Cyberwars: NSA Building Quantum Computer

D-Wave's 128-qubit quantum processorAs documents that illustrate the NSA’s clandestine behavior continue to be leaked, the extents to which the agency has been going to gain supremacy over cyberspace are becoming ever more clear. Thanks to a new series of documents released by Snowden, it now seems that these efforts included two programs who’s purpose was to create a ““useful quantum computer” that would be capable of breaking all known forms of classical encryption.

According to the documents, which were published by The Washington Post earlier this month, there are at least two programs that deal with quantum computers and their use in breaking classical encryption — “Penetrating Hard Targets” and “Owning the Net.” The first program is funded to the tune of $79.7 million and includes efforts to build “a cryptologically useful quantum computer” that can:

sustain and enhance research operations at NSA/CSS Washington locations, including the Laboratory for Physical Sciences facility in College Park, MD.

nsa_aerialThe second program, Owning the Net, deals with developing new methods of intercepting communications, including the use of quantum computers to break encryption. Given the fact that quanutm machinery is considered the next great leap in computer science, offering unprecedented speed and the ability to conduct operations at many times the efficiency of normal computers, this should not come as a surprise.

Such a computer would give the NSA unprecedented access to encrypted files and communications, enadling them to break any protective cypher, access anyone’s data with ease, and mount cyber attacks with impunity. But a working model would also vital for defensive purposes. Much in the same way that the Cold War involved ongoing escalation between nuclear armament production, cybersecurity wars are also subject to constant one-upmanship.

quantum-computers-The-Next-GenerationIn short, if China, Russia, or some other potentially hostile power were to obtain a quantum computer before the US, all of its encrypted information would be laid bare. Under the circumstances, and given their mandate to protect the US’s infrastructure, data and people from harm, the NSA would much rather they come into possesion of one first. Hence why so much attention is dedicated to the issue, since whoever builds the worlds first quantum computer will enjoy full-court dominance for a time.

The mathematical, cryptographical, and quantum mechanical communities have long known that quantum computing should be able to crack classical encryption very easily. To crack RSA, the world’s prevailing cryptosystem, you need to be able to factor prime numbers — a task that is very difficult with a normal, classical-physics CPU, but might be very easy for a quantum computer. But of course, the emphasis is still very much on the word might, as no one has built a fully functioning multi-qubit quantum computer yet.

quantum-entanglement1As for when that might be, no one can say for sure. But the smart money is apparently anticipating one soon, since researchers are getting to the point where coherence on a single qubit-level is becoming feasible, allowing them to move on to the trickier subject of stringing multiple fully-entangled qubits together, as well as the necessary error checking/fault tolerance measures that go along with multi-qubit setups.

But from what it’s published so far, the Laboratory for Physical Sciences – which is carrying out the NSA’s quantum computing work under contract – doesn’t seem to be leading the pack in terms of building a quantum computer. In this respect, it’s IBM with its superconducting waveguide-cavity qubits that appears to be closer to realizing a quantum computer, with other major IT firms and their own supcomputer models not far behind.

hackers_securityDespite what this recent set of leaks demonstrates then, the public should take comfort in knowing that the NSA is not ahead of the rest of the industry. In reality, something like a working quantum computer would be so hugely significant that it would be impossible for the NSA to develop it internally and keep it a secret. And by the time the NSA does have a working quantum computer to intercept all of our encrypted data, they won’t be the only ones, which would ensure they lacked dominance in this field.

So really, thess latest leaks ought to not worry people too much, and instead should put the NSAs ongoing struggle to control cyberspace in perspective. One might go so far as to say that the NSA is trying to remain relevant in an age where they are becoming increasingly outmatched. With billions of terabytes traversing the globe on any given day and trillions of devices and sensors creating a “second skin” of information over the globe, no one organization is capable of controlling or monitoring it all.

So to those in the habit of dredging up 1984 every time they hear about the latest NSA and domestic surveillance scandal, I say: Suck on it, Big Brother!

