The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.
In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,” reads one top secret 2010 National Security Agency document.
These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content:
Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect.
The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists:
INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting:
A = Indian Diplomatic & Indian Navy
B = Central Asian diplomatic
C = Chinese Human Rights Defenders
D = Tibetan Pro-Democracy Personalities
E = Uighur Activists
F = European Special Rep to Afghanistan and Indian photo-journalism
G = Tibetan Government in Exile
In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.”
In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.”
In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document.
GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker.
Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.”
GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
The GCHQ document states that they “currently have a list of around 60 blog and Twitter sources” that were identified by analysts for collection. A prototype of the LOVELY HORSE program ensured that “Twitter and (and subject to legal/security approval) blog content [was] manually scraped and uploaded to GCDesk.” A later version would upload content in real time.
Several of the accounts to be mined for expertise are associated with the hactivist collective Anonymous. Documents previously published by The Intercept reveal extensive, and sometimes extreme, tactics employed by GCHQ to infiltrate, discredit and disrupt that group. The agency employed some of the same hacker methods against Anonymous (e.g., mass denial of service) as governments have prosecuted Anonymous for using.
A separate GCHQ document details the open-source sites monitored and collected by the agency, including blogs, websites, chat venues and Twitter. It describes Twitter monitoring undertaken for “real-time alerting to new security issues reported by known security professionals, or planned activity by hacking groups, e.g. Anonymous.” The agency planned to expand its monitoring and aggregation program to a wide range of web locations, including IRC chat rooms and Pastebin, where “an increasing number of tip-offs are coming from . . . as this is where many hackers anonymously advertise and promote their exploits, by publishing stolen information.”
One classified document casts serious doubt on warnings about the threat posed by Anonymous (in early 2012 then-NSA chief Keith Alexander reportedly warned that Anonymous could shut down parts of the power grid).
That document, containing “talking points” prepared by Jessica Vielhuber of the National Intelligence Council in September 2011 for a NATO meeting on cyber-threats, describes the threat from Anonymous as relatively small. “Although ‘hacktivist’ groups such as Anonymous have made headlines recently with their theft of NATO information, the threat posed by such activity is minimal relative to that of nation-states,” she wrote.
In response to The Intercept‘s questions, an agency spokesperson said that “NSA will not comment on the Intercept’s speculation,” and noted that NSA “defends the nation and our allies from foreign threats while going to great lengths to safeguard privacy and civil liberties.” The spokesperson added that “over the last year, at the president’s direction, the U.S. intelligence community engaged in an unprecedented effort to examine and strengthen the privacy and civil liberty protections afforded to all people, regardless of nationality.”
GCHQ declined to answer questions for this article, or to comment on the programs involved, but instead provided a boiler plate statement, which says the agency’s work is legal and subject to government oversight. “It is longstanding policy that we do not comment on intelligence matters,” the agency notes.
———
Documents published with this article:
———
Morgan Marquis-Boire contributed reporting to this article.
Illustration: Getty Images
OT: If Jon Stewart still wanted to work in high-end show business, but be able to ease off and almost just phone it in for the next 10 or 15 years while his children are growing up, then Stephen Colbert may have found his perfect Guillermo. I’m just saying – they would own late night, again, at least mine.
and still investigating wikileaks….strange bedfellows….strange morals…strange motivations…
Why the continuing secret criminal investigation of WikiLeaks is troubling for journalists
Well, they are doing us the favor to do it for “the greater good” ™, right?
…
…
so, you go up to him and argue with him about … Hmm! What exactly?
(our glorious Mr. President) Sr. I don’t know what you are talking about. Are you OK? … and by the way your duly elected representatives have done you the favor to classify all that information under layers and layers of secrecy (Heck! We did such a great job, not even lawmakers knew about it!); so, do yourself the favor to keep busy your mind with facebook, the latest and greatest b#llsh!t about celebrities and such things and leave that to us …
Satyagraha
RCL
I’m probably going to get a lot of hate for this, but I didn’t see anything very newsworthy in this piece.
1. Spy agencies keep the data they steal from their targets…No kidding
2. Spy agencies use free, public information…What’s the problem?
3. Anonymous isn’t as dangerous as the spy agencies/government/ media say they are…This should be apparent to anyone following Anonymous.
What’d I miss? Also, how do you block text in this forum?
Too Short; Want More:
->“Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,” reads one top secret 2010 National Security Agency document.
Unethical, probably, but illegal, I’m not sure. I suppose the ‘right’ thing to do is to tell the people their email had been hacked, or is it to not monitor hackers? I’m having a hard time seeing
->INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims.
Were those the only targets? If so, does that mean CSEC was only targeting Chinese/Asian Hackers? Isn’t that what a spying agency is supposed to do? Again, what would be the preferred approach here, assuming we can agree there should be a national InfoSec department.
->In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge.
If I’m not mistaken, isn’t this what open-source information is for? I don’t see why everyone except the government should be able to access this information. Following twitter accounts, aka “[mining] for expertise”, is what everyone who uses Twitter is using it for. Getting real-time and immediate information from trusted sources is an standard across many infomation reliant industries. I fail to see the issue. I suppose if the account ‘Fancy Horse’ was going around making false claims or misdirecting people to the benefit of the NSA that would be pretty underhanded, but I didn’t read that above.
Interesting that this article appears just as the Anthem hack is emerging.
http://www.theguardian.com/us-news/2015/feb/05/millions-of-customers-health-insurance-details-stolen-in-anthem-hack-attack
To those readers outside the US, this is a VBFD indeed. I’m left wondering if (1) all this marvelous official skulduggery is failing to stop these kinds of breaches or (2) whether turning a new generation of hackers loose might have some of them tempted to do a little moonlighting? Press accounts of the Anthem affair still don’t say conclusively who dunnit. Saying the Chinese dunnit, the going theory right now, sort of sounds like rounding up the usual suspects.
Captain’s Log, Supplemental. More reflections on the Anthem hack affair.
http://www.cnn.com/2015/02/06/opinion/sutter-anthem-hack/index.html
To continue my earlier thought: following hackers around and letting this mischief go on in the name of national security — no, no, we weren’t following this particular bunch, we never do, now move along — may foster more of this stuff without doing one thing to protect the economy if not the US public? That is what gov’t is supposed to do sometimes, isn’t it? This is sort of like the FBI following Bonnie and Clyde around and taking notes on their movements and techniques, but not actually stopping the holdups.
Meantime, a lot of health subscribers are now feeling a bit queasy.
Judging from the list of INTOLERANT targets, it is apparent that the hackers are Chinese; nice to see Washington and Beijing working together, for once.
It now srikes me that the Nsa probably looked into me, for talking to AnonOps and LulzSec.
Perhaps that is the reason that five of my computers spun themselves to death.
What would happen was that I would get a Blue Screen (The screen of Death) and then my hard drive would spin at such a rate that the noise was so intense as to be a sonic warning.
after this all information was lost. Indeed my OS was destroyed and no info could be obtained from trhe hard drives.
““Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,””
How long before it’s reciprocal and talented hackers can access to everything on the NSA databases ?
Think of a life before computers and cell phones. Think of a sense of community. Yes this is impossible.
Sweden: There is no limit on how long we can detain someone without charge,
https://wikileaks.org/Sweden-Tells-the-UN-that.html … #Assange
I think many of us would appreciate it if Glenn Greenwald would kindly write something about the limitless detention of Julian Assange.
Yes, I personally would also appreciate it, and not just because without Wikileaks Edward Snowden would have been utterly screwed.
http://www.democracynow.org/2014/7/1/exclusive_wikileaks_editor_sarah_harrison_on
Exclusive: WikiLeaks Editor Sarah Harrison on Helping Edward Snowden, Being Forced to Live in Exile
Sarah Harrison Wikileaks Warrioress. Is there a braver person on the planet.
