<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>The Intercept &#187; Ryan Gallagher</title>
	<atom:link href="https://theintercept.com/staff/ryan-gallagher/feed/?rss" rel="self" type="application/rss+xml" />
	<link>https://theintercept.com</link>
	<description></description>
	<lastBuildDate>Sat, 11 Feb 2017 19:43:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.2</generator>
	<item>
		<title>Russia Allows Edward Snowden to Remain Through 2020</title>
		<link>https://theintercept.com/2017/01/18/russia-allows-edward-snowden-to-remain-through-2020/</link>
		<comments>https://theintercept.com/2017/01/18/russia-allows-edward-snowden-to-remain-through-2020/#comments</comments>
		<pubDate>Wed, 18 Jan 2017 20:30:09 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=106568</guid>
		<description><![CDATA[<p>The NSA whistleblower's stay in the country is set to continue after Russian authorities reportedly signed off on a new three-year visa.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2017/01/18/russia-allows-edward-snowden-to-remain-through-2020/">Russia Allows Edward Snowden to Remain Through 2020</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>Edward Snowden&#8217;s exile</u> in Russia looks set to continue after authorities in the country reportedly signed off on a new three-year visa for the former National Security Agency contractor.</p>
<p>Snowden, who leaked a trove of documents about NSA mass surveillance programs in 2013, was granted asylum in Russia in August that year. His residency permit was due to expire this year, but on Wednesday, Snowden&#8217;s lawyer, Anatoly Kucherena, said in a statement that the permit has now been extended to 2020. Kucherena added that in 2018 Snowden will qualify to apply for Russian citizenship.</p>
<p>On Tuesday, President Barack Obama <a href="https://theintercept.com/2017/01/17/chelsea-manning-will-be-free-in-may/">commuted the prison sentence</a> of another high-profile leaker, Chelsea Manning, who passed hundreds of thousands of U.S. State Department diplomatic cables and other documents to WikiLeaks. But Snowden does not appear to be next on Obama&#8217;s clemency list.</p>
<p>A <a href="https://www.pardonsnowden.org/news/petition-delivery">petition</a> with more than a million signatures has urged Obama to pardon the NSA whistleblower. But White House press secretary Josh Earnest said on Tuesday that &#8220;Mr. Snowden has not filed paperwork to seek clemency from this administration.” And Obama himself stated last year regarding Snowden that he “can&#8217;t pardon somebody who hasn&#8217;t gone before a court and presented themselves.”</p>
<p>With Donald Trump soon to be in the White House, a degree of uncertainty has surrounded Snowden&#8217;s future in Russia. Trump is intent on resetting relations with the country, and in 2013 he <a href="https://twitter.com/realDonaldTrump/status/346998236776640513">tweeted</a> that “if I were President, Snowden would already have been returned to the U.S.” Earlier this month, the CIA&#8217;s former acting director Michael Morell <a href="https://www.thecipherbrief.com/column/agenda-setter/putins-perfect-gift-1095">wrote a piece</a> encouraging Russian president Vladimir Putin to return Snowden to the U.S. as a “perfect inauguration gift” to Trump.</p>
<p>Having just renewed Snowden&#8217;s residency permit, Russia looks unlikely to oblige.</p>
<p>Moreover, Russia&#8217;s foreign ministry spokesperson Maria Zkharova has outright dismissed Morell&#8217;s idea, which she said represented “an ideology of betrayal” in a post on Facebook. “You spoke, Mr. Morell, and now it&#8217;s clear to everybody that in your office, it&#8217;s normal to bring gifts in the form of people, and to hand over those who seek defense,” Zkharova wrote.</p>
<p>33-year-old Snowden – whose trove of documents The Intercept has extensively reported on – appears to have a relatively settled life in Russia, where he shares a home with his American partner Linday Mills. However, he did not originally intend to wind up in the country. Before his leaks were first published by The Guardian and the Washington Post in 2013, Snowden had fled the U.S. for Hong Kong. Following the initial disclosures – and amid a frenzied manhunt for him in Hong Kong – Snowden boarded a flight to Moscow en route to Cuba. But the State Department revoked his passport before he could reach Latin America, stranding him at Moscow&#8217;s Sheremetyevo Airport, where he lived for about 40 days before Russia granted him asylum.</p>
<p>Snowden has said that he would be willing to return to the U.S. to face a fair trial, but does not believe that he would receive one because he is charged under the Espionage Act and he would therefore not be allowed to make a public interest defense for his actions. “I’d volunteer for prison, as long as it served the right purpose,” Snowden <a href="https://www.wired.com/2014/08/edward-snowden/">told Wired magazine</a> in 2014. “But we can’t allow the law to become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal. I’m not going to be part of that.”</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2017/01/18/russia-allows-edward-snowden-to-remain-through-2020/">Russia Allows Edward Snowden to Remain Through 2020</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2017/01/18/russia-allows-edward-snowden-to-remain-through-2020/feed/</wfw:commentRss>
		<slash:comments>37</slash:comments>
	
	</item>
		<item>
		<title>In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance</title>
		<link>https://theintercept.com/2016/12/21/in-major-privacy-victory-top-eu-court-rules-against-mass-surveillance/</link>
		<comments>https://theintercept.com/2016/12/21/in-major-privacy-victory-top-eu-court-rules-against-mass-surveillance/#comments</comments>
		<pubDate>Wed, 21 Dec 2016 19:18:55 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=103169</guid>
		<description><![CDATA[<p>The EU's top court has undermined the British government's mass surveillance powers in a new ruling that could rein in police and spy agency investigations.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/12/21/in-major-privacy-victory-top-eu-court-rules-against-mass-surveillance/">In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>The European Union&#8217;s top</u> court has severely undermined the British government&#8217;s mass surveillance powers in a new ruling that could rein in police and spy agency investigations.</p>
<p>In a <a href="http://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=186492&amp;pageIndex=0&amp;doclang=EN&amp;mode=req&amp;dir=&amp;occ=first&amp;part=1&amp;cid=516300">judgment</a> handed down in Luxembourg on Wednesday, the European Court of Justice declared that the “general and indiscriminate retention” of data about people&#8217;s communications and locations was inconsistent with privacy rights. The court stated that the &#8220;highly invasive&#8221; bulk storage of private data “exceeds the limits of what is strictly necessary and cannot be considered to be justified, within a democratic society.”</p>
<p>Camilla Graham Wood, legal officer with the London-based group <a href="https://privacyinternational.org/">Privacy International</a>, hailed the ruling as a victory for civil liberties advocates. &#8220;Today&#8217;s judgment is a major blow against mass surveillance and an important day for privacy,” she said. “It makes clear that blanket and indiscriminate retention of our digital histories — who we interact with, when and how and where – can be a very intrusive form of surveillance that needs strict safeguards against abuse and mission creep.”</p>
<p>The European court&#8217;s panel of 15 judges acknowledged in their ruling that “modern investigative techniques” were necessary to combat organized crime and terrorism, but said that this cannot justify “the general and indiscriminate retention of all traffic and location data.” Instead, the judges stated, it is acceptable for governments to engage in the “targeted retention” of data in cases involving serious crime, permitting that persons affected by any surveillance are notified after investigations are completed, and that access to the data is overseen by a judicial authority or an independent administrative authority.</p>
<p>The case was originally <a href="https://www.theguardian.com/world/2014/dec/08/mps-go-ahead-challenge-snooping-law">brought in December 2014</a> by two British members of parliament, who challenged the legality of the U.K. government&#8217;s Data Retention and Investigatory Powers Act, which forced telecommunications companies to store records on their customers&#8217; communication for 12 months. That law has since been replaced by the Investigatory Powers Act, which was <a href="https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/">recently approved</a> by the British parliament and is expected soon to come into force.</p>
<p>Though the U.K. voted to leave the European Union earlier this year, Wednesday&#8217;s decision remains — at least in the short term — highly significant, and will prove to be a severe headache for British government officials. The ruling will now be forwarded to the U.K.&#8217;s Court of Appeal, where judges there will consider how to apply it in the context of national law. It may result in the government being forced to make changes to controversial sections of the Investigatory Powers Act, which enable police and spy agencies to access vast amounts of data on people&#8217;s internet browsing, instant messages, emails, phone calls, and social media conversations.</p>
<p>“This is the first serious post-referendum test for our government’s commitment to protecting human rights and the rule of law,” said Martha Spurrier, director of U.K. human rights group <a href="https://www.liberty-human-rights.org.uk">Liberty</a>. “The U.K. may have voted to leave the EU — but we didn&#8217;t vote to abandon our rights and freedoms.” She added: “Today’s judgment upholds the rights of ordinary British people not to have their personal lives spied on without good reason or an independent warrant. The government must now make urgent changes to the Investigatory Powers Act to comply with this.”</p>
<p>A spokesperson for the British government&#8217;s Home Office said in a statement: “We are disappointed with the judgment from the European court of justice and will be considering its potential implications. The government will be putting forward robust arguments to the court of appeal about the strength of our existing regime for communications data retention and access.”</p>
<p class="“caption”">Top photo: The European Court of Justice.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/12/21/in-major-privacy-victory-top-eu-court-rules-against-mass-surveillance/">In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/12/21/in-major-privacy-victory-top-eu-court-rules-against-mass-surveillance/feed/</wfw:commentRss>
		<slash:comments>56</slash:comments>
	
	</item>
		<item>
		<title>Extensive British Spying Throughout Africa Revealed in Le Monde</title>
		<link>https://theintercept.com/2016/12/08/gchq-africa-wto-corporations-surveillance/</link>
		<comments>https://theintercept.com/2016/12/08/gchq-africa-wto-corporations-surveillance/#comments</comments>
		<pubDate>Thu, 08 Dec 2016 14:20:51 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=101180</guid>
		<description><![CDATA[<p>Using documents provided by Edward Snowden, the French paper reports that Britain spied on more than 20 current and former African heads of state.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/12/08/gchq-africa-wto-corporations-surveillance/">Extensive British Spying Throughout Africa Revealed in Le Monde</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>Top-secret British surveillance</u> operations targeted the director of the World Trade Organization, several multinational corporations, a top French businessman, and heads of state across Africa, according to a new series of reports by Le Monde.</p>
<p>On Tuesday, the French newspaper began <a href="http://www.lemonde.fr/pixels/article/2016/12/07/espionnage-d-air-france-d-israel-et-de-l-autorite-palestinienne-ce-qu-apportent-les-nouvelles-revelations-snowden_5044727_4408996.html">publishing the revelations</a>, which include a wide range of previously undisclosed details about British covert activities across the world. The reports were produced in partnership with The Intercept and are based on documents provided by the National Security Agency whistleblower Edward Snowden.</p>
<p>The series of stories focuses largely on the controversial work of the U.K.&#8217;s electronic surveillance agency Government Communications Headquarters, or GCHQ. According to Le Monde, in March 2009, the British agency <a href="http://www.lemonde.fr/afrique/article/2016/12/08/britain-spied-on-companies-diplomats-and-politicians-in-french-speaking-africa_5045688_3212.html">spied on Pascal Lamy</a>, then the head of the World Trade Organization and member of the French socialist party. Between 2008 and 2009, it also targeted <a href="http://www.lemonde.fr/pixels/article/2016/12/08/britain-spied-on-the-ceo-of-europe-s-biggest-internet-hosting-company_5045567_4408996.html">Octave Klaba</a>, the founder of the French company OVH, one of Europe’s largest internet hosting companies; <a href="http://www.lemonde.fr/afrique/article/2016/12/08/britain-spied-on-companies-diplomats-and-politicians-in-french-speaking-africa_5045688_3212.html">Emmanuel Glimet</a>, a French trade and economy official; phone lines at the French ministry of foreign affairs; and <a href="http://www.lemonde.fr/afrique/article/2016/12/08/britain-spied-on-companies-diplomats-and-politicians-in-french-speaking-africa_5045688_3212.html">several multinational French corporations</a>, including the energy company Areva, oil giant Total, and the defense conglomerate Thalès.</p>
<p>Beyond France, the disclosures <a href="http://www.lemonde.fr/afrique/article/2016/12/08/british-spying-tentacles-reach-across-africa-s-heads-of-states-and-business-leaders_5045668_3212.html?xtmc=mwai_kibaki&amp;xtcr=2">highlight the U.K.&#8217;s extensive spying operations across Africa</a>. In 20 countries across the continent, GCHQ monitored current and former heads of state, prime ministers, diplomats, military and intelligence chiefs, as well as leading figures in the business and finance industry, Le Monde reports. Among those who were subject to the surveillance, which involved intercepting communications as they were being beamed between satellites, was a close British ally — Kenyan President Mwai Kibaki and his strategic advisers. Other targets included Nigeria&#8217;s President Umaru Yar’Adua and his private secretary; Ghana&#8217;s President John Kufuor; Sierra Leone&#8217;s leader Ernest Koroma; and the presidential palace in Luanda, Angola. Prominent business figures were also monitored, such as Nigerian billionaire Tony Elumelu, regarded as one of Africa’s richest and most influential men, and Chris Kirubi, a wealthy Kenyan businessman and radio-station owner who was described by Forbes in 2011 as the country&#8217;s “<a href="http://www.forbes.com/lists/2011/89/africa-billionaires-11_Chris-Kirubi_8OP2.html">most flamboyant tycoon</a>.”</p>
<p>But not all of the people on the surveillance lists were high-flying corporate and political elites. Le Monde reports that <a href="http://www.lemonde.fr/pixels/article/2016/12/08/britain-tapped-into-telcom-networks-using-unsuspecting-roaming-managers-in-europe-and-africa_5045597_4408996.html?xtmc=zain&amp;xtcr=2">GCHQ spied on the employees of two major telecommunications companies</a> — the South African firm MTN and Kuwait-based Zain. The agency focused in particular on “roaming managers” working for the companies in at least 15 African countries, including Gabon, Ivory Coast, Tunisia, Congo, and Mali. Roaming managers who work for cellphone companies organize partnerships between different carriers across the world, ensuring that when you travel overseas on vacation or a business trip you can use your phone to connect to a local network and make calls and receive messages.</p>
<p>Often, roaming managers handle sensitive technical documents about how different networks function — and this is what places them on the radar of both GCHQ and its close U.S. counterpart, the NSA. Such documents are of high value to the agencies, as they contain information that they can use to hack into networks and eavesdrop on communications. As The Intercept has <a href="https://theintercept.com/2014/12/04/nsa-auroragold-hack-cellphones/">previously reported</a>, the NSA systematically monitors telco company employees&#8217; emails with the explicit purpose of collecting roaming documents, which it describes as “necessary for targeting and exploitation.” In other words, roaming managers are not spied on because they are suspected of wrongdoing or because they are of political or economic interest; rather, they are merely viewed as a means to an end.</p>
<p>GCHQ declined to answer any questions from Le Monde, citing a long-standing policy not to comment on intelligence matters. A spokesperson for the agency claimed in a statement that its activities are all “authorised, necessary and proportionate” and “entirely compatible with the European Convention on Human Rights.” The NSA said its activities complied with U.S. law and policy and declined to comment further.</p>