Source: wired.com

The NSA is Coming To Town

nsa_santaJust in time for the holidays, the ACLU have produced this lovely video entitled “The NSA is coming to town”. In it, Santa Claus is portrayed as a government snoop who spies on people as they text, email, and just generally do their electronic business. And it all happens to a lovely reworded version of “Santa Claus is coming to town”. Check it out, and try not to feel too paranoid this holiday season!

Crypto Wars: The Tech World vs. the NSA

cyber_securitySix years ago, something interesting took place at Microsoft’s Windows annual Crypto conference in Santa Barbara. In the course of the presentations, two members of the company’s security group (Dan Shumow and Niels Ferguson) gave a talk that dealt with internet security and the possibility that major systems could be hacked.

They called their presentation “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng”. That’s a name few people outside of the techy community would recognize, as it refers to a pseudorandom number generating program that is used extensively in cryptography. And thought the presentation was only nine slides and a few minutes long, they managed to capture the attention of the crowd with some rather stark observations.

cyber_security1Basically, they laid out a case showing that the new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made one of the program’s algorithms susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.

At the time, no one thought much of it. But today, that’s all changed, thanks to Edward Snowden. Apparently, cryptographers and journalists are seeing a connection between the talk given by Shumow and Ferguson and the classified NSA documents Snowden leaked. Apparently, some of that information confirms that the weakness in the Dual_EC_DRBG algorithm might be indeed a backdoor.

nsa_aerialEarlier this month, an article appeared in the New York Times that implied that the backdoor was intentionally put there by the NSA as part of a $250-million, decade-long covert operation by the agency to weaken and undermine the integrity of a number of encryption systems used by millions of people around the world.

Naturally, these allegations not only stoked the fires over the NSA’s long history of spying on databases, both domestic and foreign, it has also raised questions over the integrity of the rather byzantine process that produces security standards in the first place. The National Institute of Standards and Technology (NIST) approved Dual_EC_DRBG and the standard, is now facing criticism alongside the NSA.

nist_aerialbigAnd while NIST has since been forced to re-open the program to examination and public discussion, security and crypto firms around the world are scrambling to unravel just how deeply the suspect algorithm infiltrated their code, if at all. Some even went so far as to publicly denounce it, such as corporate giant RSA Security.

But of course, a number of crypto experts have noted that the Times hasn’t released the memos that purport to prove the existence of a backdoor. What’s more, the paper’s direct quotes from the classified documents don’t mention a backdoor or efforts by the NSA to weaken it or the standard, only the efforts of the agency to push the standard through NIST’s committees for approval.

nsasecurity_primary-100041064-largeOne such person is Jon Callas, the CTO of Silent Circle – a company that offers encrypted phone communication. Having attended the Crypto conference in 2007 and heard the presentation by Shumow, he believes that the real problem may lie in the fact that the algorithm was poorly made:

If [the NSA] spent $250 million weakening the standard and this is the best that they could do, then we have nothing to fear from them. Because this was really ham-fisted. When you put on your conspiratorial hat about what the NSA would be doing, you would expect something more devious, Machiavellian … and this thing is just laughably bad. This is Boris and Natasha sort of stuff.

Sources at Microsoft agree. In addition to the presenters – who never mention the NSA in their presentation and went out of their way to avoid accusing NIST of any wrongdoing – a manager who spoke with WIRED on condition of anonymity believes the reporters at the Times saw the classified documents dealing with the program, read about the 2007 talk, and assumed their was a connection.

cryptographyBut Paul Kocher, president and chief scientist of Cryptography Research, says that regardless of the lack of evidence in the Times story, he discounts the “bad cryptography” explanation for the weakness, in favor of the backdoor one:

Bad cryptography happens through laziness and ignorance. But in this case, a great deal of effort went into creating this and choosing a structure that happens to be amenable to attack.

Personally, I find it interesting that the NSA would be so committed to making sure a program passed inspection. Especially one that had a fatal flaw that, when exploited properly, could be used to give someone who knew about it access to encrypted information. But of course, it’s not like the NSA has been known to invade people’s privacy, right? RIGHT?

Clearly, all there is at this point is speculation. One thing is certain though. In the coming weeks and months, the NSA is going to be the recipient of even more flak over its monitoring and cryptographic activities. Whether this effects any change in policy remains to be seen, but I doubt anyone will be holding their breaths.

