Friday, June 14, 2013

Biggest Thief Sues First, Again

For the last year or so, the US had been increasingly claiming of massive 'computer hacking' and 'computer spying' coming out of China and the Chinese had been stealing trade secrets etc through those hackings.

The US claimed their security experts found that most of the hackings were coming from 'IP addresses' known to be from a building in China 'associated' with the Chinese military (dumb Chinese fellas, do everything from one place unlike smart Americans - see below)

In the lead up to last week's China's leader Xi JinPing's visit to the US, media reports were saying that 'hacking' was going to be a major issue the US will raise at the meeting.

But just days before that meeting, news broke that the US government (through its National Security Agency or NSA) has been conducting large scale 'monitoring' (as opposed to 'hacking' or 'spying') of telecommunications inside and outside the US, and internet sites like Facebook, Google, Twitter etc were giving the NSA access to their user database.

US officials initially claimed that the monitoring were not targetted at American citizens, are 'focused' (i.e. not indiscriminate) and done only with 'court apporval', and are done only to 'protect the safety of Americans' (i.e not to spy on others etc).

Websites like Facebook initially claimed there was no such thing (but went quiet after that).

A day or so after the news broke, the 'whistle blower' came out in public in Hong Kong (of all places) and said (among others) that :
 - 97 billion 'pieces of information' was gathered worldwide in one month and 3 billion were from computers within the US (i.e. average 8 'pieces' for every US citizen)
 - people like him can tap into any e-mail or phone call of anyone including the president

With access to user data in those American 'social websites' they have access to who is related to who and was doing what at what time etc. All voluntarily provided by billions of suckers around the world! Only Chinamen needs to hack...

The whistle blower was an ex-CIA employee working for Booz-Allen, the private company contracted by the NSA to supply people to work on the monitoring programme operating out of countries all over the world (not just from inside the US) like Switzerland.

See, people so smart. They don't use military staff and they operate from outside the US so that it is harder to link the perpetrators to the US.

From the 'heat map' below, one notices that the 'most monitored' countries were Egypt, Iran, Pakistan and India. The next highest group included Saudi Arabia, Iraq, China and Germany!

But the US had never accused Eygpt, Saudi, Iraq, India and Germany (all supposedly friends of the US) as 'sponsors of terrorism' nor 'spying' or 'hacking'. So what sort of threat were those countries posing to the 'safety of Americans'?

According to Russsia Times TV, those countries are either key suppliers of oil or economic competitors i.e. the US were conducting espionage (that they accused China of doing).

John Boehner (Speaker of US House of Representatives) was shown today on Bloomberg TV saying that the monitorings are done under 'mountains of controls'. Well, the key word is 'mountains' - you believe mountains can do controls?

Additional Notes:

More than 10 years ago, there were reports that the US, UK and Australia operate a global eavesdropping system that can monitor and tap into any telecommunication around the world.

As the developer of ARPANET (the predecessor of today's internet), the US controls the entire world's internet system and has refused requests by other countries for control to be passed to an international body. There is a reason for that.

For example, the internet is supposedly 'smart' such that every data transmitted through it will find 'mulitple paths' to its intended recipient. Well, may be those data can also be directed by some 'smart' fellas to go pass some people's special servers and get 'saved' along the way?

Over the last few years, the US had also disallowed Chinese telecommunications equipment manufaturers like Huawei to bid for contracts to supply US telecom companies with Chinese made networking equipment including those used for internet data switching and routing. The official reason was for fear of Chinese using those equipments to spy. There are reasons for that too.

As example, how can they tell those Chinese fellas to send a 'copy' of everything to some special 'servers' somewhere without the Chinese knowing about it and telling the whole world?

When the below monitoring news broke, there was reports that since 1999 (if you believe it) the US government has special 'back doors' that allow them to get into the Windows operating system and take anything they want from any computer using that software even if the contents are encrypted.

A famous example was the Stuxnet virus (discovered in 2010) that the US used to 'attack' Iran's nuclear facilities via Windows. Only Iran? So nice?


Article from Zerohedge:
http://www.zerohedge.com/news/2013-06-08/nsas-boundless-informant-collects-3-billion-intelligence-pieces-us-computer-networks

The NSA's "Boundless Informant" Collects 3 Billion Intelligence Pieces From US Computer Networks In One Month



There's one reason why the administration, James Clapper and the NSA should just keep their mouths shut as the PRISM-gate fallout escalates: with every incremental attempt to refute some previously unknown facet of the US Big Brother state, a new piece of previously unleaked information from the same intelligence organization now scrambling for damage control, emerges and exposes the brand new narrative as yet another lie, forcing even more lies, more retribution against sources, more journalist persecution and so on.

