Share This

Showing posts with label US spying. Show all posts
Showing posts with label US spying. Show all posts

Sunday, 31 August 2014

China can weigh reconnaissance on US



China and the US started a two-day meeting at the Pentagon on Wednesday to negotiate a code of conduct on the high seas, in the wake of a Chinese fighter jet intercepting a US spy plane near the Hainan Island. Although the meeting was set up before this incident, it is believed the near-miss will make a difference during the negotiations.

Given the fact that Washington's determination to continue its short-range surveillance of China is as strong as China's commitment to drive US planes away, whether the 2001 mid-air collision could recur has become a Sword of Damocles above their heads.

The new strategic trajectory of Asia-Pacific, namely China is growing stronger and a containment circle drawn by the US and its allies is taking shape, is changing the mindsets of both sides to define specific conflicts. If the 2001 incident happened again, the possibility of an all-out crisis between both sides will increase.

China's rise is increasing the odds that China and the US are sliding into "mutual distrust." A feasible way to avoid such a crisis is that both sides should reduce the chances that their vessels and planes engage in confrontation in international seas and airspace.

As of now, the confrontations usually happen in Chinese coastal waters and air spaces. The US takes it for granted, but China feels its core interests are being challenged.

There are two ways to address this kind of disputes: Washington withdraws its surveillance to an extent that China can accept, or China develops its surveillance technology and starts military reconnaissance near US territories. The latter option has become increasingly possible as China's military technologies are advancing.

There is no doubt that Washington will find more evidence to prove that China and the US can only be adversaries, and it is possible that more conflicts will make both sides lose control of the situation. But China has no choice if Washington doesn't restrain itself.

It seems that both China and the US are willing to build a strategic mutual trust, but the communication mechanisms are not working well.

The US says it has no plan to contain China, and China also says it has no intention to drive US out of Asia. But the US wants to maintain its absolute superiority in strength, and China is sparing no effort to bridge the gap.

Thus, it is hard for Washington and Beijing to reach a consensus on this issue, and they have to get used to each other.

But Washington must note that making troubles on China's doorstep can only stir up China's determination to defend its legitimate interests. In this regard, the US is much less determined than China.

China can put up a tough stand against the US in this short-range surveillance matter, and develop its capability to conduct such surveillance to the US as soon as possible, as long as China will not threaten the national security of the US.

Source:Global Times Published: 2014-8-28 0:33:01

Related:

China military aircrafts flys monitering US Japan spy planes fighters over China Air Defense Zone



Reconnaissance damages trust

Unless the US gives up its surveillance missions against China it will be very difficult for the two countries to build the mutual trust needed for healthy bilateral relations.

Surveillance spoils military engagement

China cannot stop US reconnaissance, but can take countermeasures. If the US is sincere about building up a major power relationship with China, it should adopt a more restrained manner.

Thursday, 20 March 2014

NSA's secret MYSTIC system is capable recording 100% of foreign country's telephone calls



WASHINGTON, D.C. – The United States National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine – one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

 http://wapo.st/1gyqVaz

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Barack Obama put it in January. By design, they vacuum up all the data they touch – meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an emailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.”

Some of the documents provided by Snowden suggest that high-volume eavesdropping may soon be extended to other countries, if it has not been already. The RETRO tool was built three years ago as a “unique one-off capability,” but last year’s secret intelligence budget named five more countries for which the MYSTIC program provides “comprehensive metadata access and content,” with a sixth expected to be in place by last October.

The budget did not say whether the NSA now records calls in quantity in those countries, or expects to do so. A separate document placed high priority on planning “for MYSTIC accesses against projected new mission requirements,” including “voice.”

Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from U.S. citizens who telephone, visit and work in the target country. It may also be seen as inconsistent with Obama’s Jan. 17 pledge “that the United States is not spying on ordinary people who don’t threaten our national security,” regardless of nationality, “and that we take their privacy concerns into account.”

In a presidential policy directive, Obama instructed the NSA and other agencies that bulk acquisition may be used only to gather intelligence on one of six specified threats, including nuclear proliferation and terrorism. The directive, however, also noted that limits on bulk collection “do not apply to signals intelligence data that is temporarily acquired to facilitate targeted collection.”