Sources: wired.com, nytimes.com

Drone Wars: New Leaks Reveal Human Cost of Drone Strikes

drone-strikeIt would be an understatement to say that drones and UAVs are hot button issue right now. As an ongoing part of the “war on terror”, the use of remotely piloted vehicles to target terrorism suspects remain a popular one within the US, with 56% of respondents indicating that they supported it (as of Feb. 2013). However, when the matter of civilian casualties and collateral damage is introduced, the issue becomes a much stickier one.

What’s more, it is becoming increasingly evident that how the drone program is being presented is subject to spin and skewing. Much like the NSA’s domestic surveillance programs, it is in the Obama administration’s and the Pentagon’s best interest to present the issue in terms of “hunting terrorists” while categorically avoiding any mention of the real costs involved. And thanks to recent revelations, these efforts may prove to be more difficult in the future.

drone_mapIt was just over weeks ago, on July 22nd, that London’s Bureau of Investigative Journalism released a leaked Pakistani report that detailed numerous civilian casualties by drone strikes in the country’s Federally Administered Tribal Areas (FATA). For years now, obtaining information about civilian casualties caused by US and NATO strikes in this region has been incredibly difficult – information which these documents have now provided.

The 12-page dossier was compiled for the the authorities in the tribal areas, the Bureau notes, and investigates 75 CIA drone strikes and five attacks by NATO in the region conducted between 2006 and 2009. According to the document, 746 people were killed in the strategic attacks. At least 147 of the victims were civilians, and 94 were children.

on April 3, 2009 in Now Zad in Helmand province, Afghanistan.This directly contradicts inquired made by the United Nations, which began investigating the legality of the drone program and strikes last year. According to the U.N.’s special rapporteur on counterterrorism and human rights (Ben Emmerson) Pakistan then claimed at least 400 civilians had been killed in U.S. strikes in the country since 2006. Quite the discrepancy.

And while a majority of other tallies relied on media reports of drone strikes, the FATA list was compiled by government officials who were sent out to investigate damage firsthand in the wake of attacks. According to the Bureau, on several occasions officials registered different casualty rates than the media outlets reported.

Drone-strike-damageThe Bureau went on record to say that there were gaps in the information provided, like why none of the names of the casualties were provided, or why civilian casualties were not provided for 2009, the last year covered in the report. It is possible that logistical factors played a role, such as the lack of accurate census data in the FATA region, and that casualty figures for the year 2009 were difficult to obtain due to the acceleration of drone strikes during that year.

It is this last aspect which is likely to give many pause, since it was the decision of the outgoing Bush administration to intensify drone strikes during the last few months of his presidency, a decision which the Obama administration adopted and maintained. And the list provided only shows a gap between the official numbers and those obtained on the ground during the years of 2006 and 2009, when the strikes began.

drone_loadoutWhat are we to make then of the years running from 2009 to 2013, where drone strikes in the western region of Pakistan became a much more common occurrence and the body count – civilian or otherwise – can only be expected to have escalated? This could another reason that figures were omitted from 2009, which is that the Pakistani government was concerned that they might spark outrage if they were to ever be made public.

However, that is all speculation at this point, and more time and investigation are certainly needed to determine what the cost in human terms has been. One thing is for sure though, the use of drones in Pakistan, Yemen and Somalia are likely to become increasingly controversial as more information emerges and an accurate picture of the death toll is presented.

drone_map1For years now, the US government has denied that large civilian casualty counts exist, but it continues to withhold the numbers. But some claim those numbers will not shed any real light even if they are released, since it is still not clear how the US forces distinguish between civilians and “militants” or “combatants”.

In a major speech on national security in May 2013, Obama strongly defended the drone program but said the administration would codify the process it goes through before ordering attacks and would work with Congress to create more oversight. However, no promises were made about the number of deaths leading up to this declaration, whether or not those facts and figured would be made public, and strikes continue to take place which violate this new mandate.

obama_dronesAs the saying goes, “the first casualty of war is the truth”. And without much effort, one can easily draw parallels between this latest phase in the “war on terror” to the vagaries of Iraq, Abu Ghraib and Guantanamo Bay, where information was withheld, numbers debated and legalities issued in order to justify highly questionable acts.