<p class="caption">Top photo: GCHQ Bude is a satellite ground station and eavesdropping center located on the North Cornwall coast, U.K.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/12/08/gchq-africa-wto-corporations-surveillance/">Extensive British Spying Throughout Africa Revealed in Le Monde</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/12/08/gchq-africa-wto-corporations-surveillance/feed/</wfw:commentRss>
		<slash:comments>46</slash:comments>
	
	</item>
		<item>
		<title>U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers</title>
		<link>https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/</link>
		<comments>https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/#comments</comments>
		<pubDate>Tue, 22 Nov 2016 17:51:27 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=98757</guid>
		<description><![CDATA[<p>The Investigatory Powers Bill, dubbed the “Snoopers’ Charter” by critics, will hand British police and spy agencies new powers to hack computers and access vast troves of private data.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/">U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>A few years ago,</u> it would have been unthinkable for the British government to admit that it was hacking into people&#8217;s computers and collecting private data on a massive scale. But now, these controversial tactics are about to be explicitly sanctioned in an unprecedented new surveillance law.</p>
<p>Last week, the U.K.&#8217;s Parliament approved the Investigatory Powers Bill, dubbed the “Snoopers&#8217; Charter” by critics. The law, which is expected to come into force before the end of the year, was introduced in November 2015 after the fallout from revelations by National Security Agency whistleblower Edward Snowden about extensive British mass surveillance. The Investigatory Powers Bill essentially retroactively legalizes the electronic spying programs exposed in the Snowden documents — and also expands some of the government’s surveillance powers.</p>
<p>Perhaps the most controversial aspect of the new law is that it will give the British government the authority to serve internet service providers with a “data retention notice,” forcing them to record and store for up to 12 months logs showing websites visited by all of their customers. Law enforcement agencies will then be able to obtain access to this data without any court order or warrant. In addition, the new powers will hand police and tax investigators the ability to, with the approval of a government minister, hack into targeted phones and computers. The law will also permit intelligence agencies to sift through “bulk personal datasets” that contain millions of records about people&#8217;s phone calls, travel habits, internet activity, and financial transactions; and it will make it legal for British spies to carry out “<a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/473753/Factsheet-Bulk_Equipment_Interference.pdf">foreign-focused</a>” large-scale hacks of computers or phones in order to identify potential “targets of interest.”</p>
<p>“Every citizen will have their internet activity — the apps they use, the communications they send, and to who — logged for 12 months,” says Eric King, a privacy expert and former director of <a href="https://www.dontspyonus.org.uk">Don&#8217;t Spy On Us</a>, a coalition of leading British human rights groups that campaigns against mass surveillance. “There is no other democracy in the world, possibly no other country in the world, doing this.”</p>
<blockquote class='stylized pull-right'>“There is no other democracy in the world, possibly no other country in the world, doing this.”</blockquote>
<p>King argues that the new law will cause a chilling effect, resulting in fewer people feeling comfortable communicating freely with one another. He cites <a href="http://www.pewinternet.org/2015/03/16/americans-privacy-strategies-post-snowden/">a Pew survey</a> published in March 2015 that found that 30 percent of American adults had altered their phone or internet habits due to concerns about government surveillance. “It&#8217;s going to change how people communicate and express their thoughts,” King says. “For a society that&#8217;s supposed to be progressive, that encourages open debate and dialogue, it&#8217;s awful.”</p>
<p>Other civil liberties advocates are concerned that the new law will be viewed by governments across the world as a green light to launch similar sweeping surveillance regimes. “The passing of the IP Bill will have an impact that goes beyond the U.K.&#8217;s shores,” says Jim Killock, executive director of the London-based <a href="https://www.openrightsgroup.org/">Open Rights Group</a>. “It is likely that other countries, including authoritarian regimes with poor human rights records, will use this law to justify their own intrusive surveillance powers.”</p>
<p>Despite the broad scope of the Investigatory Powers Bill, it generated little public debate in the U.K., and did not receive a great deal of coverage in the mainstream press. One reason for this was undoubtedly the U.K.&#8217;s shock vote in June to leave European Union — known as Brexit — which has dominated news and discussion in recent months. But there was another major factor for the swift passage of the law in the face of little backlash. The Labour Party, the U.K.&#8217;s leading opposition political party, had pledged to fight back against “<a href="https://www.buzzfeed.com/jamesball/jeremy-corbyn-still-supports-snoopers-charter-despite-launch">unwarranted snooping</a>,” but ended up supporting the government and voting in favor of the new surveillance law. “Blame has to be fixed on the Labour Party,” says Killock. “They asked for far too little and weren&#8217;t prepared to strongly challenge many of the central tenets of the bill.”</p>
<p>In an effort to placate some of its critics, the government has agreed to strengthen oversight of the surveillance. The Investigatory Powers Bill introduces for the first time a “judicial commissioner” — likely a former senior judge — who will have the authority to review spying warrants authorized by a government minister. It also bolsters provisions relating to how police and spy agencies can target journalists in a bid to identify their confidential sources. New safeguards will mean the authorities will have to seek approval from the judicial commissioner before obtaining a journalist&#8217;s phone or email records; previously they could obtain this data without any independent scrutiny.</p>
<p>The U.K.&#8217;s National Union of Journalists, however, believes that the law does not go far enough in protecting press freedom. The union is particularly alarmed that any potential surveillance of media organizations will be kept completely secret, meaning they will not be afforded the chance to challenge or appeal any decisions relating to them or their sources. &#8220;The bill is an attack on democracy and on the public’s right to know and it enables unjustified, secret, state interference in the press,&#8221; the union <a href="https://www.nuj.org.uk/news/reaction-to-the-passing-of-the-investigatory-powers-bill/">blasted</a> in a statement last week, adding that “the lack of protection for sources has an impact on journalists working in war zones or those investigating organized crime or state misconduct.”</p>
<p>Other issues relating to how the law will be applied remain unclear. It contains a provision, for instance, allowing the government to serve a company with a “technical capability notice,” which can include “obligations relating to the removal by a relevant operator of electronic protection applied by or on behalf of that operator to any communications or data.” Earlier this year, technology giants Apple, Facebook, Google, Microsoft, Twitter, and Yahoo <a href="https://www.publications.parliament.uk/pa/cm201516/cmpublic/investigatorypowers/Memo/IPB21.htm">criticized</a> this power, expressing concerns that it could be used by the government to force companies to weaken or circumvent encryption technology used to protect the privacy of communications and data.</p>
<p>In practice, if the law is used to undermine encryption, it may never come to light. The government included a section in the law that criminalizes “unauthorized disclosures” of any information related to its surveillance orders, which could potentially deter any whistleblowers or leakers from coming forward. The punishment for breaches is a prison sentence of up to 12 months, a fine, or both.</p>
<p>Though the Investigatory Powers Bill will soon to come into force, it is likely to face several lawsuits. There are at least three ongoing cases that could result in changes to some of its provisions. One of these cases is a <a href="https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/">major challenge</a> in the European Court of Human Rights, which could potentially rule the government&#8217;s mass collection and retention of data to be illegal. (Judgments from the European Court of Human Rights remain binding in the U.K., despite its vote to leave the European Union.)</p>
<p>Either way, some are not willing to leave it up to the courts to determine how much of their data the government can vacuum up. One recently established British nonprofit company, calling itself <a href="https://brasshorncommunications.uk">Brass Horn Communications</a>, says it is planning to build a new internet provider that is based on <a href="https://torproject.org">Tor</a> — a tool used to browse the internet anonymously — in an effort to help people protect themselves from the spying. “We should be able to research an embarrassing medical condition, or ask questions on Google, without having to worry about it being stored on a permanent internet record somewhere,” says a spokesperson for the company. “The government has decided that everyone is a suspect, but you can&#8217;t treat an entire society as criminal.”</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/">U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/11/22/ipbill-uk-surveillance-snowden-parliament-approved/feed/</wfw:commentRss>
		<slash:comments>31</slash:comments>
	
	</item>
		<item>
		<title>Look Inside the Windowless New York Skyscraper Linked to the NSA</title>
		<link>https://theintercept.com/2016/11/19/nsa-33-thomas-street-att-new-york-photos-inside/</link>
		<comments>https://theintercept.com/2016/11/19/nsa-33-thomas-street-att-new-york-photos-inside/#comments</comments>
		<pubDate>Sat, 19 Nov 2016 14:00:29 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=98077</guid>
		<description><![CDATA[<p>Previously unseen photographs offer a glimpse inside an iconic AT&#38;T building in Manhattan tied to a top-secret NSA spy program.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/19/nsa-33-thomas-street-att-new-york-photos-inside/">Look Inside the Windowless New York Skyscraper Linked to the NSA</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>Since publishing a story</u> about an apparent National Security Agency surveillance site in New York, The Intercept has obtained several previously unseen photographs from within the building, offering a rare glimpse behind its thick concrete and granite walls.</p>
<p>On Wednesday, we <a href="https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/">reported</a> that top-secret documents indicate there is an NSA spy hub inside the massive, windowless skyscraper at 33 Thomas Street, used by AT&amp;T to route communications across the world. The 550-foot tower contains equipment that covertly monitors phone calls, faxes, and internet data, according to the documents. But with the exception of employees who have worked at the building, few people have ever been allowed inside the iconic brutalist structure, which was built to withstand a nuclear attack amid the Cold War.</p>
<p>Stanley Greenberg, a 60-year-old artist based in Brooklyn, shared a series of photographs he took in September 1992 while visiting 33 Thomas Street. Back then, before the 9/11 attacks, security was not as tight. At the time, Greenberg was carrying out research for a book, &#8220;<a href="https://www.amazon.com/Invisible-New-York-Infrastructure-Landscape/dp/080185945X/ref=sr_1_1?ie=UTF8&amp;qid=1479500611&amp;sr=8-1&amp;keywords=invisible+new+york+greenberg">Invisible New York</a>,&#8221; and AT&amp;T granted him access. The photographs never made it into the book, but Greenberg revisited his photo archive this week and sent the pictures to The Intercept after reading the revelations about the building&#8217;s apparent role as an NSA site, code-named TITANPOINTE.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'>
<p><img class="aligncenter size-large wp-image-98092" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-2-article.jpg" alt="titanpointe-2-article" /></p>
<p class="caption overlayed">Telephone switching equipment inside AT&amp;T&#8217;s 33 Thomas Street.</p>
<p><p class='caption source' style=''>© Stanley Greenberg</p></div>“They took me upstairs, and it was just racks and racks of electronics,” Greenberg recalled in a phone call Friday, adding that he toured the basement of the building and two or three other floors. “They told me, &#8216;We don&#8217;t use the whole building anymore so [we] serve private clients.&#8217; I didn&#8217;t think at the time about whether anything secret was going on.”</p>
<p>One of Greenberg&#8217;s photos (featured at the top of this article) clearly shows some of AT&amp;T&#8217;s “4ESS switch” equipment used to send phone calls across networks. The NSA&#8217;s documents describe the TITANPOINTE facility as containing a “RIMROCK access,” which is what the agency calls the 4ESS switches that it taps into. By 2004, at least one of these was an &#8220;international gateway&#8221; used to route foreign calls to and from the U.S., a former AT&amp;T engineer has said.</p>
<p>Another photograph taken by Greenberg (below) shows a room full of large batteries, which were likely used as a back-up energy source for the building in the event of a power failure. Original planning documents for 33 Thomas Street state that it would have enough emergency power to last two weeks, enabling it to become a “self-contained city” in the event of a catastrophe.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'></p>
<p><img class="aligncenter size-large wp-image-98095" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-3-article.jpg" alt="titanpointe-3-article" /></p>
<p class="caption overlayed">Dozens of large batteries inside 33 Thomas Street provide a back-up source of power in the event of an emergency.</p>
<p><p class='caption source' style=''>© Stanley Greenberg</p></div>
<p>Mark Klein, a former AT&amp;T technician, worked at 33 Thomas Street between 1981 and 1990. During The Intercept&#8217;s initial research into the building, he shared a series a photographs that he took inside in 1988, which show his office space, a row of large black back-up batteries, and some of the primitive computer technology — including large disk drives the size of washing machines — used by AT&amp;T at the time.</p>
<p>“During night shifts you’d be alone,” Klein said of his time in the skyscraper. “You’d walk around in dimly lit rows of equipment and only switch on fluorescent lights in the area you were working.”</p>
<blockquote class='stylized pull-none'>The ground floor, Klein added, had a large cafeteria that was fitted with gleaming stainless steel equipment, but it was never open for business. “You’d go down there to empty tables and bring the sandwich you brought from home.&#8221;</blockquote>
<div class='img-wrap align-bleed width-auto' style='width:auto'>
<p><a href="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_3.jpeg"><img class="aligncenter size-large wp-image-98167" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_3-1024x693.jpeg" alt="Mark-NYC-ATT-1988_3" /></a></p>
<p class="caption">Former AT&amp;T technician Mark Klein sits alongside dozens of back-up batteries used as an emergency power source for a computer room inside 33 Thomas Street.</p>
<p><p class='caption source' style=''>via Mark Klein</p></div><br />
&#8220;It was like they planned for it, but in the end, they didn’t need it. Which fits with the nuclear war scenario, having this idle cafeteria that could open in an emergency.”</p>
<p>Klein later moved to California, where he continued his work for AT&amp;T. In 2006, he alleged in a <a href="https://www.eff.org/files/filenode/att/ser_klein_decl.pdf">sworn court declaration</a> that the company had maintained a secure room in one of its San Francisco offices, which he stated had been equipped with NSA technology to spy on phone and internet traffic. Klein told The Intercept that he didn&#8217;t know of any NSA presence at 33 Thomas Street, but it did not surprise him to discover its apparent role as the TITANPOINTE surveillance site.</p>
<p>“I always assumed and gathered information back then that there were numerous other offices like the one in San Francisco,” he said. “I was only aware of the ones on the West Coast, from talking to people. But logically I assumed there had to be some in places like New York or Chicago, the major telecom centers.”</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'></p>
<p><a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/MK-NYC-1988_0002.jpeg"><img class="aligncenter size-large wp-image-98168" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/MK-NYC-1988_0002-1024x676.jpeg" alt="MK-NYC-1988_0002" /></a></p>
<p class="caption">At 33 Thomas Street in 1988, former AT&amp;T technician Mark Klein worked daily to store company data using disk drives the size of washing machines.</p>
<p><p class='caption source' style=''>via Mark Klein</p></div>