The latest piece of news once again comes from the Guardian's Glenn Greenwald who this time exposes the NSA's datamining tool "Boundless Informant" which according to leaked documents collected 97 billion pieces of intelligence from computer networks worldwide in March 2013 alone, and "3 billion pieces of intelligence from US computer networks over a 30-day period."

This is summarized in the chart below which shows that only the middle east has more active NSA-espionage than the US. Also, Obama may not want to show Xi the activity heatmap for China, or else the whole "China is hacking us" script may promptly fall apart.



Using simple, non-AES 256 breaking math, 3 billion per month amounts to some 100 million intrusions into the US per day, or looked at from another perspective, just a little more than the "zero" which James Clapper vouched announced earlier today is the applicable number of US citizens falling under the NSA's espionage mandate: "Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States." Oops.

But it gets worse for the NSA. As the Guardian reports, "Emmel, the NSA spokeswoman, told the Guardian: "Current technology simply does not permit us to positively identify all of the persons or locations associated with a given communication (for example, it may be possible to say with certainty that a communication traversed a particular path within the internet. It is harder to know the ultimate source or destination, or more particularly the identity of the person represented by the TO:, FROM: or CC: field of an e-mail address or the abstraction of an IP address). Thus, we apply rigorous training and technological advancements to combine both our automated and manual (human) processes to characterize communications – ensuring protection of the privacy rights of the American people. This is not just our judgment, but that of the relevant inspectors general, who have also reported this."

In other words, Americans are absolutely the target of billions of monthly intrusions, but said data "mining" is exempted because it is difficult to identify in advance if a US citizen is implicated in any metadata chain.

Only it isn't as it is the whole premise behind Boundless Informant.

An NSA factsheet about the program, acquired by the Guardian, says: "The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country."

The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message.

The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, "What type of coverage do we have on country X" in "near real-time by asking the SIGINT [signals intelligence] infrastructure."

Under the heading "Sample use cases", the factsheet also states the tool shows information including: "How many records (and what type) are collected against a particular country."

A snapshot of the Boundless Informant data, contained in a top secret NSA "global heat map" seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.

Iran was the country where the largest amount of intelligence was gathered, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America's closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.


Next up: more NSA lies of course.

The disclosure of the internal Boundless Informant system comes amid a struggle between the NSA and its overseers in the Senate over whether it can track the intelligence it collects on American communications. The NSA's position is that it is not technologically feasible to do so.

At a hearing of the Senate intelligence committee In March this year, Democratic senator Ron Wyden asked James Clapper, the director of national intelligence: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

"No sir," replied Clapper.

Judith Emmel, an NSA spokeswoman, told the Guardian in a response to the latest disclosures: "NSA has consistently reported – including to Congress – that we do not have the ability to determine with certainty the identity or location of all communicants within a given communication. That remains the case."

Other documents seen by the Guardian further demonstrate that the NSA does in fact break down its surveillance intercepts which could allow the agency to determine how many of them are from the US. The level of detail includes individual IP addresses.

IP address is not a perfect proxy for someone's physical location but it is rather close, said Chris Soghoian, the principal technologist with the Speech Privacy and Technology Project of the American Civil Liberties Union. "If you don't take steps to hide it, the IP address provided by your internet provider will certainly tell you what country, state and, typically, city you are in," Soghoian said.

...

At a congressional hearing in March last year, Alexander denied point-blank that the agency had the figures on how many Americans had their electronic communications collected or reviewed. Asked if he had the capability to get them, Alexander said: "No. No. We do not have the technical insights in the United States." He added that "nor do we do have the equipment in the United States to actually collect that kind of information".

Turns out they do, and that perjury in the US is now merely another facet of the "New Normal." Plus what difference does it make that yet another member of the most transparent administration perjured themselves. Then again, when the head of the Department of Justice is being investigated for lying to Congress under oath, one can only laugh.

That laughter risks becoming an imbecilic cackle when reading the following veiled threat to the Guardian from the NSA's Judith Emmel: "The continued publication of these allegations about highly classified issues, and other information taken out of context, makes it impossible to conduct a reasonable discussion on the merits of these programs."

In other words, the best discussion is one that would simply not take place as reporters should promptly stop actually reporting, and fall back to their New Normal role of being access journalists to important people (see Andrew Ross Sorkin's rise to fame on... nothing) with zero critical insight or investigative effort. Or else...

No comments: