President Trump's phone conversations with other country leaders were leaked to the mainstream media.

In other words, Binney is saying that Trumps phoneswerebugged by the NSA without a warrant - remember, top NSA whistleblowers have previously explained that the NSA is spying onvirtuallyallof the digital communications of Americans. - and the NSA shared the raw data with the CIA, FBI and other agencies.

If the FBI obtained a warrant to tap Trump's phone, it was a "parallel construction" to "launder" improperly-gained evidence through acceptable channels.

As we've previouslyexplained:

The government islaundering information gained through mass surveillancethrough other agencies, with an agreement that the agencies willrecreate the evidence in a parallel construction so they dont have to admit that the evidence came from unconstitutional spying. This data laundering is gettingworseandworse.

So does it mean that the NSA spying on Trump Tower actually turned up some dirt?

Maybe ...

Binney has no direct knowledge of any surveillance of Trump Tower. What he has is a roadmap for how it could have been done. He also shows the likelihood that agencies could have used whatever information was captured by the NSA's information dragnet.

A couple of caveats. First, Obama's executive order allowing other intel agencies access to the NSA's raw data was signed after the campaign was over. That doesn't mean that any wiretapped information from the Trump campaign wasn't gathered or even shared by NSA. It means that it is less likely thatintelligence agencies hadaccess to Trump campaign phone and email records before the election.

Secondly, from what we know so far, the FBI was not operating under any warrants, nor were there any FISA warrants issued to spy on the Trump campaign. Again, this doesn't mean that it didn't happen. In fact, Binney's roadmap shows it's more likely that if surveillance occurred, it was done without a warrant. But if we're looking for hard evidence or a paper trail proving Trump's charge, we may never find it.

Astronomer Carl Sagan popularized the adage, "Extraordinary claims require extraordinary evidence." Sagan was talking about alien visitation of Earth and the fact that to date, solid "evidence" has been lacking. The same should hold true in politics. Accusing the former president of the United States of conducting a secret wiretapping program against an oppositionpresidential candidateis just about as extraordinary as it gets. So far, those who claim that the charges are true including the president are lacking solid evidence that the bugging occurred. What is offered as "proof" is more opinion and supposition than substantiation of facts.

But Binney's roadmap, along with what we know of surveillance during the Obama years, points to extremely troubling questions that Democrats cannot dismiss as "conspiracy-mongering." In this case, there were a will and a way. For the sake of the country, Congress needs to get to the bottom of the matter.

A former top intelligence official-turned-whistleblowerat the National Security Agency says surveillance programs by the NSA could have been keeping tabs on the Trump campaign and that their intelligence could have been shared with other agencies.

William Binney, a legend at the NSA, laid out the case for warrantless wiretapping of Trump Tower and how other intel agencies like the CIA could have had access to the wiretaps.

Fox News national security correspondent James Rosen himself bugged by the Obama administration says Trump may be right:

ZeroHedge Blog:

Washington's Blog asked the highest-level NSA whistleblower in history - Bill Binney - whether he thought Trump had been bugged.

Binney is the NSA executive whocreatedthe agencys mass surveillance program for digital information, who served as theseniortechnical director within the agency, who managedsix thousandNSA employees.

He was a 36-year NSA veteran widely regarded as a legend within the agency and the NSAsbest-everanalyst and code-breaker.

Binney also mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (in the 1970s, he decrypted the Soviet Unions command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons).

Binney told Washington's Blog:

NSA has all the data through the Upstream programs (Fairview/Stormbrew/Blarney) [background] and backed up by second and some third party country collection.

Plus the FBI and CIA plus others, as of the last month of the Obama administration, have direct access to all the NSA collection (metadata and content on phones,email and banking/credit cards etc.) with no attempt at oversight by anybody [background]. This is all done under Executive Order 12333 [the order whichallows unlimited spyingno matter what intelligence officials claim] ....

FBI would only ask for a warrant if they wanted to be able to take it into court at some point given they have something meaningful as evidence. This is clearly true given the fact the President Trump's phone conversations with other country leaders were leaked to the mainstream media.

In other words, Binney is saying that Trumps phoneswerebugged by the NSA without a warrant - remember, top NSA whistleblowers have previously explained that the NSA is spying onvirtuallyallof the digital communications of Americans. - and the NSA shared the raw data with the CIA, FBI and other agencies.

If the FBI obtained a warrant to tap Trump's phone, it was a "parallel construction" to "launder" improperly-gained evidence through acceptable channels.