<h4><em>If you have any photos or information from inside 33 Thomas Street, you can contact the authors by email (addresses below) or through <a href="https://theintercept.com/securedrop/">SecureDrop</a>.</em></h4>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/19/nsa-33-thomas-street-att-new-york-photos-inside/">Look Inside the Windowless New York Skyscraper Linked to the NSA</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/11/19/nsa-33-thomas-street-att-new-york-photos-inside/feed/</wfw:commentRss>
		<slash:comments>38</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-2-article-440x440.jpg" />
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-2-article.jpg" medium="image">
			<media:title type="html">titanpointe-2-article</media:title>
			<media:description type="html">tk</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-2-article-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-3-article.jpg" medium="image">
			<media:title type="html">titanpointe-3-article</media:title>
			<media:description type="html">tk</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/titanpointe-3-article-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_3.jpeg" medium="image">
			<media:title type="html">Mark-NYC-ATT-1988_3</media:title>
			<media:description type="html">caption tktktk</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_3-440x440.jpeg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/MK-NYC-1988_0002.jpeg" medium="image">
			<media:title type="html">MK-NYC-1988_0002</media:title>
			<media:description type="html">caption tktk</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/MK-NYC-1988_0002-440x440.jpeg" />
		</media:content>
	</item>
		<item>
		<title>The NSA’s Spy Hub in New York, Hidden in Plain Sight</title>
		<link>https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/</link>
		<comments>https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/#comments</comments>
		<pubDate>Wed, 16 Nov 2016 19:40:59 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=96168</guid>
		<description><![CDATA[<p>The NSA has operated a top-secret surveillance program out of an iconic AT&#38;T building in Manhattan, documents indicate.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/">The NSA’s Spy Hub in New York, Hidden in Plain Sight</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span class='dropcap'>T</span><u>hey called it</u> Project X. It was an unusually audacious, highly sensitive assignment: to build a massive skyscraper, capable of withstanding an atomic blast, in the middle of New York City. It would have no windows, 29 floors with three basement levels, and enough food to last 1,500 people two weeks in the event of a catastrophe.</p>
<p>But the building&#8217;s primary purpose would not be to protect humans from toxic radiation amid nuclear war. Rather, the fortified skyscraper would safeguard powerful computers, cables, and switchboards. It would house one of the most important telecommunications hubs in the United States — the world&#8217;s largest center for processing long-distance phone calls, operated by the New York Telephone Company, a subsidiary of AT&amp;T.</p>
<p>The building was designed by the architectural firm John Carl Warnecke &amp; Associates, whose grand vision was to create a communication nerve center like a “20th century fortress, with spears and arrows replaced by protons and neutrons laying quiet siege to an army of machines within.”</p>

<!-- iframe plugin v.2.9 wordpress.org/plugins/iframe/ -->
<iframe src="https://content.jwplatform.com/players/xqZNthDT-O5XqCpyT.html" width="720" height="405" scrolling="no" class="iframe-class" frameborder="0"></iframe>

<div>
<p class="caption">&#8220;<a href="https://fieldofvision.org/project-x">Project X</a>,” a short film by Henrik Moltke and Laura Poitras. This article is the product of a joint reporting project between The Intercept and Field of Vision.</p>
</div>
<p>&nbsp;</p>
<p>Construction began in 1969, and by 1974, the skyscraper was completed. Today, it can be found in the heart of lower Manhattan at 33 Thomas Street, a vast gray tower of concrete and granite that soars 550 feet into the New York skyline. The brutalist structure, still used by AT&amp;T and, according to the New York Department of Finance, owned by the company, is like no other in the vicinity. Unlike the many neighboring residential and office buildings, it is impossible to get a glimpse inside 33 Thomas Street. True to the designers&#8217; original plans, there are no windows and the building is not illuminated. At night it becomes a giant shadow, blending into the darkness, its large square vents emitting a distinct, dull hum that is frequently drowned out by the sound of passing traffic and wailing sirens.</p>
<p>For many New Yorkers, 33 Thomas Street — known as the “Long Lines Building” — has been a source of mystery for years. It has been labeled one of the city&#8217;s weirdest and most iconic skyscrapers, but little information has ever been published about its purpose.</p>
<p>It is not uncommon to keep the public in the dark about a site containing vital telecommunications equipment. But 33 Thomas Street is different: An investigation by The Intercept indicates that the skyscraper is more than a mere nerve center for long-distance phone calls. It also appears to be one of the most important National Security Agency surveillance sites on U.S. soil — a covert monitoring hub that is used to tap into phone calls, faxes, and internet data.<br />
<div class='img-wrap align-center width-fixed' style='width:1024px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-1.jpg"><img class="aligncenter size-large wp-image-96164" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-1.jpg" alt="stills-seq-1" /></a></p>
<p class="caption">Early model of the entrance of 33 Thomas Street as designed by John Carl Warnecke &amp; Associates.</p>
<p><p class='caption source pullright' style=''>Still from “Project X”</p></div><br />
Documents obtained by The Intercept from the NSA whistleblower Edward Snowden do not explicitly name 33 Thomas Street as a surveillance facility. However — taken together with architectural plans, public records, and interviews with former AT&amp;T employees conducted for this article — they provide compelling evidence that 33 Thomas Street has served as an NSA surveillance site, code-named TITANPOINTE.</p>
<p>Inside 33 Thomas Street there is a major international “gateway switch,” according to a former AT&amp;T engineer, which routes phone calls between the United States and countries across the world. A series of top-secret NSA memos suggest that the agency has tapped into these calls from a secure facility within the AT&amp;T building. The Manhattan skyscraper appears to be a core location used for a controversial NSA surveillance program that has targeted the communications of the United Nations, the International Monetary Fund, the World Bank, and at least 38 countries, including close U.S. allies such as Germany, Japan, and France.</p>
<p>It has long been known that AT&amp;T has cooperated with the NSA on surveillance, but few details have emerged about the role of specific facilities in carrying out the top-secret programs. The Snowden documents provide new information about how NSA equipment has been integrated as part of AT&amp;T&#8217;s network in New York City, revealing in unprecedented detail the methods and technology the agency uses to vacuum up communications from the company&#8217;s systems.</p>
<p>“This is yet more proof that our communications service providers have become, whether willingly or unwillingly, an arm of the surveillance state,” said Elizabeth Goitein, co-director of the liberty and national security program at the Brennan Center for Justice. “The NSA is presumably operating under authorities that enable it to target foreigners, but the fact that it is so deeply embedded in our domestic communications infrastructure should tip people off that the effects of this kind of surveillance cannot be neatly limited to non-Americans.”</p>
<p>The NSA declined to comment for this story.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-20.jpg"><img class="aligncenter size-large wp-image-96166" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-20.jpg" alt="stills-seq-20" /></a></p>
<p class="caption">The FBI occupies the entire 23rd floor of 26 Federal Plaza, seen here behind 33 Thomas Street.</p>
<p><p class='caption source' style=''>Still from “Project X”</p></div>
<p><span class='dropcap'>T</span><u>he code name</u> TITANPOINTE features dozens of times in the NSA documents, often in classified reports about surveillance operations. The agency uses code names to conceal information it deems especially sensitive — for instance, the names of companies it cooperates with or specific locations where electronic spying is carried out. Such details are usually considered “exceptionally controlled information,” a category beyond top secret and thus outside the scope of most of the documents that Snowden was able to obtain.</p>
<p>Secret NSA travel guides, dated <a href="https://theintercept.com/document/2016/11/16/blarney-site-book/">April 2011</a> and <a href="https://theintercept.com/document/2016/11/16/fairview-site-book/">February 2013</a>, however, reveal information about TITANPOINTE that helps establish its connection to 33 Thomas Street. The 2011 guide, written to assist NSA employees visiting various facilities, discloses that TITANPOINTE is in New York City. The 2013 guide states that a “partner” called LITHIUM, which is NSA&#8217;s code name for AT&amp;T, supervises visits to the site.</p>
<p>The 33 Thomas Street building is located almost next door to the FBI&#8217;s New York field office — about a block away — at Federal Plaza. The 2011 NSA travel guide instructs employees traveling to TITANPOINTE to head to the FBI&#8217;s New York field office. It adds that trips to the site should be coordinated with AT&amp;T (referenced as &#8220;LITHIUM&#8221;) and the FBI, including an FBI “site watch officer.”</p>
<p><div class='img-wrap align-center width-fixed' style='width:1024px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-12.jpg"><img class="aligncenter size-large wp-image-96165" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-12.jpg" alt="stills-seq-12" /></a></p>
<p class="caption">Intercom at 33 Thomas Street.</p>
<p><p class='caption source pullright' style=''>Still from “Project X”</p></div>When traveling to TITANPOINTE, NSA employees are told to hire a “cover vehicle” through the FBI, especially if they are transporting equipment to the site. In order to keep their true identities secret while visiting, agency employees are instructed not to wear any clothing displaying NSA badges or insignia.</p>
<p>Upon arrival at TITANPOINTE, the 2011 travel guide says, agency employees should ring the buzzer, sign in, and wait for a person to come and meet them. The Intercept visited 33 Thomas Street and found a buzzer outside its entrance and a sign-in sheet on a desk in the building&#8217;s lobby, which is manned by a guard 24 hours a day. There are also parking bays in front of the skyscraper designated “AWM,” a <a href="http://cityroom.blogs.nytimes.com/2013/07/15/the-secret-behind-a-mysterious-traffic-code-its-made-up/?_r=1">traffic code for federal agencies</a>.</p>
<p>A <a href="http://www.nytimes.com/1994/12/04/nyregion/fyi-992542.html">1994 New York Times article</a> reported that 33 Thomas Street was part of AT&amp;T&#8217;s “giant Worldwide Intelligent Network, which is responsible for directing an average of 175 million phone calls a day.” Thomas Saunders, a former AT&amp;T engineer, told The Intercept that inside the building there were at least three “4ESS switches” used to route calls across phone networks. “Of the first two, one handled domestic long-distance traffic and the other was an international gateway,” said Saunders, who retired from his role at the company in 2004. The NSA&#8217;s documents <a href="https://theintercept.com/document/2016/11/16/fairview-dataflow-charts-apr-2012">describe</a> TITANPOINTE as containing “foreign gateway switches” and they state that it has a “RIMROCK access.” RIMROCK is an NSA code name for 4ESS switches.</p>
<p>The NSA&#8217;s documents also reveal that one of TITANPOINTE&#8217;s functions is to conduct surveillance as part of a program called SKIDROWE, which focuses on intercepting satellite communications. That is a particularly striking detail, because on the roof of 33 Thomas Street there are a number of satellite dishes. Federal Communications Commission records confirm that 33 Thomas Street is the only location in New York City where AT&amp;T has an FCC license for satellite earth stations.<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9767-high-res-edit.jpg"><img class="aligncenter size-large wp-image-96420" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9767-high-res-edit.jpg" alt="026V9767-high-res-edit" /></a></p>
<p class="caption overlayed">Design plan for the tower mechanical equipment floor at 33 Thomas Street.</p>
<p></div></p>
<p><span class='dropcap'>T</span><u>he man behind</u> the design of 33 Thomas Street, John Carl Warnecke, was one of the most prominent architects in the U.S. between the 1960s and 1980s.</p>
<p>Warnecke&#8217;s high-profile projects included producing designs for the U.S. Naval Academy in Maryland, the Hart Senate Office Building in Washington, D.C., and the Hawaii State Capitol. In 1962, President John F. Kennedy&#8217;s administration commissioned Warnecke to preserve and restructure buildings at Lafayette Square, across from the White House. And following Kennedy&#8217;s assassination, Warnecke was asked to design the president&#8217;s eternal flame and gravesite at Arlington National Cemetery. He also helped construct a new embassy complex in Washington for the Soviet Union, in which the Soviets claimed they found eavesdropping equipment embedded in the walls.</p>
<p>But it was not only governments that trusted Warnecke — who died in 2010, aged 91 — with major construction projects. He cultivated a close relationship with telecommunications companies, too, possibly helped by family ties to the industry. Warnecke&#8217;s father-in-law had been a director at Pacific Bell, a California-based AT&amp;T subsidiary. In the 1960s, Warnecke was asked to design a telephone exchange building for Pacific Bell in Oakland. He would subsequently receive a series of other major commissions from AT&amp;T: Aside from the 33 Thomas Street building, he also designed a telephone exchange in Williamsburg, Brooklyn, and an AT&amp;T facility in Bedminster, New Jersey.</p>
<p>Some of Warnecke&#8217;s original architectural drawings for 33 Thomas Street are labeled “Project X.” It was alternatively referred to as the Broadway Building. His plans describe the structure as “a skyscraper to be inhabited by machines” and say that it was “designed to house long lines telephone equipment and to protect it and its operating personnel in the event of atomic attack.” (At the time the building was commissioned and built, amid the Cold War, there were genuine fears in the U.S. about the prospect of a Soviet nuclear assault.)</p>
<p><div class='img-wrap align-center width-fixed' style='width:784px'> <a href="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V0261-edit.jpg"><img class="aligncenter size-large wp-image-96422" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V0261-edit.jpg" alt="026V0261-edit" /></a></p>
<p class="caption">Sketch of the plaza at 33 Thomas Street.</p>
<p></div>It is not clear how many people work at 33 Thomas Street today, but Warnecke&#8217;s original plans stated that it would provide food, water, and recreation for 1,500 people. It would also store 250,000 gallons of fuel to power generators, which would enable it to become a “self-contained city” for two weeks in the event of an emergency power failure. The blueprints for the building show that it was to include three subterranean levels, including a cable vault, where telecommunications cables likely entered and exited the building from under Manhattan&#8217;s bustling streets.</p>
<p>After it was built, the unusual style of 33 Thomas Street attracted a lot of attention. Its dark, somewhat dystopian appearance contrasted dramatically with other buildings in lower Manhattan. Yet it proved popular, particularly among architecture buffs.</p>
<p>In a 1982 <a href="http://www.nytimes.com/1982/10/08/arts/the-tribeca-scene-architecture-restaurants-and-bargain-hunting.html?pagewanted=all">piece</a> in the New York Times, architecture critic Paul Goldberger praised 33 Thomas Street as “one of the neighborhood&#8217;s few pieces of good modern architecture,” adding that it “blends into its surroundings more gracefully than does any other skyscraper in this area.”</p>
<p>“Other telephone company buildings from that era, designed solely for equipment, all look like horrible boxes,” Goldberger told The Intercept. “This one has an allure of its own to it. … There’s something about that shape. You see it and you don’t see it at the same time.”<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9229-1.jpg"><img class="aligncenter size-large wp-image-96189" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9229-1.jpg" alt="026V9229-1" /></a></p>
<p class="caption overlayed">Satellite dishes on top of 33 Thomas Street. At TITANPOINTE, a program called SKIDROWE intercepts satellite communications.</p>
<p><p class='caption source' style=''>Photo: Henrik Moltke</p></div></p>