I believe I am pretty excited someone like you has visited a site like this
What would you like him to write?
Just two questions. 1. does this make these spy agencies accessory to a hackers crime? Isn’t withholding information pertaining to a crime constitute collusion?
So sorry. Completely off topic, but burning curiously about a doofus named a. jay adler.
Just watching a bunch of Hitchens videos and commentary about his lust for shameless, immoral war. I clicked over to an piece where said doofus rips on Glenn for his comments about Hitchens and the propriety of speaking ill of the dead. What an punk asshole. I’ve done my best to find some spirited criticism regarding a. jay doofus, but it looks as if he has gone to great lengths to close comments and shield his dainty eyes from rudish people who might just disagree with his take.
I dunno. This seems controlling and cowardly. I’d appreciate it if anyone can steer me to a forum where I might have a go.
Thanks
A pattern emerges: we are pedaled ‘evidence’ by our leaders and their minions in the press of some hate-filled group something some hateful thing, only to find out that the threat from that group was actually overstated (or just plain fabricated), and that it is our leaders themselves who are guilty of the terrible thing. Over and over this occurs, across various platforms and issues. Wake up US, you are being lied to on a daily basis. Ask yourselves: Why?
(S//REL NATO) Although “hacktivist” groups such as Anonymous have made headlines recently with their theft of NATO information, the threat posed by such activity is minimal relative to that of nation-states. ENDQUOTE
Explain that to the regime judges who railroaded Jeremy Hammond and Barrett Lancaster Brown.
QUOTE: (S//REL NATO) One area of concern, however, is the possibility of nation-states using hackers as proxies for their own operations. Difficulties with real-time
attribution make it difficult to quickly identify threats, meaning that cyber espionage or cyber attacks can be disguised as cyber-crime or patriotic hacking
activity. The example of Russian nationalist hackers targeting Estonia and Georgia serves to underscore this concern. ENDQUOTE
Here the Five Eyes are referring to the NATO countries (US / UK) were in charge of LulzSec / AntiSec from June 8, 2011 through March 7, 2012, to whom their agents provided the target lists (incitement) and occasionally, servers for the hacks (Stratfor). The US and UK used LulzSec and AntiSec as proxies, and fears similar online false flag proxy ops against their infrastructure.
In these articles the “target” is always assumed. How does one become a target? Is there a list of “Targeted Individuals?” Do these people get together and swap lists?
Also, I heard that Hillary and the State Department were stealing credit cards from people at the UN. What happened with that? We invite people to the US and then rob them?
How about a little follow up? Road trip to NY? Stop by the UN, get a couple quotes, do lunch, visit friends?
Reporting doesn’t have to be a bore. Do your job. Have some fun.
Lovely Horse is probably a reference to the wonderful 90’s Channel 4 TV series Father Ted (Graham Linehan/Arthur Matthews). There’s a song called “My Lovely Horse” in one of the episodes (Eurovision song contest parody). Pretty much everyone in the UK, and certainly a typical GCHQ employee, would be familiar with it. It’s very catchy.
Father Ted | My Lovely Horse | Channel 4 http://youtu.be/jzYzVMcgWhg
You may well be right. I dont know that refeference you gave
However I believe even in Briton a hack is a stock, (work) horse.
All the pretty horses is still a great book and a damned fine movie well acted by Matt Damon.
It seems to me that the NSA and GCHQ have adopted Dick Cheney’s mantra that “the ends justify the means”, “while going to great lengths to safeguard privacy and civil liberties.”
See If This post sticks.
Thank you for the article and the tabling of the Snowden Documents. Much appreciated.
“All the Pretty Horses” is a book by Cormack McCarthey and a film directed by Billy Bob Thorton and must have some connection to Lovely horse.