And for those old enough to remember, the specter of Vietnam is also apparent here. Then, as now, the public is forced to rely on leaked information and confidential informants simply because the official stories being issued by their government are full of discrepancies, denials, and apparent fabrications. One would think we had learned something in the last five decades, but apparently not!

Sources: huffingtonpost.com, thebureauinvestigates.com

Cyberwars: U.S. Lawmakers Credit NSA for Uncovering Al-Qaeda Threat

bahrain-embassy-04818864In a statement made this past Sunday, the US State Department indicated that it will be extending its embassy and consulate closures until the end of the week. Offices were reopened in Iraq, Afghanistan and Algeria just yesterday, but another 19 will remain closed until Aug. 10 – including locations in Egypt, Yemen, Libya, Saudi Arabia and Kuwait.

These closures were made in response to an unspecified Al-Qaeda threat that indicated that an attack might be coming sometime in August, particularly in the Middle East and North Africa. According to the State Department, the decision to keep the embassies and consulates closed was “not an indication of a new threat,” but simply out of concern for the lives and safety of staff.

embassy-closure-mapAnd according to another State Department source, the credit for uncovering this supposed threat goes to the NSA and the PRISM program – i.e. the extensive new data mining operation that has garnered a great deal of controversy of late. Specifically, it was the agency’s ability to monitor communications on cellphones and emails that was is credited with making the difference.

Senator Saxby Chambliss, he top Republican on the Senate Intelligence Committee, claimed in an interview that “There is an awful lot of chatter out there”. This “chatter” apparently took the form of communications among terrorism suspects about the planning of a possible attack, which he claimed was “very reminiscent of what we saw pre-9/11.”

US embassy in Tel AvivNo indication was given as to the nature of the threat or whether or not an actual attack might take place. But Chambliss was very quick to draw the connection between the NSA’s ability to gather information and the warnings his department received.

[Those programs] allow us to have the ability to gather this chatter. If we did not have these programs then we simply wouldn’t be able to listen in on the bad guys. This is the most serious threat that I’ve seen in the last several years.

This information-gathering program was one of many aspects of the NSA’s broad surveillance identified by former spy agency contractor Edward Snowden in his testimony to major media outlets. So it comes as no surprise that the State Department would be coming to its defense at a time like this.

US-embassy-closures_010And Chambliss and the State Department are hardly the only ones singing the NSA’s praises right now. This past Sunday, several prominent Republicans and Democrats expressed their support for the NSA surveillance program. One such individual was Dutch Ruppersberger, the senior Democrat on the House Intelligence Committee, who told ABC’s This Week:

The good news is that we picked up intelligence. And that’s what we do. That’s what NSA does. We’ve received information that high-level people from al Qaeda in the Arabian Peninsula are talking about a major attack.

U.S. Representative Adam Schiff, another Democrat on the House Intelligence Committee, characterized the security threat as being based on specific intelligence rather than generalized anti-U.S. threats. While on CNN’s State of the Union program, he said:

This is not the usual type of chatter. It had to be corroborated or come from very reliable sources to take this kind of action.

Mideast Bahrain US Embassy ClosingsNaturally, there are those critics who would claim that the unspecified nature of the threat and the lack of oversight where PRISM is involved means that there is no way to tell if the “chatter” story is in fact real. Citing such examples as the “Orange Alert” controversy of 2004 – when Homeland Security Secretary Tom Ridge was pressured to raise the alert status leading up to the election – such critics would remind people that the US government has a history of issuing alerts based on factors other than hard data.