The emblem of the MYSTIC program depicts a cartoon wizard with a telephone-headed staff. Among the agency’s bulk collection programs disclosed over the past year, its focus on the spoken word is unique. Most of the programs have involved the bulk collection of either metadata – which does not include content – or text, such as email address books.

Telephone calls are often thought to be more ephemeral and less suited than text for processing, storage and search. Indeed, there are indications that the call-recording program has been hindered by the NSA’s limited capacity to store and transmit bulky voice files.

In the first year of its deployment, a program officer wrote that the project “has long since reached the point where it was collecting and sending home far more than the bandwidth could handle.”

Because of similar capacity limits across a range of collection programs, the NSA is leaping forward with cloud-based collection systems and a gargantuan new “mission data repository” in Utah. According to its overview briefing, the Utah facility is designed “to cope with the vast increases in digital data that have accompanied the rise of the global network.”

Christopher Soghoian, the principal technologist for the American Civil Liberties Union, said history suggests that “over the next couple of years they will expand to more countries, retain data longer and expand the secondary uses.”

Spokesmen for the NSA and the Office of Director of National Intelligence James Clapper declined to confirm or deny expansion plans or discuss the criteria for any change.

Based on RETRO’s internal reviews, the NSA has strong motive to deploy it elsewhere. In the documents and interviews, U.S. officials said RETRO is uniquely valuable when an analyst first uncovers a new name or telephone number of interest.

With up to 30 days of recorded conversations in hand, the NSA can pull an instant history of the subject’s movements, associates and plans. Some other U.S. intelligence agencies also have access to RETRO.

Highly classified briefings cite examples in which the tool offered high-stakes intelligence that would not have existed under traditional surveillance programs in which subjects were identified for targeting in advance. Unlike most of the government’s public claims about the value of controversial programs, the briefings supply names, dates, locations and fragments of intercepted calls in convincing detail.

Present and former U.S. officials, speaking on the condition of anonymity to provide context for a classified program, acknowledged that large numbers of conversations involving U.S. citizens would be gathered from the country where RETRO operates.

The NSA does not attempt to filter out their calls, defining them as communications “acquired incidentally as a result of collection directed against appropriate foreign intelligence targets.”

Until about 20 years ago, such incidental collection was unusual unless a U.S. citizen was communicating directly with a foreign intelligence target. In bulk collection systems, which are exponentially more capable than the ones in use throughout the Cold War, calls and other data from U.S. citizens and permanent residents are regularly ingested by the millions.

Under the NSA’s internal “minimization rules,” those intercepted communications “may be retained and processed” and included in intelligence reports. The agency generally removes the names of U.S. callers, but there are several broadly worded exceptions.

An independent group tasked by the White House to review U.S. surveillance policies recommended that incidentally collected U.S. calls and emails – including those obtained overseas – should nearly always “be purged upon detection.” Obama did not accept that recommendation.

Vines, in her statement, said the NSA’s work is “strictly conducted under the rule of law.”

RETRO and MYSTIC are carried out under Executive Order 12333, the traditional grant of presidential authority to intelligence agencies for operations outside the United States.

Since August, Sen. Dianne Feinstein, D-Calif., the chairman of the Senate Intelligence Committee, and others on that panel have been working on plans to assert a greater oversight role for intelligence gathering abroad. Some legislators are now considering whether Congress should also draft new laws to govern those operations.

Experts say there is not much legislation that governs overseas intelligence work.

“Much of the U.S. government’s intelligence collection is not regulated by any statute passed by Congress,” said Timothy H. Edgar, the former director of privacy and civil liberties on Obama’s national security staff. “There’s a lot of focus on the Foreign Intelligence Surveillance Act, which is understandable, but that’s only a slice of what the intelligence community does.”

All surveillance must be properly authorized for a legitimate intelligence purpose, he said, but that “still leaves a gap for activities that otherwise basically aren’t regulated by law because they’re not covered by FISA.”

Beginning in 2007, Congress loosened 40-year-old restrictions on domestic surveillance because so much foreign data crossed U.S. territory. There were no comparable changes to protect the privacy of U.S. citizens and residents whose calls and emails now routinely cross international borders.

Vines noted that the NSA’s job is to “identify threats within the large and complex system of modern global communications,” where ordinary people share fiber-optic cables with legitimate intelligence targets.