In it, wild mustangs are broken and they are then able to be riden as work horses (Known as hacks in Australian)
From The Lovely horse doc I notice LulzSec gets a mention.
If you make your enemy your friend all good things will come.
Sabu sold out but I bet they gave him the FBI standard offer. Work for us or we fuck you over big time.
Interesting back in my activist days I went to AnonOps and tryed to get them to hack Murdock”s News Corp.
LulzSec sent me two emails saying No can do for we will only hack the hackers.
The FBI sems to have used Sabu to eventually finish off the News Of The World.
http://en.wikipedia.org/wiki/Hector_Monsegur
Hector Xavier Monsegur (born 1983),[1] known also by the online pseudonym Sabu (pronounced S?’bu?, Sæ’bu?),[2] is an American computer hacker and co-founder of the hacking group LulzSec.[3] He later turned informant for the FBI, working with the agency for over ten months to aid them in identifying other hackers from Lulzsec and related groups.[4] LulzSec intervened in the affairs of organizations such as News Corporation, Stratfor, UK and American law enforcement bodies and Irish political party Fine Gael.[5]
Sabu featured prominently in the group’s published IRC chats,[6][7] and claimed to support the “Free Topiary” campaign. The Economist referred to Sabu as one of LulzSec’s six core members and their “most expert” hacker.[8]
snip
If you cant trust a hacker who can you trust.
Considering the fact that LulzSec and AntiSec were under the FBI’s direct command and control through their handler Sabu from June 8, 2011 through to the arrests of March 2012 (incidentally when the online false flag template that described the Stratfor hack to a T was released – https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/ – within GCHQ, whose surveillance and involvement led to the arrest of several LulzSec & AntiSec members in the UK), this brings into question the the legality the government giving them a list of targets (incitement), telling them what to write about their hacks and create a hysteria on proper social media (via Sabu – in violation of the Smith Mundt Act of 1947), and in the case of Stratfor, being an accessory before, during and after the fact and also providing material assistance – namely the server *some* of the emails (the ones the executives and government had no problem going public for counterintelligence purposes) were placed on and transferred to Wikileaks without interruption.
It also brings into question the secretive show trials of the clearly entrapped Jeremy Hammond and the entirely innocent “thought criminal” Barrett Lancaster Brown.
It is interesting how Brown, and not the FBI agents and other respective agencies’ agents that took part in the online false flag, I mean staged hack to take down General Petreus (http://whowhatwhy.org/2013/02/05/petraeus-the-plot-thickens-1/) – through a crafty online false flag operation to also cause fear and division within Anonymous with their turning of Sabu, entrap Hammond and make him into the most “dangerous hacker in the world” by watching him carry out their orders to Sabu and attacking their target list(s), frame Brown for silencing, and feed Wikileaks malware and exploits via emails from the *FBI’s own server* – is “guilty” as an accessory after-the fact.
Not to mention that the FBI and almost certainly other agencies were accessories before, during and after the hack according to main stream media reports, including the Daily Dot and whowhatwhy.org, and the highly redacted court transcripts from the secretive proceedings themselves.
Through Wikileaks publishing the emails, a media parallel construction case was made to discredit Petreus, just as Computer Fraud and Abuse Act parallel construction was created for Hammond and Brown via the government’s absolute command and control over Sabu, and his issuing target lists (incitement), including Stratfor after the hacker hyrriah breached their system on December 5, 2011. The company was hacked on behalf of the government, and the government watched and materially assisted the hack and email transfer.
This hack has the government’s hands all over it, as does the Syria government hack, which was carried out while Sabu was working the 2,000+ target list, Syria hack of course to mobilize public opinion for military intervention.
The government provided the server on which *some* of the company emails were placed on, namely the emails the government and some company executives had no problem going to Wikileaks for counter-intelligence purposes (http://www.activistpost.com/2012/03/anonymous-hackedwikileaks-released.html).
While emails the government and certain executives had a problem with the world seeing went to a other server(s) and miraculously did not make it to Wikileaks on a silver platter.