<p><span class='dropcap'>I</span><u>n 1975, just</u> a year after Warnecke&#8217;s 33 Thomas Street building was completed, the NSA became embroiled in one of the biggest scandals in the U.S. intelligence community&#8217;s history. Following revelations about domestic surveillance operations targeting anti-Vietnam War activists, a congressional select committee began investigating the alleged abuses.</p>
<p>The inquiry, led by Democratic Sen. Frank Church, published its findings in April 1976. It concluded that U.S. intelligence agencies had “invaded individual privacy and violated the rights of lawful assembly and political expression.” Surveillance programs operated by the NSA through this period, it was later revealed, had targeted “domestic terrorist and foreign radical” suspects, including a host of eminent Americans, such as the civil rights leaders Martin Luther King and Whitney Young, the boxer Muhammad Ali, Washington Post columnist Art Buchwald, and New York Times journalist Tom Wicker.</p>
<p>The Church Committee recommended that new and tighter controls be placed on intelligence gathering. And in 1978, Congress approved the Foreign Intelligence Surveillance Act, requiring the executive branch to request warrants for spying operations from a newly formed court.</p>
<p><div class='img-wrap align-center width-fixed' style='width:1024px'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.57.jpg"><img class="aligncenter size-large wp-image-96633" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.57-1024x766.jpg" alt="" /></a> </div><div class='img-wrap align-center width-fixed' style='width:1024px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.11.jpg"><img class="aligncenter size-large wp-image-96632" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.11-1024x766.jpg" alt="Screen-Shot-2016-11-11-at-16.59.11" /></a></p>
<p class="caption">Diagrams showing NSA-controlled equipment inside TITANPOINTE.</p>
<p><p class='caption source pullright' style=''>Document: NSA</p></div>Through this tumultuous time for American spies, the NSA established a new surveillance program under the code name BLARNEY, which was first exposed in a Snowden-leaked slide published in 2013. According to a previously unpublished document provided to The Intercept by Snowden, BLARNEY was established in the early 1970s and, in mid-2013, remained one of the agency&#8217;s most significant initiatives.</p>
<p>BLARNEY leverages “commercial partnerships” in order to “gain access and exploit foreign intelligence obtained from global networks,” the <a href="https://theintercept.com/document/2016/11/16/blarney-program-overview">document states</a>. It carries out “full take” surveillance — a term that refers to the bulk collection of both content and metadata — under six different categories: counterproliferation, counterterrorism, diplomatic, economic, military, and political.</p>
<p>As of July 2010, the NSA had <a href="https://theintercept.com/document/2016/11/16/special-source-operations-corporate-overview">obtained at least 40 court orders</a> for spying under the BLARNEY program, allowing the agency to monitor communications related to multiple countries, companies, and international organizations. Among the approved targets were the International Monetary Fund, the World Bank, the Bank of Japan, the European Union, the United Nations, and at least 38 different countries, including U.S. allies such as Italy, Japan, Brazil, France, Germany, Greece, Mexico, and Cyprus.</p>
<p>The program was the NSA&#8217;s leading source of data collection under the Foreign Intelligence Surveillance Act, an April 2013 document disclosed, and information gleaned from the communications it intercepted was a top contributor to the president&#8217;s daily briefing.</p>
<p>Notably, TITANPOINTE has played a central role in BLARNEY&#8217;s operations. NSA documents dated between 2012 and 2013 list the TITANPOINTE surveillance facility among three of BLARNEY&#8217;s “core sites” and describe it as “BLARNEY&#8217;S site in NYC.” Equipment hosted at TITANPOINTE has been used to monitor international long-distance phone calls, faxes, voice calls routed over the internet (known as Voice-Over-IP), video conferencing, and other internet traffic.</p>
<p>In one case that may have involved 33 Thomas Street, NSA engineers with the BLARNEY program worked to eavesdrop on data from a connection serving the United Nations mission in New York. This spying resulted in “collection against the email address of the U.N. General leading the monitoring mission in Syria,” an April 2012 memo said.</p>
<p>Mogens Lykketoft, former president of the U.N.&#8217;s general assembly, criticized the surveillance. &#8220;Such spying activities are totally unacceptable breaches of trust in international cooperation,&#8221; he told The Intercept.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/skidrowe-keyscore.jpg"><img class="aligncenter size-article-large wp-image-96176" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/skidrowe-keyscore-1000x591.jpg" alt="skidrowe-keyscore" /></a></p>
<p class="caption">Logo for the NSA&#8217;s satellite communications exploitation program SKIDROWE.</p>
<p><p class='caption source pullright' style=''>NSA</p></div>
<p>At the TITANPOINTE site, the NSA equipment is stored inside a secure room, known as a “Sensitive Compartmented Information Facility.” Top-secret <a href="https://theintercept.com/document/2016/11/16/fairview-dataflow-charts-apr-2012">diagrams</a> dated April 2012 show that within the secure space there is “NSA controlled” equipment linked to the routers of its &#8220;access partner,&#8221; referring to AT&amp;T. Intercepted internet data was collected from the “backbone,” then processed at TITANPOINTE, before being passed to NSA for storage. Phone calls that were intercepted were collected from TITANPOINTE&#8217;s “foreign gateway switches” before being routed through the partner&#8217;s “call processor.” They were then forwarded to NSA&#8217;s headquarters in Maryland through an interface shared with the partner.</p>
<p>Much of the surveillance carried out at TITANPOINTE seems to involve monitoring calls and other communications as they are being sent across AT&amp;T&#8217;s international phone and data cables. But the site has other capabilities at its disposal. The NSA&#8217;s documents indicate that it is also equipped with powerful satellite antenna — likely the ones located on the roof of 33 Thomas Street — which monitor information transmitted through the air.</p>
<p>The <a href="https://theintercept.com/document/2016/11/16/skidrowe-program">SKIDROWE</a> spying program focuses on covertly vacuuming up internet data — known as “digital network intelligence” — as it is passing between foreign satellites. The harvested data is then made accessible through XKEYSCORE, a Google-like mass surveillance system that the NSA&#8217;s employees use to search through huge quantities of information about people&#8217;s emails, chats, Skype calls, passwords, and internet browsing histories.</p>
<p>Fletcher Cook, an AT&amp;T spokesperson, told The Intercept that the company does not “allow any government agency to connect directly to or otherwise control our network to obtain our customers’ information. Rather, we simply respond to government requests for information pursuant to court orders or other mandatory process and, in rare cases, on a legal and voluntary basis when a person’s life is in danger and time is of the essence, like in a kidnapping situation.”</p>
<p>Cook added that NSA representatives “do not have access to any secure room or space within our owned portion of the 33 Thomas Street building.” When pressed on whether <em>any</em> room within 33 Thomas Street contains equipment used for the purposes of NSA surveillance, an AT&amp;T spokesperson pointed to a 1983 <a href="https://a836-acris.nyc.gov/DS/DocumentSearch/DocumentImageView?doc_id=FT_1560000052156">deed</a> and <a href="https://a836-acris.nyc.gov/DS/DocumentSearch/DocumentImageView?doc_id=FT_1000000065000">declaration</a> filed with New York City indicating that Verizon&#8217;s predecessor company maintained ownership of three floors and a basement floor in the building. The New York City Department of Finance said the predecessor company has an easement for the space and pays utility taxes, but insisted that AT&amp;T owns the whole building. The AT&amp;T spokesperson declined to comment further.</p>
<p>The NSA&#8217;s documents do not state that it can “connect directly to” or “otherwise control” AT&amp;T&#8217;s networks, but they do make clear that the agency has placed its own equipment inside TITANPOINTE to tap into phone calls and internet data. It may be the case that the secure room where the equipment is installed is overseen by AT&amp;T&#8217;s own engineers or technicians who have a security clearance. One NSA document dated from March 2013 suggests such a relationship, noting that the “corporate sites” the agency collects data from “are often controlled by the partner, who filters the communications before sending to NSA.”</p>
<p>As in 1983, AT&amp;T may not be completely alone at 33 Thomas Street. Earlier this year, a technician working at the building — who did not want to be named because he was not authorized to speak to the media — told The Intercept that a handful of Verizon employees were still based inside. However, the NSA&#8217;s documents do not suggest that Verizon is implicated in the surveillance at the TITANPOINTE facility, and instead only point to AT&amp;T&#8217;s involvement. Verizon declined to comment for this story.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/000004.jpg"><img class="aligncenter size-large wp-image-96159" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/000004.jpg" alt="000004" /></a></p>
<p class="caption overlayed">The entrance to 33 Thomas Street.<p class='caption source' style=''> Still from “Project X”</p></div>
<p><span class='dropcap'>A</span><u>T&amp;T is far</u> from the only company that has a relationship with the NSA. The agency has established what it calls “strategic partnerships” with more than 80 corporations. But some companies are more cooperative than others.</p>
<p>Historically, AT&amp;T has always maintained close ties with the government. A good example of this came in June 1976, when a congressional subcommittee served AT&amp;T with a subpoena demanding that it hand over information about its alleged role in unlawful FBI wiretapping of phone calls. President Gerald Ford personally intervened to block the subpoena, stating that AT&amp;T “was and is an agent of the United States acting under contract with the Executive Branch.” Ford said the company was in a “unique position” with respect to telephone and other communication lines in the U.S., and therefore it had been “necessary for the Executive Branch to rely on its services to assist in acquiring certain information necessary to the national defense and foreign policy.” The details sought by the committee could not be shared, Ford asserted, because they could expose “extremely sensitive foreign intelligence and counterintelligence information.”</p>
<p>In more recent decades, as the New York Times and ProPublica <a href="http://www.nytimes.com/2015/08/16/us/politics/att-helped-nsa-spy-on-an-array-of-internet-traffic.html">reported</a> last year, AT&amp;T has allowed the NSA to access billions of emails, exhibiting what the agency called its “extreme willingness to help.” These revelations were foreshadowed in 2006 by allegations made by Mark Klein, a former AT&amp;T technician. Klein stated that the company had maintained a &#8220;secure room&#8221; in one of its San Francisco offices, which was fitted with communications monitoring equipment apparently used by the NSA to tap into phone and internet traffic. Klein&#8217;s claims formed the basis of a lawsuit brought by the Electronic Frontier Foundation on behalf of AT&amp;T customers (<a href="https://www.eff.org/cases/jewel">Jewel v. NSA</a>), which remains ongoing today.</p>
<p><div class='img-wrap align-center width-fixed' style='width:840px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_2.jpg"><img class="aligncenter size-large wp-image-96163" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_2.jpg" alt="Mark-NYC-ATT-1988_2" /></a></p>
<p class="caption">Mark Klein at 33 Thomas Street in 1988. Klein worked as an AT&amp;T employee at that location for 10 years.</p>
<p><p class='caption source pullright' style=''>Photo courtesy of Mark Klein</p></div>Coincidentally, between 1981 and 1990, Klein also worked for AT&amp;T at 33 Thomas Street. “I wasn’t aware of any NSA presence when I was there, but I had a creepy feeling about the building, because I knew about AT&amp;T&#8217;s close collaboration with the Pentagon, going way back,” he told The Intercept. When presented with the details linking 33 Thomas Street to NSA&#8217;s TITANPOINTE, Klein added: “I’m not surprised. It’s obviously a major installation. … If you’re interested in doing surveillance, it’s a good place to do it.”</p>
<p>According to the Snowden documents, AT&amp;T has installed surveillance equipment in at least 59 U.S. sites. And on any given day, NSA employees may be working at the company&#8217;s facilities. Classified memos dated from April 2013 describe one- to four-day deployments of NSA technical staff to TITANPOINTE and other buildings. Most AT&amp;T personnel at these locations, however, are unlikely to have knowledge of the agency&#8217;s presence. NSA staff are encouraged to wear clothes that make them “blend in to the environment.” Even the car hire company the agency uses for its trips to AT&amp;T facilities is kept in the dark. “Some personnel are aware of the FBI link,” states the agency&#8217;s travel guidance, “but [they] have no knowledge of NSA&#8217;s involvement.”</p>
<p><em>This article is the product of a joint reporting project between The Intercept and Field of Vision. &#8220;Project X,&#8221; a Field of Vision documentary directed by Henrik Moltke and Laura Poitras, will screen at IFC Center starting November 18.</em><br />
———</p>
<p><em>Documents published with this story</em>:</p>
<ul>
<li><a href="https://theintercept.com/document/2016/11/16/blarney-site-book/">BLARNEY site book</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/fairview-site-book/">FAIRVIEW site book</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/fairview-dataflow-charts-apr-2012">FAIRVIEW dataflow charts April 2012</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/special-source-operations-corporate-overview">Special Source Operations corporate overview</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/blarney-report-apr-2013">BLARNEY report April 2013</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/blarney-program-overview">BLARNEY program overview</a></li>
<li><a href="https://theintercept.com/document/2016/11/16/skidrowe-program">SKIDROWE program</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/">The NSA’s Spy Hub in New York, Hidden in Plain Sight</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/11/16/the-nsas-spy-hub-in-new-york-hidden-in-plain-sight/feed/</wfw:commentRss>
		<slash:comments>221</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-1-440x440.jpg" />
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-1.jpg" medium="image">
			<media:title type="html">stills-seq-1</media:title>
			<media:description type="html">Illustration of Entrace Lobby.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-1-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-20.jpg" medium="image">
			<media:title type="html">stills-seq-20</media:title>
			<media:description type="html">Long lines building next to FBI.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-20-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-12.jpg" medium="image">
			<media:title type="html">stills-seq-12</media:title>
			<media:description type="html">Intercom at ATT long lines building.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/stills-seq-12-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9767-high-res-edit.jpg" medium="image">
			<media:title type="html">026V9767-high-res-edit</media:title>
			<media:description type="html">Blueprints of Equipment floor.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9767-high-res-edit-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V0261-edit.jpg" medium="image">
			<media:title type="html">026V0261-edit</media:title>
			<media:description type="html">Sketch of outside building.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V0261-edit-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9229-1.jpg" medium="image">
			<media:title type="html">026V9229-1</media:title>
			<media:description type="html">Statellites on top of ATT building.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/026V9229-1-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.57.jpg" medium="image">
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.57-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.11.jpg" medium="image">
			<media:title type="html">Screen-Shot-2016-11-11-at-16.59.11</media:title>
			<media:description type="html">Diagrams showing NSA-controlled equipment inside TITANPOINTE.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Screen-Shot-2016-11-11-at-16.59.11-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/11/skidrowe-keyscore.jpg" medium="image">
			<media:title type="html">skidrowe-keyscore</media:title>
			<media:description type="html">Program Skid Rowe.</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/11/skidrowe-keyscore-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/000004.jpg" medium="image">