At the same time, it is important to note that the threat information also came ahead of the Eid celebration at the end of the Muslim holy month of Ramadan, which will be occurring later this week and just over a month before the anniversary of Al-Qaeda’s Sept. 11, 2001, attacks on a US ambassador and the American Embassy in Benghazi, Libya. In this sense, the alert may have been motivated by legitimate concern, even if hard data was lacking,

us_embassy_closings_yemenAnd the US is hardly the only nation responding to the warning seriously. The threat also has prompted some European countries to close their embassies in Yemen, where one of the most dangerous al-Qaeda affiliates is based. Interpol, the France-based international police agency, also issued a global security alert advising member states to increase vigilance against attacks after a series of prison breaks in Iraq, Libya and Pakistan.

The advisory prompted Canada’s Foreign Affairs Department to release its own warning this past Saturday for travelers and diplomats in the Middle East and North Africa region. In addition, the Canadian high commission office in Bangladesh was closed on Sunday, since Pakistan was one of several nations outside of the Middle East and North Africa to be named in the advisory.

A few things are certain at this point though: neither the threat of terrorism nor all that’s done in response to it are even close to being resolved. In addition, the controversy surrounding the response and whether or not it constitutes an overreaction or a calculated curtailment of people’s civil rights and liberties, is not over either. Not by a long shot.

Sources: cbc.ca, (2), washingtonpost.com, theguardian.com

 

The NSA’s New Super Computer Facilities

nsa_aerialThe extent and depth of the NSA’s snooping has been the subject of much scrutiny and controversy of late. And it seems that the more we come to learn about the issue, the worse it gets. In addition to the extensive access the NSA seems to have to our personal data, there’s also the staggering amount of power that is being concentrated in so fe hands, coupled with a serious lack of oversight. Worse yet, it appears the NSA is showing no signs of slowing down.

Just two months ago, the Army Corps of engineers began breaking ground on a new supercomputing facility in Fort Meade, Maryland – the center of the NSA’s cyber operations. Known as the High Performance Computing Center-2, this $860 million data center will span more than 600,000 square feet of space, including 70,000 square feet of technical space. The center is expected to be completed in 2016.

NSA_supercomputerBut worse yet is the fact that this is not the only center being built, nor it is even the largest. In addition to the Fort Meade facility, the NSA is also building a massive data center in Utah, a project that will feature up to 1 million square feet of facilities and cost a hefty $1.5 billion. The computers alone will take over 100,000 square feet and the facility will require its own electrical substation to power all the air conditions required.

In truth, the Fort Meade location is only necessary because of the planned facility being built in Utah. Once it is up and running, the NSA will need a separate location where analysts can look over the growing amounts of processed information and material, and in turn make reports and provide recommendations for policy-makers.

cyberwarfare1Of course, the purpose of these facilities go beyond the mere analysis and storage of information. In addition, the Utah Data Center will also employ new code-breaking capabilities. Given the extent to which modern, high-value information is encrypted – everything from commerce to diplomacy to personal information – the center will be employing the latest code-cracking tools developed by the NSA.

Naturally, the NSA’s tightly-controlled PR department has stated that the purpose of these centers is to protect national security networks and provide U.S. authorities with intelligence and warnings about cyber threats, as part of the Comprehensive National Cybersecurity Initiative (CNCI). However, this has done little to allay fears, and seems like the same song being played on repeat.

hackers_securityAs always, the NSA’s stated objective do not address the growing awareness that the NSA has and continues to conduct cyber attacks in foreign countries. As Snowden’s testimony and recent revelations about the US super-secret Cyber Command revealed, American agencies have been conducting far more than just defensive operations in recent years.

All of these efforts began in earnest during the 1990’s and expanded greatly after September 11th, 2001. Much of this has had to do with the staggering increase in the amount of data being transmitted and shared on a daily basis, and not just the issue of terrorism. But what is disturbing is the near-total removal of oversight that began after 9/11 and has continued unabated ever since.

Despite promises that the era of warrantless surveillance was at an end, all attempts to resolve the issue have become marred by what is meant by “electronic surveillance”. In the meantime, the NSA continues to enjoy some rather broad freedoms to monitor and process the information we transmit. And as those abilities continue to grow, we can only hold our breaths and pray they mean it when they say “innocent people need not be worried”.