One major question is why people still believe the “incompetence theory” regarding both the government and some executives when all they had to do was pull the plug at any point before or during the hack, when it was agreed within AntiSec that no money would be exchanged for anything AntiSec hacked long before the FBI server to Wikileaks email transfer so the entrapment of Assange was never an option.
This makes it is clear that the class action settlement was made in bad faith as it did not disclose the other server(s) (you guys may want to FOIA this fact – puts a whole new light on the false flag, I mean “hack”), and the Verizon report being a purple unicorn show as the FBI could have provided all of the information regarding the hack and all failures, for free, being that they watched the hack take place real-time.
That the Verizon report was “leaked” seems to make it almost without question a government plant to perpetuate the “incompetence theory” and the fake narrative Sabu (as his plea and freedom hinges on the perpetuation of the “incompetence theory”), the government, and Hammond and Brown’s prosecutors’ carefully crafted and continued, and continue, to perpetuate to deceive the public regarding their monstrous abuse of surveillance powers, their violation of the Computer Fraud and Abuse Act, their violation of the Smith Mundt Act of 1947 by feeding lies to the public from December 24, 2011 through to today, namely the violation of the Smith Mundt Act of 1947, United States Code Title 18, Part I, Chapter 13, Sections 241 & 242 (http://www.lneilsmith.org/18usc.html) for over 800,000 US citizens,
bulk violation of the 4th Amendment for over 800,000 citizens, Title 18, United States Code, Sections 1030 (a)5 (A), 1030 (c) 4 (B) (i), and C 4 (A) (i) (I), the entrapment of Hammond, and his and Brown’s malicious prosecution and false imprisonment – because the government doesn’t like their opinions.
An important question to ask is what the State Department was doing at the company and talking about with certain executives in the summer of 2011 “coincidentally” just after Sabu became LulzSec and AntiSec’s (http://www.scribd.com/doc/85351496/Timeline-of-ANTISEC-as-Created-and-Operated-Under-FBI-Supervision) *handler*? Also an interesting FOIA request for The Intercept, and picking up where Michael Hastings left off as he was investigating the government’s Stalinist show trial of Brown and its background at the time of his murder.
I refer readers to Sabu’s chat with m45t3rs4d0w8: http://cryptome.org/2014/05/sabu-m45t3rs4d0w8-2012-0330-0524.pdf:
(5:04:25 AM) Sabu: Man I tell you. When I finally get a chance to speak a lot of truth is going to blow peoples minds
(5:23:29 AM) m45t3rs4d0w8: other issue is how did the FBI let you do the things you did
(5:23:45 AM) m45t3rs4d0w8: that is, that is “claimed” you did :P
(5:23:56 AM) m45t3rs4d0w8: while you were “working” for them
(5:24:25 AM) Sabu: Mhm
(5:26:02 AM) m45t3rs4d0w8: the legal documents
(5:26:11 AM) m45t3rs4d0w8: they dont have dated signatures
(5:26:23 AM) m45t3rs4d0w8: or a witness to the signing /dated signature
(5:26:34 AM) m45t3rs4d0w8: also yours are different from some of the others
(5:26:49 AM) m45t3rs4d0w8: from same area/office
(5:27:00 AM) m45t3rs4d0w8: makes me think they are fake
(5:27:17 AM) Sabu: Good things to question. Sadly no one is questioning like you are
(8:40:40 AM) Sabu: and they’re doing shit with little court restrictions
(8:41:01 AM) Sabu: they’ll go through your entire life and your girlfriends and your parents and her parents and your old boss until they find a scrap of evidence against you
(8:41:07 AM) Sabu: then find a way to blackmail your ass
(8:41:15 AM) Sabu: im not even fucking exagerating
(8:41:24 AM) Sabu: I’m disgusted by what I’ve seen
It would be great for The Intercept to interview Sabu on all aspects of what the FBI and likely other agencies were telling him to do, in particular, the Stratfor hack and how and why it went down and who the real targets were, as the Stratfor hack, and the perpetuation of the “incompetence theory” (both government and corporate) is what is keeping both Hammond and Brown in false imprisonment.