As we've previouslyexplained:

The government islaundering information gained through mass surveillancethrough other agencies, with an agreement that the agencies willrecreate the evidence in a parallel construction so they dont have to admit that the evidence came from unconstitutional spying. This data laundering is gettingworseandworse.

So does it mean that the NSA spying on Trump Tower actually turned up some dirt?

Maybe ...

Binney has no direct knowledge of any surveillance of Trump Tower. What he has is a roadmap for how it could have been done. He also shows the likelihood that agencies could have used whatever information was captured by the NSA's information dragnet.

A couple of caveats. First, Obama's executive order allowing other intel agencies access to the NSA's raw data was signed after the campaign was over. That doesn't mean that any wiretapped information from the Trump campaign wasn't gathered or even shared by NSA. It means that it is less likely thatintelligence agencies hadaccess to Trump campaign phone and email records before the election.

Secondly, from what we know so far, the FBI was not operating under any warrants, nor were there any FISA warrants issued to spy on the Trump campaign. Again, this doesn't mean that it didn't happen. In fact, Binney's roadmap shows it's more likely that if surveillance occurred, it was done without a warrant. But if we're looking for hard evidence or a paper trail proving Trump's charge, we may never find it.

Astronomer Carl Sagan popularized the adage, "Extraordinary claims require extraordinary evidence." Sagan was talking about alien visitation of Earth and the fact that to date, solid "evidence" has been lacking. The same should hold true in politics. Accusing the former president of the United States of conducting a secret wiretapping program against an oppositionpresidential candidateis just about as extraordinary as it gets. So far, those who claim that the charges are true including the president are lacking solid evidence that the bugging occurred. What is offered as "proof" is more opinion and supposition than substantiation of facts.

But Binney's roadmap, along with what we know of surveillance during the Obama years, points to extremely troubling questions that Democrats cannot dismiss as "conspiracy-mongering." In this case, there were a will and a way. For the sake of the country, Congress needs to get to the bottom of the matter.

Original post:
NSA whistleblower shows how candidate Trump could have been wiretapped - American Thinker (blog)

Trump Wants NSA Program Reauthorized But Won’t Tell Congress How Many Americans It Spies On – The Intercept

The White House wants Congress to reauthorize two of the NSAs largest surveillance programs before they expire at the end of the year.

One of them scans the traffic that passes through the massive internet cables going in and out of the U.S. and ends upcatching a vast number of American communications in its dragnet.

But how many? Lawmakers have been asking for years, and the intelligence community has consistently refused provide even a ballpark figure.

At a hearing of the House Judiciary Committee on Wednesday, several members expressed frustration that intelligence chiefs first under Obama, and now under Trump have failed to provide any kind of estimate, even in classified briefings.

The members of this committee and the public at large require that estimate to engage in a meaningful debate, said Rep. John Conyers, D-Mich., the leading Democrat on the committee. We will not simply take the governments word on the size of the so-called incidental collection.

Section 702 of the Foreign Intelligence Surveillance Act, which lapses at the end of the year, allows the NSA to collect vast amounts of domestic internet traffic as long as it maintains it is only targeting foreigners.Documents provided by NSA whistleblower Edward Snowden described two huge surveillance programs that operate under that authority. One program, PRISM, allows the NSA to collect data in bulk from tech companies like Google, Facebook and Apple. The other program Upstream allows the NSA to tap the massive internet cables that carry information in and out of the U.S. and search for communications involving certain foreign targets or selectors.

As the NSA scans the cables for information on its targets, it also collects information on the Americans those targets are communicating with, as well as entirely unrelated information, such as communications from people who happened to be in the same chat room as a target. Furthermore, the targets can be selected for anyforeign intelligence purpose not just counterterrorism.

As a result,the NSA ends up collecting information on a huge number of U.S. persons without getting a warrant collection they describe as incidental, but which is really inevitable. And using what critics call the backdoor loophole, law enforcement officials then search through that material for information on Americans.

That collection on Americans is part of how thelaw was designed, according to Elizabeth Goitein, a lawyer for the Brennan Center for Justice. Incidentally, is the terminology used by the government, Goitein testified at Wednesdays hearing. But it is part of the design of the program to acquire communications of foreign targets with Americans.

The issue of incidental collection has come into the spotlight in the weeks since Trumps inauguration. Last month, anonymous members of the intelligence community leaked information about phone calls between the Russian ambassador who was understandably targeted for surveillance and Trumps former national security adviser, Michael Flynn.

Flynns resignation spooked some Republicanswho worried about that ability being used improperly.Whatever your political persuasion is, for me it had a chilling effect, said Rep. Ral Labrador, R-Idaho. My political opponents could use my personal information, that they maybe gathered in some private information, against me in the future. That should be quite terrifying to anybody, whether youre a Republican or Democrat.