Sources: policymic.com, datacenterknowledge.com, seattleweekly.com, wired.com

Cyberwars: Snowden Reveals NSA’s Been Hacking China

nsa_aerialEdward Snowden, the man who blew the whistle on the NSA and its domestic surveillance program – aka. PRISM – has reemerged to reveal some additional secrets. It seems that in addition to spying on their own citizens, the NSA has been using its resources to spy on tens of thousands of operations around the world. Not surprising, but what Snowden revealed showed that when it comes to nations like China, surveillance was just the tip of the iceberg.

Snowden, who has been hiding in Hong Kong since May 20th, revealed in an interview on Thursday with the South China Morning Post that the NSA has been hacking computers in Hong Kong and mainland China since 2009. Among the targets in Hong Kong were the Chinese University of Hong Kong, public officials, businesses and even students in the city.

?????????????All told, Snowden estimated that there are more than 61,000 NSA hacking operations globally, with at least hundreds of targets in Hong Kong and on the mainland. The tactics, he claimed, involve selecting large targets and infiltrating in many places at once:

We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one.

Snowden also explained his motivation for blowing the whistle on the NSA’s foreign operations. It seems that in light recent tensions between the US and China, which has been characterized by ongoing accusations and recrimination, he felt the need to tell the truth behind the lies. As he told the SCMP, his motivation was based on:

the hypocrisy of the U.S. government when it claims that it does not target civilian infrastructure, unlike its adversaries….Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public.

Edward-Snowden-660x367Though Snowden also discussed possible plans to seek asylum in Iceland or elsewhere during an interview last week, he told the SCMP  that he’s staying put in Hong Kong for now. He emphasized that his stay in China was not an attempt to avoid justice, but to reveal criminal behavior.  He also expressed admiration for countries that have offered asylum (such as Russia), claiming that he was “glad there are governments that refuse to be intimidated by great power.”

The Guardian newspaper, which has published information from documents leaked by Snowden, has said that it has more than a thousand other documents that Snowden managed to smuggle out or download from the NSA using a series of laptops and a thumb drive. These documents are to be disclosed in the coming weeks, according to the paper, so more revelations are expected to come.

secret_documentsThough there are those who question his motivations and methods, no one can deny that thanks to Snowden, some very questionable  behavior has been revealed that involved people at the top echelons of government. One can’t help but be reminded of Richard Clarke, former head of the NSA, who came forward in 2004 to testify before to the 9/11 Commission and reveal the extent to which the Bush Administration failed to prevent the largest terrorist attack in history, or how it sought to pin that attack on the Iraqi government.

And for those who have lived long enough to remember, these events also call to mind the Pentagon Papers of 1969. In this case, it was another whistle blower named Daniel Ellsberg who, through the publication of hundreds of government documents, revealed that the US government had been lying about the Vietnam war, the number of casualties, and the likelihood of its success. And let’s not forget  former FBI Ass. Dir. Mark Felt – aka. “Death Throat” – the man who blew the whistle on the Nixon Administration.

whistleblower-protectionIn the end, whistle blowers have a long history of ending wars, exposing corruption, and force administrations to take responsibility for their secret, unlawful policies. Naturally, there were those who are critical men such as Felt, Clarke, and Ellsberg, both then and now, but they have never been able to refute the fact that the men acted out of conscience and achieved results. And while I’m sure that their will be fallout from Snowden’s actions, I too cannot dispute that what he did needed to be done.

As Edmund Burke famously said: “The only thing necessary for the triumph of evil  is for good men to do nothing.”

Sources: wired.com, scmp.com

Cyberwars: Massive Government Surveillance Uncovered!

wire_tappingOn Friday, Washington DC found itself embroiled in controversy as revelations were made about the extent to which US authorities have been spying on Americans in the last six years. This news came on the heels of the announcement that the federal government had been secretly cataloging all of Verizon’s phone records. No sooner had the dust settled on that revelation that it became known that the scope of the Obama administration’s surveillance programs was far greater than anyone had imagined.

According to updated information on the matter, it is now known that The National Security Agency (NSA) and the FBI have been tapping directly into the central servers of nine leading U.S. Internet companies, extracting everything from audio and video chats, photographs, e-mails, documents, and connection logs that would enable their analysts to track foreign targets.

prism3This information was revealed thanks to a secret document that was leaked to the Washington Post, which shows for the first time that under the Obama administration, the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing. Equally distressing is the names being named: U.S. Service Providers such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.