You can’t trust a hacker. I’ read almost all his books, but how can you put a face to a profile on this site. Even if it is my drivers license?
I am not a journalist, nor an accomplished writer.
I am, however, compelled to strike keys in an attempt to codify a state of intense disease.
Perhaps, the term “unease” might be expected, yet “disease” forces itself as appropriate and is demanded, given the subject.
The problem is codifying the subject of the disease, for the subject is immense in scope, prone to almost omnipotent defense an is meekly opposed by a force for cure immobilized by spurious impotence.
Canadians are dubious of American “patriotism,” for we watch, as America slaughters innocents citing preservation of “exceptional” democracy.
Canadians are not patriotic. We are amniotic.
The last generation of Canadians subject to the foul, bloodied Crown of England will soon pass.
Those still clinging to the propaganda of power bestowed by the Crown will be shunned by a brood eager to overcome their impotence.
Iraq was not a just war. Canada understood. Rather, Chretien understood.
Afghanistan was not a just war. Canada followed. Rather, Harper, while butt-kissing the blatantly criminal Bush administration, sent our force of heretofore “peace-keepers” into a meat grinder.
Patriotic American politicians install statutes eroding their Constitution’s principles by offering up that very Constitution as justification for corrupt, criminal foreign policy, warmongering, torture, invasion of privacy, suspension of habeas corpus, preservation of fractional reserve banking, mass murder, et cetera, ad nauseam, ad infinitum.
Bill C-51 effectively imprisons Canadians in the same concentration camp inhabited by Americans since September 11, 2001.
We are separated only by a fence, watching one another emaciate as the “defenders” of the Constitution and Charter of Rights and Freedoms grow fat.
The disease is tyranny, on both sides of the border.
Emancipation is within the power of those under the yoke.
Or, Canadians may re-elect Harper and Americans may watch, complacently, as the Bush family steals another American election in 2016.
Be prepared for another apocalyptic “terrorist” attack soon after this next Bush coronation.
Cheney, Rumsfeld, Wolfowitz, et al, wait patiently….
Thank you.
You say “nor an accomplished writer.”
I say well done you.
Yet there is no jest in what you wrote but astute description of the facts put together in a fine form.
“Emancipation is within the power of those under the yoke.”
It will not come from any other faction.
Yeah,I saw today where Canada will repatriate American deserters from the Iraq war back to America,to face trial.
Many years ago as a radio ham I remember that the government, through the FCC, said they encourage hamming because it builds up a “reservoir of electronics experts” which is presumably valuable for the government to lean on. Seems they have the same attitude about hackers. The difference is of course that hams are not thrown in jail; hackers are.
But really, this is more perverse than that. It is more like the situation that was described by a friend of mine, at the time an inmate in a women’s prison. The guards were drug addicts, she says, and they secretly smuggled drugs into the prison to try to get the inmates hooked on them. And then THE VERY SAME GUARDS would search their cells, find the drugs, bust the inmates and they would have to stand trial at this kangaroo court they called an “administrative hearing” and generally would have more time to serve. All for the profit of the (privately operated) prison.
This is like saying, “In order to defeat the Mafia we became the Mafia.” An absolute perversion of justice.
It’s more a case of telling the mafia: ‘from now on, you work for us’. They still get to wet their beak, but the NSA skims the cream off the top.
This is a good business model, although there are always young upstarts trying to horn in on the action. They are either crushed, or if they are good enough, assimilated.
Not sure why you mention justice … how is it relevant to the NSA? It isn’t even relevant to the DOJ.
So they followed the same security news/info related *public accounts* on twitter the rest of us do? Oh, the humanity.