			<media:title type="html">000004</media:title>
			<media:description type="html">Model of entrance date from when the model is?</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/000004-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_2.jpg" medium="image">
			<media:title type="html">Mark-NYC-ATT-1988_2</media:title>
			<media:description type="html">Mark Klein.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/11/Mark-NYC-ATT-1988_2-440x440.jpg" />
		</media:content>
	</item>
		<item>
		<title>The Little-Known Company That Enables Worldwide Mass Surveillance</title>
		<link>https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/</link>
		<comments>https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/#comments</comments>
		<pubDate>Sun, 23 Oct 2016 08:19:57 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=91323</guid>
		<description><![CDATA[<p>Leaked documents reveal Endace's key role helping governments spy on people’s private emails, online chats, social media conversations, and internet browsing histories.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/">The Little-Known Company That Enables Worldwide Mass Surveillance</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u><span class='dropcap'>I</span>t was a powerful</u> piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead of hair, had one main purpose: to vacuum up vast quantities of internet data at an astonishing speed.</p>
<p>The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.</p>
<p>Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with <a href="https://www.tvnz.co.nz/one-news/new-zealand/taxpayer-funded-grants-nz-tech-firm-used-build-surveillance-equipment-uk-government">Television New Zealand</a>, reveal the firm&#8217;s key role helping governments across the world harvest vast amounts of information on people&#8217;s private emails, online chats, social media conversations, and internet browsing histories.</p>
<p>The leaked files, which were provided by a source through <a href="https://theintercept.com/securedrop/">SecureDrop</a>, show that Endace listed a Moroccan security agency implicated in torture as one of its customers. They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.</p>
<p>Some of Endace&#8217;s largest sales in recent years, however, were to the United Kingdom&#8217;s GCHQ, which purchased a variety of “data acquisition” systems and “probes” that it used to covertly monitor internet traffic.</p>
<p>Documents from the National Security Agency whistleblower Edward Snowden, <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">previously disclosed</a> by The Intercept, have shown how GCHQ dramatically expanded its online surveillance between 2009 and 2012. The newly obtained Endace documents add to those revelations, shining light for the first time on the vital role played by the private sector in enabling the spying.</p>
<p>Stuart Wilson, Endace&#8217;s CEO, declined to answer questions for this story. Wilson said in a statement that Endace&#8217;s technology &#8220;generates significant export revenue for New Zealand and builds important technical capability for our country.&#8221; He added: &#8220;Our commercial technology is used by customers worldwide &#8230; who rely on network recording to protect their critical infrastructure and data from cybercriminals, terrorists, and state-sponsored cybersecurity threats.”<br />
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/4943588831_1f9d1924d2_o.jpg"><img class="aligncenter size-article-large wp-image-91764" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/10/4943588831_1f9d1924d2_o-1000x736.jpg" alt="4943588831_1f9d1924d2_o" /></a></p>
<p class="caption">Former Endace Director Ian Graham, right, meets New Zealand Prime Minister John Key in 2010.</p>
<p><p class='caption source pullright' style=''>Photo: NZNationalParty/Flickr</p></div></p>
<p><span class='dropcap'>E</span><u>ndace says it</u> manufactures technology that allows its clients to “monitor, intercept and capture 100% of traffic on networks.” The Auckland-based company&#8217;s motto is “power to see all” and its logo is an eye.</p>
<p>The company&#8217;s origins can be traced back to Waikato University in Hamilton, New Zealand. There, in 1994, a team of professors and researchers began developing network monitoring technology using university resources. A central aim of the project was to find ways to measure different kinds of data on the internet, which was at that time only just beginning to take off. Within a few years, the academics&#8217; efforts proved successful; they had managed to invent pioneering network monitoring tools. By 2001, the group behind the research started commercializing the technology — and Endace was formed.</p>
<p>Today, Endace presents itself publicly as focused on providing technology that helps companies and governments keep their networks secure. But in the past decade, it has quietly entered into a burgeoning global spy industry that is worth in excess of an estimated $5 billion annually.</p>
<p>In 2007, Endace representatives promoted their technology at a huge surveillance technology trade show in Dubai that was attended by dozens of government agencies from across the world. Endace&#8217;s advertising brochures from the show, which described the company&#8217;s products and promoted the need for greater state surveillance, were <a href="https://wikileaks.org/spyfiles/document/endace/8_why-sample-when-you-can-monitor-all-network-traffic/">published by WikiLeaks</a> in 2013.</p>
<p>One Endace brochure explained how the company&#8217;s technology could help clients “monitor all network traffic inexpensively.” It noted that telecommunications networks carry many types of information: Skype calls, videos, emails, and instant message chats. “These networks provide rich intelligence for law enforcement,” the brochure stated, “IF they can be accessed securely and with high precision.”<br />
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/undersea-cable.jpg"><img class="aligncenter size-large wp-image-91767" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/undersea-cable.jpg" alt="Germany Mecklenburg-Western Pomerania Baltic Sea - undersea cable to Hiddensee island" /></a></p>
<p class="caption overlayed">Workers lay undersea cables near Hiddensee Island, Germany.</p>
<p><p class='caption source' style=''>Photo: Ullstein Bild/Getty Images</p></div></p>
<p><span class='dropcap'>T</span><u>he United Kingdom&#8217;s</u> geographic location — situated between North America, mainland Europe, and the Middle East — made it a good market for Endace.</p>
<p>Many major international undersea data cables cross British territory, and according to <a href="https://theintercept.com/document/2015/09/25/200g-iris-access">top-secret documents</a> from Snowden, as much as 25 percent of all the world&#8217;s internet traffic flows through the U.K. The country&#8217;s spies have worked to exploit this, with GCHQ tapping into as many of the cables as it can, sifting through huge volumes of emails, instant messages, social media interactions, and web browsing records as they are being transmitted across the internet.</p>
<p>As of 2009, GCHQ&#8217;s surveillance of undersea cables was well underway. The agency was measuring the amount of traffic it monitored in tens of gigabits per second (10Gs) — the equivalent in data of about 1 million average-sized emails every minute. The electronic eavesdropping agency was tapping into 87 different 10Gs capacity cables and funneling the collected data into its processing systems for analysis.</p>
<p>By March 2011, GCHQ&#8217;s aim was to tap into 415 of the 10Gs cables, and its longer-term goal was to “<a href="https://theintercept.com/document/2015/09/25/access-vision-2013/">grow our internet access to 800 10Gs</a>.” The agency wanted to build what it described as the largest covert surveillance apparatus in the world. And in an effort to fulfill that plan, it turned to Endace&#8217;s technology.</p>
<p>Leaked documents and emails from Endace, obtained by The Intercept, lay out a series of deals the company made with GCHQ to help it broaden its mass surveillance capabilities. A confidential February 2010 Endace <a href="https://theintercept.com/document/2016/10/23/endace-gchq-statement-of-work/">statement of work</a> for GCHQ, for instance, outlined a £245,000 ($299,500) deal to upgrade “monitoring solutions” for the British agency that were designed to intercept large amounts of internet traffic and send it into “memory holes” — repositories used to store the data.</p>
<blockquote class='stylized pull-right'>The agency wanted to build the largest covert surveillance apparatus in the world.</blockquote>
<p>Between November 2010 and March 2011, GCHQ purchased more technology from Endace, including specialized surveillance technology built for “FGA only,” a code name the company often uses in its internal documents to refer to GCHQ; it stands for &#8220;friendly government agency.&#8221;</p>
<p>A November 2010 <a href="https://theintercept.com/document/2016/10/23/capture-cards-for-fga-only">company document</a> said that “FGA” had an order of 20 systems scheduled for delivery in March 2011. Each system was equipped with two “data acquisition” cards capable of intercepting 20Gs of internet traffic. The total capacity of the order would enable GCHQ to monitor a massive amount of data — the equivalent of being able to download 3,750 high-definition movies every minute, or 2.5 billion average-sized emails an hour.</p>
<p>Endace added in the document that “a potential for 300-500 systems over the next two to three years is being discussed” and noted that it was soon anticipating another order of “30-40 additional systems.” Indeed, the following month <a href="https://theintercept.com/document/2016/10/23/gchq-purchase-order-dec-2010/">a new $167,940 purchase order</a> for 27 more systems arrived, and the items were swiftly dispatched for delivery to GCHQ&#8217;s headquarters in Cheltenham, England.</p>
<p>The records of the Endace sales are confirmed by <a href="https://theintercept.com/document/2016/06/07/mobile-apps-checkpoint-meeting-archives">internal GCHQ documents</a>, provided by Snowden, which describe the company&#8217;s data capture devices being used as part of mass surveillance programs. GCHQ documents from 2010 and 2011 repeatedly mention the Endace products while discussing the capture of “internet-derived” data to extract information about people&#8217;s usage of services such as Gmail, Hotmail, WhatsApp, and Facebook.</p>
<p>GCHQ declined to comment for this story.<br />
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/endance-product.jpg"><img class="aligncenter size-large wp-image-91769" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/endance-product.jpg" alt="endance-product" /></a></p>
<p class="caption overlayed">An Endace diagram depicts a custom data capture system built for GCHQ.</p>
<p><p class='caption source' style=''>Photo: Endance</p></div></p>
<p><span class='dropcap'>T</span><u>hroughout the summer</u> of 2011, at Endace&#8217;s offices in Auckland, New Zealand, the orders from GCHQ were continuing to flow in. Meanwhile, the company&#8217;s engineers were busy turning their sights to new technology that could vastly increase surveillance capability. Endace was developing a powerful new product for GCHQ called Medusa: interception equipment that could capture internet traffic at up to 100 gigabits per second.</p>
<p>Medusa was first logged in Endace&#8217;s sales systems in September 2011. Endace staff produced <a href="https://theintercept.com/document/2016/10/23/medusa-weekly-status-report">weekly status reports</a> about their progress and updated GCHQ at biweekly review meetings. By November 18, 2011, the first version of Medusa arrived at GCHQ. “FGA are very pleased with the prototypes we delivered last week,” Endace noted.</p>
<p>Apparently after testing the Medusa prototype, GCHQ requested some refinements. One <a href="https://theintercept.com/document/2016/10/23/medusa-sprint-2-requirements/">feature the agency wanted</a> was called “Separate MAC insertion by IP type.” This suggests the British agency may have sought the ability to target individuals by searching internet traffic for the built-in hardware address of their computers, routers, or phones.</p>
<p>Notably, the Medusa status reports reveal that Endace was using taxpayers&#8217; money to develop the new equipment for GCHQ. They state that the Medusa system was being built for “FGA” with funding from the Foundation of Research Science and Technology, the body that handed out New Zealand government research grants.</p>
<p>In 2010, Endace received <a href="http://www.computerworld.co.nz/article/489270/endace_granted_4_4_million/">two</a> <a href="https://www.beehive.govt.nz/release/backing-winners-business-rampd">grants</a> totaling $11.1 million. A public announcement for the first grant — issued in July 2010 — said the funding was for “50% of the cost of a series of substantial product developments over the next two years,” but did not say what the products were nor who they were for.</p>
<p>A New Zealand government spokesperson told The Intercept that he could not immediately give a “definitive” answer on whether the funding body had known Endace would use the grants to develop surveillance technology for GCHQ, but said it was “highly unlikely Endace would have provided that information, as they were under no obligation to do so.”</p>
<p>Endace has never publicly disclosed any of its work with GCHQ, likely because it is subject to strict confidentiality agreements. In <a href="https://theintercept.com/document/2016/10/23/gchq-endace-contract-terms-march-2011">one contract</a> obtained by The Intercept, GCHQ states that Endace staff are bound to the U.K.&#8217;s Official Secrets Act, a sweeping law that can be used to prosecute and imprison people who disclose classified information. GCHQ warned Endace that it must not “make any press announcements or publicize the contract or any part thereof in any way.”<br />
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/gchq-satellite.jpg"><img class="aligncenter size-large wp-image-91784" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/gchq-satellite.jpg" alt="The back of two satellite antennae at GCHQ's surveillance base in Bude, England. (Photo By: Education Images/UIG via Getty Images)" /></a></p>
<p class="caption overlayed">The back of two satellite antennae at GCHQ&#8217;s surveillance base in Bude, England.</p>
<p><p class='caption source' style=''>Photo: Education Images/UIG/Getty Images</p></div></p>
<p><span class='dropcap'>E</span><u>ndace&#8217;s leaked client</u> lists show three main categories of customers: governments, telecommunications companies, and finance companies.</p>
<p>The government clients appear to be mostly intelligence agencies. A 2008 Endace customer list included: GCHQ; the Canadian and Australian defense departments (where their electronic spy agencies are located); a U.S. government contractor called Rep-Tron Systems Group, located in Baltimore, Maryland; and Morocco&#8217;s domestic surveillance agency, the DGST.</p>
<p>Other Endace customer lists contained in the leaked trove include the U.S. Army and the U.S. Navy&#8217;s Space and Naval Warfare Systems Command, called SPAWAR; the Israeli Ministry of Defense (home of its Unit 8200 electronic spy agency); the government of India, the Spanish Ministry of Defense; and Denmark&#8217;s Defense Intelligence Service.</p>
<p>Endace&#8217;s apparent dealings with the Moroccan agency, the DGST, are particularly controversial. Moroccan authorities have been persistently accused over more than five decades of committing a range of severe human rights abuses.</p>
<blockquote class='stylized pull-right'>In Morocco, digital surveillance is intimately linked with repression of peaceful dissent.</blockquote>
<p>Amnesty International, in <a href="https://www.amnestyusa.org/research/reports/shadow-of-impunity-torture-in-morocco-and-western-sahara">a 2015 report</a>, specifically singled out the DGST agency as a key perpetrator of recent abuses, accusing it of detaining people incommunicado and using brutal torture methods that included beatings, electric shocks, sexual violence, simulated drowning, drugging, mock executions, and food and sleep deprivation.</p>
<p>Sirine Rached, Amnesty&#8217;s North Africa researcher, told The Intercept that sales of surveillance technology to Morocco raised major concerns.</p>
<p>“In Morocco, digital surveillance is intimately linked with repression of peaceful dissent — people who are peacefully protesting or criticizing the authorities face intimidation, arrest, unfair trials, and sometimes imprisonment,” said Rached. “We fear that the more that these surveillance tools are sold [to Moroccan agencies], the more we will see human rights abuses, especially in relation to freedom of expression and information.”</p>
<p>Endace declined to comment on its dealings with Morocco. Stuart Wilson, Endace&#8217;s CEO, claimed in a statement that he had to keep details about the company&#8217;s customers confidential in order to help them “battle cyberthreats and breaches.”</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/10/dag-endace-product.jpg"><img class="aligncenter size-article-large wp-image-91851" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/dag-endace-product-1000x679.jpg" alt="" /></a></p>
<p class="caption">An Endace &#8220;data acquisition and generation&#8221; card, used to monitor networks.</p>