Conyers, along with a bipartisan group of 14 Democrats and Republicans, sent a letter to the director of national intelligence in April last year, asking simply for a rough estimate of how many Americans had their communications collected.

Conyers sent a follow-up letter in December. The intelligence community has not so much as responded to our December letter, Conyers said Wednesday. I had hoped for better.

Sen. Ron Wyden, D-Ore., first requested an estimate in2011 even before the Snowden disclosures demonstrated the reach of the surveillance programs. The federal Privacy and Civil Liberties Oversight board recommended in 2014 that the NSA start keeping track of the number. In 2015, more than 30 civil liberties organizations wrote a letter to the Intelligence Communitys Civil Liberties Protection Office, demanding the same thing, and got an unresponsive reply.

The intelligence community insists that it doesnt keep track, in part because doing so would require it to identify which phone numbers and computer IP addresses belong to American citizens.April Doss, a former NSA lawyer, told the committee that it would require the NSA to de-anonymize everyone in their communications. In my view, the collection and maintenance of that reference information would itself pose significant impacts to privacy, she said.

But Goitein noted that the NSA already uses computer IP addresses to approximate who is a U.S. citizen for other purposes, so it would be easy for them to estimate how many Americans communications they collect.

The NSA has determined that the IP address is an accurate enough indicator of a persons status to use it to filter out the wholly domestic communications that the NSA is prohibited from acquiring, she testified. If its accurate enough to enable the NSA to comply with that constitutional obligation, then its certainly accurate enough for the estimate.

Top photo: A man looks at his cellphone as he walks on the street in Madrid in 2013.

Read the rest here:
Trump Wants NSA Program Reauthorized But Won't Tell Congress How Many Americans It Spies On - The Intercept

NSA – National Security Agency | The Huffington Post

NEWS

Highline

Science

Education

Weird News

Business

TestKitchen

Tech

College

Media

Pollster

Heroin Epidemic

Donald Trump

Racial Inequality

US Senate

Election Results

HuffPost Hill

Police Brutality

Hate Crimes

Supreme Court

Congress

So That Happened

Entertainment

Comedy

Celebrity

TV

Arts + Culture

Backspace

Movies

Black Voices

Latino Voices

Women

Fifty

Queer Voices

Parents

Arts + Culture

Black Voices

Books

Business

Candidate Confessional

Celebrity

College

Comedy

Crime

Divorce

Dolce Vita

Eat the Press

Education

Election Results

Entertainment

Fifty

Good News

Green

Healthy Living

Highline

Home

Horoscopes

HuffPost Data

HuffPost Hill

Impact

Latino Voices

Media

Newsletters

Outspeak

Parents

Politics

Pollster

Queer Voices

Religion

Science

Small Business

So That Happened

Sports

Style

Taste

Tech

Teen

TestKitchen

Travel

TV

Weddings

Weird News

Women

FEATURED

OWN

Paving the Way

The Power Of Humanity

Retire Well

Sleep + Wellness

What's Working: Purpose + Profit

WorldPost

POLITICS

Boston Globe/Getty Images

POLITICS

HUFFPOST VIDEO

Albert L. Ortega via Getty Images

TECH

POLITICS

Bill Clark via Getty Images

TECH

Continue reading here:
NSA - National Security Agency | The Huffington Post

Former NSA director: It’s time to trash the federal cybersecurity … – CyberScoop

Former NSA Director Keith Alexander told senators Thursday that the government should undertake a massive reorganization effort that would consolidate some current cybersecurity responsibilities split between the FBI, Homeland Security Department, Defense Department and intelligence community, into a single entity.

When we talk to the agencies they dont understand their roles and responsibilities, said Alexander, who helped author the Commission on Enhancing National Cybersecurity report which was provided to the Trump administration. Yes, I do think it should be brought together I believe there is a way to get around this lack of a strategy by setting up a [new] framework.

Alexander, who now runs a private cybersecurity firm based in Fulton, Maryland, spoke before the Senate Armed Service Committee with other prominent experts about cyber-operations strategy and policy.

Chairman John McCain, R-Ariz., previously criticized the Obama administration for how it responded last year to an expansive Russian hacking campaign aimed at the U.S. presidential election. McCains evaluation, at least in part, revolves around how the government has handled these incidents from an organizational standpoint.

Panel member James Inhofe, R-Okla., in agreement with McCain, described that the federal government is facing a stovepipe scenario in which each of these respective agencies are not collaborating in a manner sufficient to protect the nation from and react to cyberattacks.