The Gaping Hole In Obama’s FBI Surveillance Reform
Posted: 02/04/2015 9:31 pm EST
by Matt Sledge
http://www.huffingtonpost.com/2015/02/04/national-security-letter-reform_n_6617572.html
You are so right. Keep up the good work.
Multinational corporations engaged in stealing trade secrets employ hackers, usually on contract, and through intermediaries.
Computery talk. I lack any frame of reference for this so I can’t tell if this is supposed to be the equivalent of sitting outside someone’s house in a surveillance car, or looking in their windows, or going through their underwear drawer but with a warrant, or wearing their underwear and also their wife’s makeup and rolling around on their bed taking humorous selfies in it. Going through blogs and Tweets strikes me as pretty mundane, but again, no set of internal standards when it comes to what computer privacy is ‘supposed’ to be.
Do you believe that, Nic?
Did you mean to respond to my comment? Honestly confused because it seems like a different topic, think you might have meant to respond to someone else.
I’m not responding to your specific comment by posting that quote from the above article, I am responding to, and inquiring about, your professed trust in the US government and it’s subsidiaries.
I think we’re having a miscommunication regarding the intent of my comment. I was mostly joking and saying I don’t really know what any of this means, in the way I wouldn’t know what it meant if GG threw out a bunch of sports stats. Those only make sense in reference to some sort of framework – “Oh, that’s really high” or “Oh, that’s really low”, so in the absence of that, there’s nothing to compare them to.
As I told you, I was not replying to or commenting on your comment. So, no, there is no miscommunication, on my part, regarding the intent of your comment. My question was, as stated, do you believe what the NSA agency spokesperson wrote to in reply to The Intercept’s inquiry.
Oh. Perhaps I am just confused by commenting etiquette, I thought it was customary to respond to what I said in my comment. I guess there’s not really a place for sidebars here, though. On the quote, sure, at a surface level my intuition is to believe it’s true, in the same way that, on a surface level, if I read a news article I assume the journalists are printing a story that is true, even though they have been caught lying at times. At a deeper, more philosophical level – what are standards of evidence, isn’t it always best to verify empirical facts for oneself or to have a third party do it, etc., yes, I think that is the gold standard. Sort of like I assume restaurants are not serving me rat infested food cooked at the wrong temperature as a matter of course when I eat out, but I am still happy we have an FDA.
Presuming you don’t generally end up with food poisoning or some other awful discomfort after eating out at a restaurant, you have reasonable evidence to assume that the food you’d eaten was not rat infested. On the other hand, there is an endless supply of evidence that should cause one not to trust something like what that spokesperson was quoted as saying in this article. Same holds true about a vast amount of what is said by government spokespeople or done by our governement. To ignore how often and completely they’ve been proven to be lying is to ignore reality. You’ve oftentimes written that you continue to give more than the benefit of the doubt to government agencies and spokespeople and such, and so that is why I asked.
“Oftentimes”? That’s not my impression, but it’s a subjective term. Similarly, you think the government “oftentimes” lies, more so than other institutions. If you had some kind of comparative data on that, ok, otherwise these are just personal intuitions, which are always shaded by bias and preference and emotion.
I do find the interest of many commenters here, as well as GG’s, in the phenomenon of lying interesting, at a personal level. This is one thing he has in common with Sam Harris, who wrote a whole book on it. I think it’s an interesting study in what values people value most – people with a detail-oriented, empirical bent seem to put a ton of emphasis on strict truth telling as a sort of supreme virtue / concern.
It’s obvious, but just to confirm: the blockquote in my previous comment is inverted.
“Don’t know how it relates?” Now you’re topic trolling. ;) It was just a musing, admittedly a bit of a tangent. I think it’s interesting how relative emphasis on values emerges, and for a lawyer or scientist, on reflection, I see how this follows. They deal in moving around a lot of empirical data.
Anyways, I’m not saying lying is good, just that in the grand scheme of things, I spend little time thinking about it. There are no doubt individuals in any large organization, from companies to governments to religious groups, who do in fact lie at terrible cost to others.