The document further indicates that all of this has been taking place since 2007, when news disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced then-president George W. Bush to look for new authority to justify his program warrantless domestic surveillance. It’s continuance and expansion under Obama has created a great deal of understandable intrigue, and not only because of promises made that “illegal wiretapping” would not take place under his watch.

prism1The joint FBI-NSA program responsible for mining all the data is known as PRISM, and it may very well be the first of its kind. While the NSA and FBI have a long history of monitoring suspects via phone records and computer activity, and are both accustomed to corporate partnerships that help it divert data traffic or sidestep barriers, such a vast program has never before been possible. In the current information age, there is an immense wealth of information out there, and where better to access all of this than in Silicon Valley?

Not long after the news broke in Washington, London’s Guardian reported that GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. According to the same leaked information, PRISM appears to allow the GCHQ to circumvent the formal legal process required in Britain to seek personal material such as emails, photos and videos from an internet company based outside of the country.

prism2But perhaps worst of all is the fact that this process is entirely above board, at least for the companies involved. Back in 2007, Congress passed the Protect America Act, and then in 2008 followed it up with the FISA Amendments Act, both of which immunized private companies that cooperated voluntarily with U.S. intelligence collection against prosecution. And late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.

An anticipated, a bi-partisan amalgam of Senators came out to defend the initial reports of phone record monitoring shortly after it was announced. In a rare display of solidarity that cut across party lines, Democrats and Republicans from both the Senate and House came forward to say that the program was justified, only spied on terrorists, and that law-abiding citizens need not worry.

National Security Agency - aerial view
National Security Agency – aerial view

Once again, the argument “if you’ve done nothing wrong, you’ve got nothing to fear” finds itself employed by people who do not want to voice criticisms about a government spying program. Echoes of the Bush administration and McCarthy era all over again. Needless to say, all of this has many people worried, not the least of which are people opposed to government intrusion and the protection of privacy for the past decade.

Ever since it became possible to “mine data”  from numerous online digital sources, there has been fear that corporations or governments might try to ascertain the habits and comings and goings of regular people in order to effectively monitor them. For some time now, this sort of monitoring has been somewhat benign, in the form of anticipating their spending habits and using targeted advertising. But always, the fear that something more sinister and totalitarian might emerge.

government-surveillanceAnd with the “War on Terror”, the Patriot Act, domestic warrantless wiretapping, the legitimization of torture, and a slew of other crimes the Bush administration was indicted in, people all over the world have become convinced that “Big Brother” government is just around the corner, if indeed it is not already here.

The fact that such processes have continued and even expanded under Obama, a man who originally pledged not to engage in such behavior, has made a bad situation worse. In many ways, it demonstrates that fears that he too would succumb to internal pressure were justified. Much as he was won over by the Pentagon and CIA to continue the war in Afghanistan and UAV programs, it seems that the constellation of FBI and NSA specialists advising him on domestic surveillance has managed to sway him here as well.

Stealth-Wear1One can only hope that this revelation causes the federal government and the Obama administration to reconsider their stances. After all, these are the same people who were convinced to stand down on the use of UAVs in oversees operations and to take measures that would ensure transparency in the future. We can also hope that the NSA and FBI will be required to once again have to rely on the court system and demonstrate “just cause” before initiating any domestic surveillance in the future.

Otherwise, we might all need to consider getting our hands on some stealth wear and personal cameras, to shield ourselves and create an environment of “sousveillance” so we can spy on everything the government does. Might not hurt to start monitoring the comings and goings of every telecommunications and Silicon Valley CEO while were at it! For as the saying goes, “who watches the watchers?” I’ll give you a hint: we do!

Also, be sure to check out the gallery of artist Adam Harvey, the man who pioneered “stealth wear” as a protest against the use of drones and domestic surveillance. To learn more about sousveillance, the concept of a society monitored by common people, check out Steve Mann’s (inventor of the EyeTap) blog.