Its not working, Alexandersaid. There are four stovepipes and it doesnt make sense. If we were running this like a business we would put them together. The issue now gets to you now have all these different committees in Congress looking at these [cybersecurity issues] and its messed up.

The Obama administration in July attempted to clarify who is responsible for what by publishing a White House directive known as Presidential Policy Directive 41, or PPD-41. In short, the directive was designed to draw jurisdictional lines by assigning roles in the case of a cyberattack for coordination, risk mitigation and communications purposes.

What you have is people acting independently and with these seams we will never defend this country. And more importantly, when private industry looks at our government they are, quite frankly, dismayed. We are all over the map, Alexander said. No one can answer who is responsible.

Alexander said that he and former Defense Secretary Robert Gates had previously spoken about combining DHS and law enforcements cybersecurity responsibilities with that of the Defense Department and intelligence community; all under a single framework.

Others who testified Thursday, however, pushed back on the idea of completely tearing down the existing structure.

The situation is a little more complicated, responded Craig Fields, the chairman of the Defense Science Board. I dont see duplication in efforts, I see gaps, because we do not have an orchestra conductor unless we have the policy, orchestra conductor and strategy we can never go where you want to go.

This role of orchestra conductor, according to Fields and former Undersecretary of Defense For Policy James Miller, should exist outside the scope of the National Security Council.

During the Obama administration, White House cybersecurity adviser Michael Daniel seemingly played this so-called orchestra conductor role. Daniels job often involved managing the vast bureaucracy of government to further both defense and offensive missions.

McCain subsequently asked the panel of speakers to submit a list of recommended individuals for this position. It remains unclear if or when the Trump administration will fill Daniels vacant post, since he left the White House in January.

I am not convinced a mass reorganization is appropriate, certainly at this point in time. I look toward an integrating body, Miller explained.

He added, One option which I believe should be considered is to build out from the so-called CTIIC, or Cyber Threat Intelligence Integration Center [we should] look to build towards the National Counterterrorism Center model if not to the joint interagency task force model.

Founded in 2003 as part of the Office of the Director of National Intelligence, the McLean, Virginia-based National Counterterrorism Terrorism Center brings together specialists from several federal agencies, including the CIA, the FBI, and the Defense Department, to focus and synchronize interagency investigations into suspected terrorists.

Go here to see the original:
Former NSA director: It's time to trash the federal cybersecurity ... - CyberScoop

Ex-NSA head: Cybersecurity agencies don’t share enough information to be successful – The Hill

A former leader of the National Security Agency (NSA) told lawmakers Thursday that government agencies working on cybersecurity are too stovepiped to safeguard the nation from digital threats.

Retired Gen. Keith Alexander said that the four groups handling cyber issues the Homeland Security and Defense departments, the FBI, and the intelligence community are too stovepiped, meaning they bottle up information instead of sharing it with one another and across the government.

Its not working, Alexander said of the governments organization on cybersecurity. There are four stovepipes and it doesnt make sense. If we were running this like a business, we would put them together.

Alexander suggested that all four groups be brought together under one cybersecurity framework in order to defend the countrys networks and critical infrastructure and respond to cyberattacks.

Before that, he argued, the agencies should participate in exercises with Congress, the Trump administration and the private sector to develop a policy and strategy on cybersecurity.

What you have is people acting independently, and with those seams, we will never defend this country, said Alexander, who now leads a private cybersecurity firm. He added that industry leaders are dismayed about how the government handles cybersecurity.

The senators also heard testimony from two members of the Defense Science Board, a group of roughly 50 retired armed service members, government and industry leaders who give the Pentagon advice on how to solve cybersecurity and technology problems.

Craig Fields, a former Pentagon technology chief, and James Miller, a former undersecretary of defense for policy, pushed back on the notion that the way that the government handles cybersecurity needs to undergo massive reorganization but agreed with Alexander on the need for more integration.

Im not convinced that a massive reorganization is appropriate, Miller said. Id be looking toward an integrating body.

When we talk to the individual agencies, they dont understand their responsibilities, he later observed.

Rewiring is not the solution, Fields, who chairs the Defense Science Board, explained. [That would be] too disruptive, but fundamental change in how it works, absolutely.

Alexander led the NSA and Cyber Command before his resignation in March 2014 amid controversy over Edward Snowden's leaks about the NSA's domestic spying. Current Director Mike Rogers succeeded him.

Read the original here:
Ex-NSA head: Cybersecurity agencies don't share enough information to be successful - The Hill