Allow me to answer for Nic, yes he believes it because his head is up his ass, or, he, along with the lying bunch of un-American Tyrants in our government, believes the effect of the statement.
” going through their underware drawer but with a warrant ” is a very suspect statement Nic. You are declaring the loss of our rights is justifiable!
Why did you not answer Kitt’s 04 Feb 2015 at 9:44 pm question Nic?
I believe you are apart of the un-American misleading apparatus of Tyranny.
Gawd. The first thing the Hippie Pinko Commies steal is your sense of humor. And ability to scroll downward to read responses.
Anyways, since conspiracy theories seem to be all the rage around here, let me connect a few dots of my own. This is a tech article, about boring techie things, and yet where is part of TI’s tech staff? Galavanting around Thailand, of all places, purporting to be on a dive trip while stating, and I quote: “Diving in Thailand is so fantastically warm that a wetsuit isn’t even needed. Unbelievably wonderful.” Pause. Let that sink in.
What in God’s fucking name is the tech department at TI wearing to scuba dive if not a wetsuit?! Huh? And why is this mysteriously not being covered? Is Murtaza Hussain somehow involved? Because I suspect he is. And why is no one talking about this, or following up? Uh huh. Just what I thought. Silence. Yeah.
Whatever, my conspiracy theory makes about as much sense as anyone else’s, and I like it way better. Someone call Sibel, for reals, she needs to get to Thailand and check this out.
In response to The Intercept‘s questions, an agency spokesperson (said or stated or something) that “NSA will not comment on the Intercept’s speculation,” and noted that NSA “defends the nation and our allies from foreign threats while going to great lengths to safeguard privacy and civil liberties.”
Missing a word in there.
in fairness to the NSA statement, any — even the slightest — effort by that organization to strengthen the privacy and civil liberties protection afforded to all people _is_ unprecedented. the only restraint ever exercised over that organization was directed by congress and immediately undermined by executive order.
also worth noting that the specified class, viz., “the privacy and civil liberties protection afforded to all people” is vanishingly small to nonexistent.
It just keeps getting worse for the NSA.
They must be trembling at what might come next.
Keep it up, Mr. Greenwald.
I do seem to recall an instance of “someone” cyber-attacking a country’s R&D nuclear program a few years ago, although that’s the only thing close to a real infrastructure cyber-attack I’ve ever heard of. Well, there does also appear to be someone threatening whole countries with an Internet blackout, and testing that weapon too. I’d suggest if all the Big Brother billions that taxpayers cough up annually can’t stop or catch those sort of “bad actors” – then it’s a goddamned waste of national resources, anyway.
Oh, yeah…
Why hire them when you can just steal their work?
Kind of makes you wonder who is stealing what the NSA is doing.
The list of targets from Intolerant, piggybacking on hacks by the Chinese no doubt, doesn’t have anything to do with terrorism or threats… which I thought was the justification given for these programs. Wait, look out! The Free Tibet crowd is coming for our children!
Well Done. Yes the finger points at the Chinese.
Funny isn’t that the NSA rides the work of others.
Makes the story of Noth Korea hacking Sony look like a story.
“The spokesperson added that ‘over the last year, at the president’s direction, the U.S. intelligence community engaged in an unprecedented effort to examine and strengthen the privacy and civil liberty protections afforded to all people, regardless of nationality.'”
lol
lol with you
lol indeed. The question is though…how do these “spokespersons” keep a straight face while knowing the entire planet is rolling on the floor in gut splitting laughter.
Seems like whenever they’re saying something in Washington, they’re lying. It’s more interesting to measure how outrageous the particular lie is. This one is rated by me as a 9. It could be better but for off the cuff lying, very good.
It’s not lie. They didn’t claim they actually did those things. But they thought about it for a full 5 minutes before saying ‘nah’, which is an unprecedented effort in that regard.