For Peter Swire, a member of the president’s review group, the fact that U.S. citizens and foreigners use the same devices, software and networks calls for greater care to safeguard privacy.

“It’s important to have institutional protections so that advanced capabilities used overseas don’t get turned against our democracy at home,” he said.

© 2014, The Washington Post/http://www.ticotimes.net

Related post:

Saturday, 2 November 2013

NSA secretly hacks, intercepts Google, Yahoo daily

The United States’ National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers worldwide. That’s according to documents released by former NSA contractor, Edward Snowden, The Washington Post reports.

Video: NSA intercepts Google, Yahoo traffic overseas report | The National
 http://shar.es/IxZIJ



According to the documents, the agency and its British counterpart GCHQ, through a project called MUSCULAR, collected data stored on Google and Yahoo servers. That allowed both governments access to hundreds of millions of user accounts from individuals worldwide.

“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” RT cites the Post’s Barton Gellman and Ashkan Soltani.

A January 9th document says that in the preceding 30 days, collectors had processed over 181 million pieces of information, including both metadata and the actual contents of communications.

The government can already request information from phone or data through the FISA Amendments Act but this data collection would ostensibly take place without Google and Yahoo even being aware of it.

When you send email or store files with an internet company, that data is regularly shared among servers around the world, in order to ensure quick access to your information from wherever you happen to be. Google and Yahoo run customized private networks to shuttle that information around, passing between and within countries, as the Post indicates in a graphic. To move that information, the companies use fiber optic connections, light-speed networks running over thin glass cables. According to the Post, it’s those connections that the NSA is able to monitor. None of Yahoo’s inter-server traffic is encrypted. Not all of Google’s is either.

The MUSCULAR program, according to Wednesday’s leak, involves a process in which the NSA and GCHQ intercept communications overseas, where lax restrictions and oversight allow the agencies access to intelligence with ease.

“NSA documents about the effort refer directly to ‘full take,’ ‘bulk access’ and ‘high volume’ operations on Yahoo and Google networks,” the Post reported. “Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner”.

The Post points out that company staffers were surprised and angry to hear that their their networks had been compromised. Google said that it was “troubled by allegations of the government intercepting traffic between our data centers”.

The report comes amid a storm of protest about NSA surveillance both at home and overseas of phone and Internet communications.

On Tuesday, US officials said reports that American spy agencies snooped on millions of Europeans were false.

Alexander told lawmakers that in many cases European spy agencies had turned over phone records and shared them with US intelligence.

Related posts:

1. USA Spying, the Super-Snooper ! 
2. Abusing intelligence is stupid
3. Upset over US cyber spying!
4.US Spy Snowden Says US Hacking China Since 2009 
5.US building new spy wing to focus on Asia 

Thursday, 31 October 2013

USA Spying, the Super-Snooper !


The United States is running clandestine communications intelligence facilities at its embassies in Kuala Lumpur, Jakarta, Bangkok, Phnom Penh and Yangon.

The country is doing so by tapping telephones and monitoring communications networks from electronic surveillance facilities in US embassies and consulates across east and south-east Asia, according to information disclosed by intelligence whistleblower Edward Snowden.A top secret map dated August 13, 2010 lists nearly a hundred surveillance facilities worldwide, the map however, shows no such facilities are located in Australia, New Zealand, Britain, Japan and Singapore – the US’s closest allies.

Snoopy the Snooper

According to the map published by Germany’s Der Spiegel magazine today, a joint Central Intelligence Agency (CIA) – National Security Agency (NSA) group known as ” Special Collection Service” conducts the sweeping surveillance operation, as well as clandestine operations against specific intelligence targets.The map, which was initially published in full on Der Spiegel‘s website but subsequently replaced with a censored version, lists Special Collection Service facilities at 90 locations worldwide, including 74 manned facilities, 14 remotely operated facilities and two technical support centres.

The map confirms the global reach of US signals intelligence operations with special collection facilities located in most major capitals on every continent.Read the full story here


By Hanin Fadiyah@www.harakahdaily.com

Related posts:
1. Abusing intelligence is stupid
2. Upset over US cyber spying!
3.US Spy Snowden Says US Hacking China Since 2009 
4.US building new spy wing to focus on Asia 

Rightways