Sources: washingtonpost.com, guardian.co.uk, policymic.com, ahprojects.com, eyetap.blogspot.ca

 

Drone Wars: New Promises, Same Problems

(U.S. Air Force photo/Staff Sgt. Brian Ferguson)(Released)The practice of using UAV’s as part of a targeted strategy in Pakistan, Afghanistan, Somalia and Yemen has become so frequent that its come to characterize the Obama administration’s handling of the “War on Terror”. Reaction to this policy has been increasingly critical, due in no small part to unanswered questions surrounding civilian death tolls and the rapid escalation of deployment. In response, the Obama administration announced this past week that the surge is at an end.

In a speech made to the National Defense University in Washington on Thursday, Obama emphasized that from now on, the use of UAV’s would be in the hand of the military instead of clandestine intelligence organizations such as the CIA. He also indicated that the rules for launching the strikes would be stricter. For instance, there must be a “near certainty” that no civilians will be killed, and the strikes are to become less frequent.

predator_profileWhile Obama would not declare an end to the war on terrorism, he did offer to work with Congress to constrain some of his own authorities for waging it, which may include the creation of a court modeled on the secretive one used by the NSA to oversea the surveillance of suspected foreign agents. He also expressed a preference to constrain “and ultimately repeal” the broad latitude of warmaking powers granted in the Authorization to Use Military Force (AUMF), an act that was created in 2001 by the Bush administration which is considered the wellspring of the “War on Terror”.

And above all, issues of legality are to take a backseat to the moral and ethical implications raised by ongoing use. Or as he put it: “To say a military tactic is legal, or even effective is not to say it is wise or moral in every instance.”

Naturally, a great many questions remain. In addition to how drones will be used in the years to come to combat terrorism and militants, there’s also questions surrounding their use thus far. Despite pledges made by Obama that changes will be made, the history of the program is still shrouded in mystery. Fittingly, Bloomberg Businessweek created a map to serve as a reminder of the scope of that program, calling it the first ever “comprehensive compilation of all known lethal U.S. drone attacks.”

drone_map

It should be noted though that the numbers represent an estimate which were compiled with the help of the nonprofit Bureau of Investigative Journalism. Sources in Washington apparently offer a wide range of numbers, and the State Department remains hush hush on the issue of casualties. However, the estimates presented in this infographic still present a stark and sobering picture:

  • Yemen: at least 552 killed between 2002 and 2013. The site of the first ever drone strike in 2002.
  • Pakistan: at least 2,561 killed between 2004 and 2013.
  • Somalia: at least 23 killed between 2011 and 2012.

drone_map1Naturally, it is hoped that Obama’s promise to curb the use of drones represents a renewed commitment to comply with international law, treaties and human rights. However, what was apparently missing from the speech was an indication about how easy it will be to get information about strikes that are made in the future. According to the New York Times’ Mark Mazzetti, who provided live analysis of the speech, Obama’s speech didn’t address the issue:

One of the big outstanding questions is just how transparent the Obama administration will be about drone strikes in the future. Will administration officials begin to publicly confirm strikes after they happen?

There was no mention of this in the speech, and it is telling that the president did not mention the C.I.A. at all. It seems quite certain that past operations in Pakistan, Yemen and elsewhere are not going to be declassified anytime soon.

Also, moving operations from the C.I.A. to the Pentagon does not automatically mean that the strikes will be publicly discussed. The Pentagon is carrying out a secret drone program in Yemen right now, and it is very difficult to get information about those operations.

So… promises to curb the use of drones have been made, as well as promises to create some kind of oversight for future operations. And this does seem consistent with many of the criticisms made about the ongoing war on terrorism, specifically the Bush administrations handling of it and how his reliance on special executive powers were unlawful and unconstitutional.

But until such time as information on how these strikes occur and who is being killed, the issue will remain a contentious and divisive one. So long as governments can wage war with automated or remote machinery and kill people without transparency and in secrecy, will this not constitute a form of illegal – or at the very least, a very opaque – warfare?

Sources: wired.com, fastcoexist.com, businessweek.com