<p><p class='caption source pullright' style=''>Photo: Endace</p></div>
<p><span class='dropcap'>A</span><u>longside its government</u> clients, Endace has many major corporate customers.</p>
<p>Endace&#8217;s sales lists include finance industry giants such as Morgan Stanley, Reuters, and Bank of America. Endace&#8217;s website says it provides financial companies with its monitoring technology to help “high-frequency traders to monitor, measure, and analyze critical network environments.”</p>
<p>In addition, Endace sells its equipment to some of the world&#8217;s largest telecommunications companies, among them AT&amp;T, AOL, Verizon, Sprint, Cogent Communications, Telstra, Belgacom, Swisscom, Deutsche Telekom, Telena Italy, Vastech South Africa, and France Telecom.</p>
<p>Some of these companies may use the Endace equipment for checking the security of their networks. But a key strand of Endace&#8217;s business involves providing technology for telecommunications firms that enables law enforcement and intelligence agencies to intercept the messages and data of phone and internet users.</p>
<p>A company <a href="https://theintercept.com/document/2016/10/23/sprint-endace-lawful-intercept">product strategy document</a> from 2010 said that Endace had “seen early success” providing a Lawful Intercept product to the major U.S. telco and internet company Sprint Corporation.</p>
<p>All telcos and internet companies in the U.S., Europe, New Zealand, and a number of other countries are required by law to have “intercept capable” equipment on their networks. When police or spy agencies want private data about a customer (with or without a warrant, depending on the country), it can be extracted easily.</p>
<p>When installed on a network, Endace&#8217;s surveillance equipment can be used to perform targeted monitoring of individual people, but it can also be used to enable dragnet spying.</p>
<p>In one of the leaked Endace documents obtained by The Intercept — under a section titled “customer user stories” — the company <a href="https://theintercept.com/document/2016/10/23/kraken-overview">describes</a> a situation in which a government agency has obtained “the encryption keys for a well-known program.” An Endace surveillance “probe,” the document suggests, could help the government agency “unencrypt all packets sent by this program on a large network in the last 24 hours.”</p>
<p>Once the data has been decrypted, the agency will be able to “look for the text string &#8216;Domino’s Pizza,’” Endace joked, “as they have information suggesting this is the favorite pizza of international terrorists.”</p>
<p>———<br />
<em>Documents published with this article:</em></p>
<ul>
<li><a href="https://theintercept.com/document/2016/10/23/gchq-endace-contract-terms-march-2011">GCHQ Endace contract terms March 2011</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/endace-gchq-statement-of-work/">Endace-GCHQ statement of work</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/gchq-purchase-order-dec-2010/">GCHQ purchase order Dec 2010</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/endace-purchased-support-list">Endace purchased support list</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/strategic-account-list">Strategic account list</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/customer-purchase-list-2010">Customer purchase list 2010</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/customer-list">Customer list</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/customer-list-2">Customer list 2</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/upgrade-account-list">Upgrade account list</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/medusa-weekly-status-report">Medusa weekly status report</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/medusa-sprint-2-requirements/">Medusa sprint 2 requirements</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/gchq-important-order">GCHQ &#8216;important order&#8217;</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/financial-report-sept-2012">Endace financial report Sept 2012</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/sprint-endace-lawful-intercept">Sprint Endace lawful intercept</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/kraken-overview">Kraken overview</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/gchq-probe-order">GCHQ probe order</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/spanish-mod-custom">Spanish MoD custom</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/capture-cards-for-fga-only">Capture cards for FGA only</a></li>
<li><a href="https://theintercept.com/document/2016/10/23/gchq-and-canada-dnd-engineering-change">GCHQ and Canada DND engineering change</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/">The Little-Known Company That Enables Worldwide Mass Surveillance</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/feed/</wfw:commentRss>
		<slash:comments>91</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/4943588831_1f9d1924d2_o-440x440.jpg" />
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/4943588831_1f9d1924d2_o.jpg" medium="image">
			<media:title type="html">4943588831_1f9d1924d2_o</media:title>
			<media:description type="html">TK Professor Ian Graham and NZ prime minister John Key</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/4943588831_1f9d1924d2_o-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/undersea-cable.jpg" medium="image">
			<media:title type="html">Germany Mecklenburg-Western Pomerania Baltic Sea &#8211; undersea cable to Hiddensee island</media:title>
			<media:description type="html">TK Germany Mecklenburg-Western Pomerania Baltic Sea - undersea cable to Hiddensee island</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/undersea-cable-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/10/endance-product.jpg" medium="image">
			<media:title type="html">endance-product</media:title>
			<media:description type="html">A diagram depicts a custom data capture system Endace built for GCHQ.ce system Endace built for GCHQ.</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/10/endance-product-440x326.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/gchq-satellite.jpg" medium="image">
			<media:title type="html">The back of two satellite antenna at GCHQ Bude, Cornwall</media:title>
			<media:description type="html">The back of two satellite antenna at GCHQ Bude, Cornwall, UK.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/10/gchq-satellite-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/10/dag-endace-product.jpg" medium="image">
			<media:title type="html">dag-endace-product</media:title>
			<media:description type="html">An Endace &#34;data acquisition and generation&#34; card, used to monitor networks.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/10/dag-endace-product-440x440.jpg" />
		</media:content>
	</item>
		<item>
		<title>U.K.’s Mass Surveillance Databases Were Unlawful for 17 Years, Court Rules</title>
		<link>https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/</link>
		<comments>https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/#comments</comments>
		<pubDate>Mon, 17 Oct 2016 19:11:22 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=92097</guid>
		<description><![CDATA[<p>A special tribunal has found that British spy agencies maintained huge secret databases of people’s private data without adequate safeguards between 1998 and 2015.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/">U.K.’s Mass Surveillance Databases Were Unlawful for 17 Years, Court Rules</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>For nearly two</u> decades, British spies unlawfully maintained vast troves of people&#8217;s private data without adequate safeguards against misuse, a tribunal of senior judges has ruled.</p>
<p>Between 1998 and 2005, electronic surveillance agency Government Communications Headquarters and domestic spy agency MI5 began secretly harvesting “bulk personal datasets” containing millions of records about people&#8217;s phone calls, travel habits, internet activity, and financial transactions.</p>
<p>On Monday, the Investigatory Powers Tribunal, a special court that handles complaints related to British spy agencies, found that access to the datasets had not been subject to sufficient supervision through a 17-year period between 1998 and November 2015. The <a href="https://www.documentcloud.org/documents/3143963-investigatory-powers-tribunal-bulk-data-judgment.html">tribunal said</a> that due to “failings in the system of oversight” the surveillance regime had violated Article 8 of the European Convention on Human Rights, which protects the right to privacy.</p>
<p>The case was brought in June 2015 by the London-based human rights group Privacy International, which challenged the legality of the surveillance after the British government publicly admitted using an obscure provision of the 1984 Telecommunications Act to harvest the data.</p>
<p>“Today&#8217;s judgment is a long overdue indictment of U.K. surveillance agencies riding roughshod over our democracy and secretly spying on a massive scale,” said Millie Graham Wood, legal officer at Privacy International. “It is unacceptable that it is only through litigation by a charity that we have learnt the extent of these powers and how they are used. The public and Parliament deserve an explanation as to why everyone’s data was collected for over a decade without oversight in place and confirmation that unlawfully obtained personal data will be destroyed.&#8221;</p>
<p>While the tribunal found that the mass collection of data lacked adequate oversight, it did not rule that the surveillance itself was illegal. The judgment found in favor of the government on that front, stating that the use of the Telecommunications Act to harvest the bulk datasets was lawful.</p>
<p>A spokesperson for the U.K. government said in a statement: “The powers available to the security and intelligence agencies play a vital role in protecting the U.K. and its citizens. We are therefore pleased the tribunal has confirmed the current lawfulness of the existing bulk communications data and bulk personal dataset regimes.”</p>
<p>According to documents that were <a href="https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/">released earlier this year</a>, the bulk datasets can cover a wide variety of information, potentially revealing details such as people’s political opinions, religious beliefs, union affiliation, physical or mental health status, sexual preferences, biometric data, and spending habits. They may also contain data revealing legally privileged information and journalists’ confidential sources. And the spy agencies have acknowledged that “medical data may appear” in some of the data troves, too, though they claim they do not explicitly harvest people&#8217;s medical records.</p>
<p>It is often argued by government officials that mass collection of data is not on its face a violation of privacy, and that privacy is not breached until individual communications are looked at or analyzed by humans.</p>
<p>Notably, the tribunal&#8217;s ruling on Monday disagreed with that notion, stating that the privacy protections contained in the European Convention on Human Rights are “engaged by the transfer and storage of communications data even if it is not accessed.” This principle may turn out to be important in a <a href="https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/">separate case</a> that remains ongoing in the European Court of Human Rights, which is expected to look more closely at the legality of the U.K.&#8217;s mass surveillance programs.</p>
<p class="caption">Top photo: GCHQ headquarters in Cheltenham, England.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/">U.K.’s Mass Surveillance Databases Were Unlawful for 17 Years, Court Rules</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/feed/</wfw:commentRss>
		<slash:comments>34</slash:comments>
	
	</item>
		<item>
		<title>Europe’s Top Human Rights Court Will Consider Legality of Surveillance Exposed by Edward Snowden</title>
		<link>https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/</link>
		<comments>https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/#comments</comments>
		<pubDate>Fri, 30 Sep 2016 17:13:05 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uproxx]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=88620</guid>
		<description><![CDATA[<p>A coalition of 10 human rights groups has launched a major new legal challenge over the U.K. government's mass surveillance programs.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/">Europe’s Top Human Rights Court Will Consider Legality of Surveillance Exposed by Edward Snowden</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>Human rights groups</u> have launched a major new legal challenge over mass surveillance programs revealed by the National Security Agency whistleblower Edward Snowden.</p>
<p>Ten organizations — including Privacy International, the American Civil Liberties Union, and Amnesty International — are taking up the landmark case against the U.K. government in the European Court of Human Rights (pictured above). In a <a href="https://www.documentcloud.org/documents/3115985-APPLICANTS-REPLY-to-GOVT-OBSERVATIONS-PDF.html">115-page complaint</a> released on Thursday, the groups allege that “blanket and indiscriminate” surveillance operations carried out by British spy agencies in collaboration with their U.S. counterparts violate privacy and freedom of expression rights.</p>
<p>The case represents the first time Europe&#8217;s top human rights court has been asked to consider the legality of surveillance exposed in the Snowden documents. Its judgments are legally binding and could potentially have ramifications for how surveillance is conducted by U.K. agencies.</p>
<p>“Through bulk surveillance programs, the U.S. and U.K. governments intercept the private communications and data of millions of people around the world,” said Ashley Gorski, staff attorney at the ACLU National Security Project. “Not only is bulk surveillance unlawful, but it has a deeply chilling and corrosive effect on political discourse and our personal communications. We are hopeful that the European Court of Human Rights will recognize that this mass surveillance violates fundamental rights to privacy and freedom of speech, and that the court’s ruling will help put an end to these practices on a global scale.”</p>
<p>An <a href="https://www.documentcloud.org/documents/3115986-Factual-Appendix-to-Applicants-Reply-to-Govt.html">appendix</a> to the complaint names more than a dozen surveillance programs that it says violate rights and do not have adequate safeguards against abuse. Among them are programs operated by the British surveillance agency Government Communications Headquarters — such as KARMA POLICE — which were <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">exposed by The Intercept</a> last year. KARMA POLICE was designed to allow the U.K. agency to build “a web browsing profile for every visible user on the internet.” The appendix also focuses on NSA-operated programs that have been shared with British spies, such as <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/">XKEYSCORE</a>, a tool that can be used to sift through masses of emails, online chats, and virtually every other kind of internet data.</p>
<p>The complaint argues that the scale of the surveillance “is unprecedented in terms of (a) the number of individuals whose communications are potentially affected; (b) the quantity of communications content and related communications data that is actually initially intercepted, extracted, filtered, stored, analysed and/or disseminated by the U.K. intelligence agencies.” It adds that the “the operation of sophisticated covert surveillance powers without adequate safeguards is ipso facto disproportionate.”</p>
<p>A spokesperson for the U.K. government&#8217;s Home Office declined to comment on the specifics of the case, but said in a statement: &#8220;Our security and intelligence agencies operate under some of the tightest controls in the world and the government is clear the U.K.&#8217;s investigatory powers legislation is fully compliant with ECHR requirements.&#8221;</p>
<p><strong>Update: October 3, 2016</strong><br />
This article has been updated to include a response from the U.K. government.</p>
<p>Sign up for The Intercept Newsletter <a href='https://theintercept.us11.list-manage.com/subscribe?u=43fc0c0fce9292d8bed09ca27&id=e00a5122d3'>here</a>.</p><p>The post <a rel="nofollow" href="https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/">Europe’s Top Human Rights Court Will Consider Legality of Surveillance Exposed by Edward Snowden</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/09/30/echr-nsa-gchq-snowden-surveillance-privacy/feed/</wfw:commentRss>
		<slash:comments>27</slash:comments>
	
<leadImageArt>https://theintercept.com/wp-uploads/sites/1/2016/09/AP_4435392332160.jpg</leadImageArt><leadImageArtCredit>Photo: Rolf Haid/AP Images</leadImageArtCredit>	</item>
		<item>
		<title>The NSA&#8217;s British Base at the Heart of U.S. Targeted Killing</title>
		<link>https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/</link>
		<comments>https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/#comments</comments>
		<pubDate>Tue, 06 Sep 2016 09:05:51 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=73566</guid>
		<description><![CDATA[<p>Top-secret documents expose the controversial role of a massive NSA surveillance base in England's countryside.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/">The NSA&#8217;s British Base at the Heart of U.S. Targeted Killing</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span class='dropcap'>T</span><u>he narrow roads</u> are quiet and winding, surrounded by rolling green fields and few visible signs of life beyond the occasional herd of sheep. But on the horizon, massive white golf ball-like domes protrude from the earth, protected behind a perimeter fence that is topped with piercing razor wire. Here, in the heart of the tranquil English countryside, is the National Security Agency&#8217;s largest overseas spying base.</p>
<p>Once known only by the code name Field Station 8613, the secret base — now called Menwith Hill Station — is located about nine miles west of the small town of Harrogate in North Yorkshire. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA&#8217;s sprawling global surveillance network.</p>
<p>For years, journalists and researchers have speculated about what really goes on inside Menwith Hill, while human rights groups and some politicians have campaigned for more transparency about its activities. Yet the British government has steadfastly refused to comment, citing a longstanding policy not to discuss matters related to national security.</p>
<p>Now, however, top-secret documents obtained by <em>The Intercept</em> offer an unprecedented glimpse behind Menwith Hill&#8217;s razor wire fence. The files reveal for the first time how the NSA has used the British base to aid “a significant number of capture-kill operations” across the Middle East and North Africa, fueled by powerful eavesdropping technology that can harvest data from more than 300 million emails and phone calls a day.</p>
<p>Over the past decade, the documents show, the NSA has pioneered groundbreaking new spying programs at Menwith Hill to pinpoint the locations of suspected terrorists accessing the internet in remote parts of the world. The programs — with names such as GHOSTHUNTER and GHOSTWOLF — have provided support for conventional British and American military operations in Iraq and Afghanistan. But they have also aided covert missions in countries where the U.S. has not declared war. NSA employees at Menwith Hill have collaborated on a project to help “eliminate” terrorism targets in Yemen, for example, where the U.S. has waged a controversial drone bombing campaign that has resulted in dozens of civilian deaths.</p>
<p>The disclosures about Menwith Hill raise new questions about the extent of British complicity in U.S. drone strikes and other so-called targeted killing missions, which may in some cases have violated international laws or constituted war crimes. Successive U.K. governments have publicly stated that all activities at the base are carried out with the “full knowledge and consent” of British officials.</p>
<p>The revelations are “yet another example of the unacceptable level of secrecy that surrounds U.K. involvement in the U.S. &#8216;targeted killing&#8217; program,” Kat Craig, legal director of London-based human rights group <a href="http://www.reprieve.org.uk/">Reprieve</a>, told <em>The Intercept</em>.</p>
<p>“It is now imperative that the prime minister comes clean about U.K. involvement in targeted killing,” Craig said, “to ensure that British personnel and resources are not implicated in illegal and immoral activities.”</p>
<p>The British government&#8217;s Ministry of Defence, which handles media inquires related to Menwith Hill, declined to comment for this story.</p>
<p>The NSA referred a request for comment to the Director of National Intelligence&#8217;s office.</p>
<p>Richard Kolko, a spokesperson for the DNI, said in a statement: “The men and women serving the intelligence community safeguard U.S. national security by collecting information, conducting analysis, and providing intelligence for informed decision making under a strict set of laws, policies and guidelines. This mission protects our nation and others around the world.”</p>
<p><div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_03.jpg"><img class="aligncenter size-large wp-image-73583" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_03.jpg" alt="MenwithHill_03" /></a></p>
<p class="caption overlayed">Menwith Hill on March 11, 2014.</p>
<p><p class='caption source' style=''>Photo: Trevor Paglen</p></div><span class='dropcap'>T</span><u>he equipment at</u> Menwith Hill covers roughly one square mile, which is patrolled 24 hours a day by armed British military police and monitored by cameras perched on posts that peer down on almost every section of the 10-foot perimeter fence.</p>
<p>Most visible from the outside are a cluster of about 30 of the giant white domes. But the site also houses a self-contained community, accessible only to those with security clearance. Among operations buildings in which analysts listen in on monitored conversations, there is a bowling alley, a small pool hall, a bar, a fast food restaurant, and a general store.</p>
<p>Most of the world&#8217;s international phone calls, internet traffic, emails, and other communications are sent over a network of undersea cables that connect countries like giant arteries. At spy outposts across the world, the NSA and its partners tap into these cables to monitor the data flowing through them. But Menwith Hill is focused on a different kind of surveillance: eavesdropping on communications as they are being transmitted through the air.</p>
<p>According to top-secret documents obtained by <em>The Intercept</em> from NSA whistleblower Edward Snowden, Menwith Hill has two main spying capabilities. The first is called FORNSAT, which uses powerful antennae contained within the golf ball-like domes to eavesdrop on communications as they are being beamed between foreign satellites. The second is called OVERHEAD, which uses U.S. government satellites orbiting above targeted countries to locate and monitor wireless communications on the ground below — such as cellphone calls and even WiFi traffic.</p>
<p><div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/09/satmhs.jpg"><img class="aligncenter size-article-large wp-image-73736" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/09/satmhs.jpg" alt="" /></a></p>
<p class="caption">A spy satellite launched in 2009 and operated from Menwith Hill. Its role was to intercept communications flowing across &#8220;commercial satellite uplinks,&#8221; according to NSA documents.</p>
<p></div>In the late 1980s, international communication networks were revolutionized by new fiber-optic undersea cables. The technology was cheaper than satellites and could transmit data across the world much faster than ever before, at almost the speed of light. For this reason, according to the NSA&#8217;s documents, in the mid-1990s the U.S. intelligence community was convinced that satellite communications would soon become obsolete, to be fully replaced by fiber-optic cable networks.</p>
<p>But the prediction proved to be wrong. And millions of phone calls are still beamed between satellites today, alongside troves of internet data, which the NSA has readily exploited at Menwith Hill.</p>
<p>“The commercial satellite communication business is alive and well and bursting at the seams with increasingly sophisticated bulk DNI (Digital Network Intelligence) traffic that is largely unencrypted,” the NSA reported in a <a href="https://www.documentcloud.org/documents/3089505-Too-much-of-a-good-thing.html">2006 document</a>. “This data source alone provides more data for Menwith Hill analysts to sift through than our entire enterprise had to deal with in the not-so-distant past.”</p>
<blockquote class='stylized pull-right'>The U.S. and U.K. governments have actively misled the public for years through a “cover story.”</blockquote>
<p>As of 2009, Menwith Hill&#8217;s foreign satellite surveillance mission, code-named MOONPENNY, was monitoring 163 different satellite data links. The intercepted communications were funneled into a variety of <a href="https://www.documentcloud.org/documents/3089493-MHS-Databases-as-of-14-Aug-2008.html">different repositories</a> storing phone calls, text messages, emails, internet browsing histories, and other data.</p>
<p>It is not clear precisely how many communications Menwith Hill is capable of tapping into at any one time, but the NSA&#8217;s <a href="https://www.documentcloud.org/documents/3089532-Elegant-Chaos-collect-it-all-exploit-it-all.html">documents indicate</a> the number is extremely large. In a single 12-hour period in May 2011, for instance, its surveillance systems logged more than 335 million metadata records, which reveal information such as the sender and recipient of an email, or the phone numbers someone called and at what time.</p>
<p>To keep information about Menwith Hill&#8217;s surveillance role secret, the U.S. and U.K. governments have actively misled the public for years through a “cover story” portraying the base as a facility used to provide “rapid radio relay and conduct communications research.” A classified U.S. document, dated from 2005, <a href="https://www.documentcloud.org/documents/3089521-Menwith-satellite-classification-guide.html">cautioned</a> spy agency employees against revealing the truth. “It is important to know the established cover story for MHS [Menwith Hill Station] and to protect the fact that MHS is an intelligence collection facility,” the document stated. “Any reference to satellites being operated or any connection to intelligence gathering is strictly prohibited.”</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_04.jpg"><img class="aligncenter size-large wp-image-73585" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_04.jpg" alt="MenwithHill_04" /></a></p>
<p class="caption overlayed">Menwith Hill Station on March 11, 2014.</p>
<p><p class='caption source' style=''>Photo: Trevor Paglen</p></div>
<p><span class='dropcap'>T</span><u>he outpost was</u> built in the 1950s as part of a deal made by the British and American governments to house U.S. personnel and surveillance equipment. In its early days, Menwith Hill&#8217;s technology was much more primitive. According to Kenneth Bird, who worked at the base in the 1960s during the Cold War, it was focused then on monitoring high frequency radio signals in Eastern Europe. Intercepted conversations were recorded on Ampex tape recorders, Bird noted in his published 1997 account, with some transcribed by analysts in real-time using typewriters.</p>
<p>The modern Menwith Hill is a very different place. Now, not only are its spying systems capable of vacuuming up far more communications, but they also have a far broader geographic reach. In addition, the targets of the surveillance have drastically changed, as have the purposes for which the eavesdropping is carried out.</p>
<p>The documents obtained by <em>The Intercept</em> <a href="https://www.documentcloud.org/documents/3089521-Menwith-satellite-classification-guide.html">reveal</a> that spy satellites operated at Menwith Hill today can target communications in China and Latin America, and also provide “continuous coverage of the majority of the Eurasian landmass,” where they intercept “tactical military, scientific, political, and economic communications signals.” But perhaps the most significant role the base has played in recent years has been in the Middle East and North Africa.</p>
<p>Especially in remote parts of the world where there are no fiber-optic cable links, it is common for internet connections and phone calls to be routed over satellite. Consequently, Menwith Hill became a vital asset in the U.S. government&#8217;s counterterrorism campaign after the 9/11 attacks. Since then, the base has been used extensively to tap into communications in otherwise hard-to-reach areas where Islamic extremist groups such as al Qaeda and al Shabaab have been known to operate — for example, in the Afghanistan-Pakistan border region, Somalia, and Yemen.</p>
<p><div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/ghosthunter3.jpg"><img class="aligncenter size-article-large wp-image-73588" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/07/ghosthunter3-1000x773.jpg" alt="" /></a></p>
<p class="caption">An aerial image captured by a U.S. satellite in support of a covert GHOSTHUNTER operation.</p>
<p></div>Crucially, however, Menwith Hill has been used for more than just gathering intelligence on people and governments across countries in the Middle East and North Africa. Surveillance tools such as the GHOSTHUNTER system were developed to directly aid military operations, pinpointing the locations of targeted people or groups so that they could then be captured or killed.</p>
<p>The NSA&#8217;s documents describe GHOSTHUNTER as a means “to locate targets when they log onto the internet.” It was first developed in 2006 as “the only capability of its kind” and it <a href="https://www.documentcloud.org/documents/3089509-APPARITION-becomes-a-reality-new-corporate-VSAT.html">enabled</a> “a significant number of capture-kill operations” against alleged terrorists. Only a few specific examples are given, but those cases give a remarkable insight into the extraordinary power of the technology.</p>
<p>In 2007, for instance, analysts at Menwith Hill used GHOSTHUNTER to help track down a suspected al Qaeda “facilitator” in Lebanon who was described as “highly actionable,” meaning he had been deemed a legitimate target to kill or capture. The location of the target — who was known by several names, including Abu Sumayah — was traced to within a few hundred meters based on intercepts of his communications. Then a spy satellite took an aerial photograph of the neighborhood in Sidon, south Lebanon, in which he was believed to be living, mapping out the surrounding streets and houses. A top-secret document detailing the surveillance indicates that the information was to be passed to a secretive special operations unit known as Task Force 11-9, which would have been equipped to conduct a covert raid to kill or capture Sumayah. The outcome of the operation, however, is unclear, as it is not revealed in the document.</p>
<p>In another case in 2007, GHOSTHUNTER was used to identify an alleged al Qaeda “weapons procurer” in Iraq named Abu Sayf. The NSA&#8217;s surveillance systems spotted Sayf logging into Yahoo email or messenger accounts at an internet cafe near a mosque in Anah, a town on the Euphrates River that is about 200 miles northwest of Baghdad. Analysts at Menwith Hill used GHOSTHUNTER to track down his location and spy satellites operated from the British base captured aerial images. This information was passed to U.S. military commanders based in Fallujah to be included as part of a “targeting plan.”</p>
<p>A few days later, a special operations unit named Task Force-16 stormed two properties, where they detained Sayf, his father, two brothers, and five associates.</p>
<p>By 2008, the apparent popularity of GHOSTHUNTER within the intelligence community meant that it was rolled out at other surveillance bases where NSA has a presence, including in Ayios Nikolaos, Cyprus, and Misawa, Japan. The expansion of the capability to the other bases meant that it now had “near-global coverage.” But Menwith Hill remained its most important surveillance site. “[Menwith Hill] still supplies about 99% of the FORNSAT data used in GHOSTHUNTER geolocations,” <a href="https://www.documentcloud.org/documents/3089498-Ghosthunter-future-capabilities-2008.html">noted</a> a January 2008 document about the program.</p>
<p>A 2009 document <a href="https://www.documentcloud.org/documents/3089512-Ghosthunter-and-the-geolocating-of-internet-cafes.html">added</a> that GHOSTHUNTER&#8217;s focus was at that time “on geolocation of internet cafés in the Middle East/North Africa region in support of U.S. military operations” and said that it had to date “successfully geolocated over 5,000 VSAT terminals in Iraq, Afghanistan, Syria, Lebanon, and Iran.” VSAT, or Very Small Aperture Terminal, is a satellite system commonly used by internet cafés and foreign governments in the Middle East to send and receive communications and data. GHOSTHUNTER could also home in on VSATs in Pakistan, Somalia, Algeria, the Philippines, Mali, Kenya, and Sudan, the documents indicate.</p>
<p>Menwith Hill&#8217;s unique ability to track down satellite devices across the world at times placed it on the front line of conflicts thousands of miles away. In Afghanistan, for instance, analysts at the base used the VSAT surveillance to help track down suspected members of the Taliban, which led to “approximately 30 enemy killed” during one series of attacks that were <a href="https://www.documentcloud.org/documents/3089519-Afghanistan-30-enemy-killed-Jan-Feb-2012.html">mentioned</a> in a top-secret July 2011 report. In early 2012, Menwith Hill&#8217;s analysts were again called upon to track down a VSAT: this time, to assist British special forces in Afghanistan&#8217;s Helmand Province. The terminal was swiftly located, and within an hour an MQ-9 Reaper drone was dispatched to the area, presumably to launch an airstrike.</p>
<p>But the lethal use of the surveillance data does not appear to have been restricted to conventional war zones such as Afghanistan or Iraq. The NSA developed similar methods at Menwith Hill to track down terror suspects in Yemen, where the U.S. has waged a covert drone war against militants associated with al Qaeda in the Northern Peninsula.</p>
<p>In early 2010, the agency revealed in an <a href="https://www.documentcloud.org/documents/3089514-New-technique-geolocates-targets-active-at.html">internal report</a> that it had launched a new technique at the British base to identify many targets “at almost 40 different geolocated internet cafés” in Yemen&#8217;s Shabwah province and in the country&#8217;s capital, Sanaa. The technique, the document revealed, was linked to a broader classified initiative called GHOSTWOLF, described as a project to “capture or eliminate key nodes in terrorist networks” by focusing primarily on “providing actionable geolocation intelligence derived from [surveillance] to customers and their operational components.”</p>
<p>The description of GHOSTWOLF ties Menwith Hill to lethal operations in Yemen, providing the first documentary evidence that directly implicates the U.K. in covert actions in the country.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_hero.jpg"><img class="aligncenter size-large wp-image-73575" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_hero.jpg" alt="MenwithHill_hero" /></a></p>
<p class="caption overlayed">Menwith Hill, March 13, 2013.</p>
<p><p class='caption source' style=''>Photo: Trevor Paglen</p></div>
<p><span class='dropcap'>M</span><u>enwith Hill&#8217;s previously</u> undisclosed role aiding the so-called targeted killing of terror suspects highlights the extent of the British government&#8217;s apparent complicity in controversial U.S. attacks — and raises questions about the legality of the secret operations carried out from the base.</p>
<p>There are some 2,200 personnel at Menwith Hill, the majority of whom are Americans. Alongside NSA employees within the complex, the U.S. National Reconnaissance Office also has a major presence at the site, running its own “ground station” from which it controls a number of spy satellites.</p>
<p>But the British government has publicly asserted as recently as 2014 that operations at the base “have always been, and continue to be” carried out with its “knowledge and consent.” Moreover, roughly 600 of the personnel at the facility are from U.K. agencies, including employees of the NSA&#8217;s British counterpart Government Communications Headquarters, or GCHQ.</p>
<p>For several years, British human rights campaigners and lawmakers have been pressuring the government to provide information about whether it has had any role aiding U.S. targeted killing operations, yet they have been met with silence. In particular, there has been an attempt to establish whether the U.K. has aided U.S. drone bombings outside of declared war zones — in countries including Yemen, Pakistan, and Somalia — which have resulted in the deaths of hundreds of civilians and are in some cases considered by United Nations officials to possibly constitute war crimes and violations of international law.</p>
<p>Though the Snowden documents analyzed by <em>The Intercept</em> state that Menwith Hill has aided “a significant number” of “capture-kill” operations, they do not reveal specific details about all of the incidents that resulted in fatalities. What is clear, however, is that the base has targeted countries such as Yemen, Pakistan, and Somalia as part of location-tracking programs like GHOSTHUNTER and GHOSTWOLF — which were created to help pinpoint individuals so they could be captured or killed — suggesting it has played a part in drone strikes in these countries.</p>
<blockquote class='stylized pull-none'>“An individual involved in passing that information is likely to be an accessory to murder.”</blockquote>
<p>Craig, the legal director at Reprieve, reviewed the Menwith Hill documents — and said that they indicated British complicity in covert U.S. drone attacks. “For years, Reprieve and others have sought clarification from the British government about the role of U.K. bases in the U.S. covert drone program, which has killed large numbers of civilians in countries where we are not at war,” she told <em>The Intercept</em>. “We were palmed off with platitudes and reassured that any U.S. activities on or involving British bases were fully compliant with domestic and international legal provisions. It now appears that this was far from the truth.”</p>
<p>Jemima Stratford QC, a leading British human rights lawyer, told <em>The Intercept</em> that there were “serious questions to be asked and serious arguments to be made” about the legality of the lethal operations aided from Menwith Hill. The operations, Stratford said, could have violated the <a href="http://rightsinfo.org/the-rights-in-the-european-convention/">European Convention on Human Rights</a>, an international treaty that the U.K. still remains bound to despite its recent vote to leave the European Union. Article 2 of the Convention protects the “right to life” and states that “no one shall be deprived of his life intentionally” except when it is ordered by a court as a punishment for a crime.</p>
<p>Stratford has previously warned that if British officials have facilitated covert U.S. drone strikes outside of declared war zones, they could even be implicated in murder. In 2014, she advised members of the U.K. Parliament that because the U.S. is not at war with countries such as Yemen or Pakistan, in the context of English and international law, the individuals who are targeted by drones in these countries are not “combatants” and their killers are not entitled to “combatant immunity.”</p>
<p>“If the U.K. government knows that it is transferring data that may be used for drone strikes against non-combatants … that transfer is probably unlawful,” Stratford <a href="http://www.tom-watson.co.uk/wp-content/uploads/2014/01/APPG-Final.pdf">told</a> the members of Parliament. “An individual involved in passing that information is likely to be an accessory to murder.”</p>
<p>GCHQ refused to answer questions for this story, citing a “long standing policy that we do not comment on intelligence matters.” A spokesperson for the agency issued a generic statement asserting that “all of GCHQ&#8217;s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight.” The spokesperson insisted that “U.K.&#8217;s interception regime is entirely compatible with the European Convention on Human Rights.”</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_05.jpg"><img class="aligncenter size-large wp-image-73586" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_05.jpg" alt="MenwithHill_05" /></a></p>
<p class="caption overlayed">A Gate at Menwith Hill Station prohibiting entrance on March 12, 2014.</p>
<p><p class='caption source' style=''>Photo: Trevor Paglen</p></div>
<p><span class='dropcap'>I</span><u>n February 2014</u>, the U.S. Department of Defense announced after a review that it was planning to reduce personnel at Menwith Hill by 2016, with about 500 service members and civilians set to be removed from the site. A U.S. Air Force spokesperson told the military newspaper <em><a href="http://www.stripes.com/technology-led-to-decision-to-cut-menwith-hill-personnel-1.270251">Stars and Stripes</a></em> that the decision was based on technological advances, which he declined to discuss, though he mentioned improvements in “server capacity to the hardware that we&#8217;re using; we&#8217;re doing more with less.”</p>
<p>The documents provided by Snowden shine light on some of the specific technological changes. Most notably, they show that there has been significant investment in introducing new and more sophisticated mass surveillance systems at Menwith Hill in recent years. A crucial moment came in 2008, when then-NSA Director Keith Alexander introduced a radical shift in policy. Visiting Menwith Hill in June that year, Alexander set a challenge for employees at the base. “Why can&#8217;t we collect all the signals, all the time?” he <a href="https://www.documentcloud.org/documents/3089503-MHS-initiatives-maximizing-our-access.html">said</a>, according to NSA documents. “Sounds like a good summer homework project for Menwith.”</p>
<p>As a result, a new “collection posture” was introduced at the base, the aim being to “collect it all, process it all, exploit it all.” In other words, it would vacuum up as many communications within its reach as technologically possible.</p>
<p>Between 2009 and 2012, Menwith Hill spent more than $40 million on a massive new 95,000-square-foot operations building — nearly twice the size of an average American football field. A large chunk of this space — 10,000 square feet — was set aside for a data center that boasted the ability to store huge troves of intercepted communications. During the renovations, the NSA shipped in new computer systems and laid 182 miles of cables, enough to stretch from New York City to the outskirts of Boston. The agency also had a 200-seat-capacity auditorium constructed to host classified operations meetings and other events.</p>
<blockquote class='stylized pull-right'>&#8220;How can Menwith carry out operations of which there is absolutely no accountability to the public?&#8221;</blockquote>
<p>Some of the extensive expansion work was visible from the road outside the secure complex, which triggered protests from a local activist group called the Campaign for the Accountability of American Bases. Since the early 1990s, the group has closely monitored activities at Menwith Hill. And for the last 16 years, its members have held a small demonstration every Tuesday outside the base&#8217;s main entrance, greeting NSA employees with flags and colorful homemade banners bearing slogans critical of U.S. foreign policy and drone strikes.</p>
<p>Fabian Hamilton, a member of Parliament based in the nearby city of Leeds, has become a supporter of the campaign&#8217;s work, occasionally attending events organized by the group and advocating for more transparency at Menwith Hill. Hamilton, who represents the Labour Party, has doggedly attempted to find out basic information about the base, asking the government at least 40 parliamentary questions since 2010 about its activities. He has sought clarification on a variety of issues, such as how many U.S. personnel are stationed at the site, whether it is involved in conducting drone strikes, and whether members of a British parliamentary oversight committee have been given full access to review its operations. But his efforts have been repeatedly stonewalled, with British government officials refusing to provide any details on the grounds of national security.</p>
<p>Hamilton told <em>The Intercept</em> that he found the secrecy shrouding Menwith Hill to be “offensive.” The revelations about the role it has played in U.S. killing and capture operations, he said, showed there needed to be a full review of its operations. “Any nation-state that uses military means to attack any target, whether it is a terrorist, whether it is legitimate or not, has to be accountable to its electorate for what it does,” Hamilton said. “That&#8217;s the basis of our Parliament, it&#8217;s the basis of our whole democratic system. How can we say that Menwith can carry out operations of which there is absolutely no accountability to the public? I don&#8217;t buy this idea that you say the word &#8216;security&#8217; and nobody can know anything. We need to know what is being done in our name.”<br />
———</p>
<p><em>Documents published with this article</em>:</p>
<ul>
<li><a href="https://www.documentcloud.org/documents/3089532-Elegant-Chaos-collect-it-all-exploit-it-all.html">Elegant Chaos: collect it all, exploit it all</a></li>
<li><a href="https://www.documentcloud.org/documents/3089526-Elegant-Chaos-collect-it-all-exploit-it-all-plus.html">Elegant Chaos: collect it all, exploit it all (plus notes)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089523-Ghosthunter-only-capability-of-its-kind.html">Ghosthunter: only capability of its kind</a></li>
<li><a href="https://www.documentcloud.org/documents/3089521-Menwith-satellite-classification-guide.html">Menwith satellite classification guide</a></li>
<li><a href="https://www.documentcloud.org/documents/3089520-UK-special-forces-Reaper-drone-Jan-Feb-2012.html">UK special forces Reaper drone (Jan-Feb-2012)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089519-Afghanistan-30-enemy-killed-Jan-Feb-2012.html">Afghanistan 30 enemy killed (Jan-Feb 2012)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089518-Project-Sandstorm-wifi-geolocation-Jan-2011.html">Project Sandstorm wifi geolocation (Jan 2011)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089517-Yemen-backhaul-comms-collected-Jan-2011.html">Yemen backhaul comms collected (Jan 2011)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089515-New-ops-building-at-MHS-completed-fit-up-begins.html">New ops building at Menwith completed, fit up begins</a></li>
<li><a href="https://www.documentcloud.org/documents/3089514-New-technique-geolocates-targets-active-at.html">New technique geolocates targets active at Yemeni cafes</a></li>
<li><a href="https://www.documentcloud.org/documents/3089513-Work-is-progressing-on-Menwith-Hill-Station-s.html">Work is progressing on Menwith Hill Station&#8217;s new operations building</a></li>
<li><a href="https://www.documentcloud.org/documents/3089512-Ghosthunter-and-the-geolocating-of-internet-cafes.html">Ghosthunter and the geolocating of internet cafes</a></li>
<li><a href="https://www.documentcloud.org/documents/3089510-Traffic-series-is-your-collection-surveyed-or.html">Traffic series: is your collection surveyed or sustained</a></li>
<li><a href="https://www.documentcloud.org/documents/3089509-APPARITION-becomes-a-reality-new-corporate-VSAT.html">APPARITION becomes a reality new corporate VSAT geolocation capability sees its first deployment</a></li>
<li><a href="https://www.documentcloud.org/documents/3089508-Ghosthunter-goes-global.html">Ghosthunter goes global</a></li>
<li><a href="https://www.documentcloud.org/documents/3089507-MHS-continues-successful-counterterrorism-survey.html">Menwith continues successful counterterrorism survey along Af-Pak border</a></li>
<li><a href="https://www.documentcloud.org/documents/3089506-SIGINT-target-package-leads-to-USMC-capture-of.html">SIGINT target package leads to USMC capture of al Qaeda weapons procurer</a></li>
<li><a href="https://www.documentcloud.org/documents/3089505-Too-much-of-a-good-thing.html">Too much of a good thing?</a></li>
<li><a href="https://www.documentcloud.org/documents/3089503-MHS-initiatives-maximizing-our-access.html">Menwith initiatives maximizing our access</a></li>
<li><a href="https://www.documentcloud.org/documents/3089499-GSM-tower-mapping-made-easier-and-more-accurate.html">GSM tower mapping made easier and more accurate with new tool</a></li>
<li><a href="https://www.documentcloud.org/documents/3089498-Ghosthunter-future-capabilities-2008.html">Ghosthunter future capabilities (2008)</a></li>
<li><a href="https://www.documentcloud.org/documents/3089497-New-tool-combines-multi-int-multi-agency.html">New tool combines multi agency databases for complete target snapshot</a></li>
<li><a href="https://www.documentcloud.org/documents/3089496-GSM-tower-geolocation.html">GSM tower geolocation</a></li>
<li><a href="https://www.documentcloud.org/documents/3089495-MHS-collection-assets.html">Menwith collection assets</a></li>
<li><a href="https://www.documentcloud.org/documents/3089493-MHS-Databases-as-of-14-Aug-2008.html">Menwith databases as of Aug 2008</a></li>
<li><a href="https://www.documentcloud.org/documents/3089492-Ghosthunter-tasking-process.html">Ghosthunter tasking process</a></li>
<li><a href="https://www.documentcloud.org/documents/3089491-Apparition-Ghosthunter-tasking-info.html">Apparition/Ghosthunter tasking info</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/">The NSA&#8217;s British Base at the Heart of U.S. Targeted Killing</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-surveillance/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_03-440x440.jpg" />
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_03.jpg" medium="image">
			<media:title type="html">MenwithHill_03</media:title>
			<media:description type="html">Menwith Hill on March 11, 2014.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_03-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/overhead-moonpenny.jpg" medium="image">
			<media:description type="html">Spy satellite M8501 was launched in 2009 and operated from Menwith Hill. Its role was to intercept communications flowing across &#34;commercial satellite uplinks,&#34; according to NSA documents.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/overhead-moonpenny-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_04.jpg" medium="image">
			<media:title type="html">MenwithHill_04</media:title>
			<media:description type="html">Menwith Hill Station on March 11, 2014.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_04-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/ghosthunter3.jpg" medium="image">
			<media:description type="html">An aerial image captured by a U.S. satellite in support of a covert GHOSTHUNTER operation.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/07/ghosthunter3-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_hero.jpg" medium="image">
			<media:title type="html">MenwithHill_hero</media:title>
			<media:description type="html">Menwith Hill, March 13, 2013.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_hero-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_05.jpg" medium="image">
			<media:title type="html">MenwithHill_05</media:title>
			<media:description type="html">A Gate at Menwith Hill Station prohibiting entrance on March 12, 2014.</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/07/MenwithHill_05-440x440.jpg" />
		</media:content>
	</item>
		<item>
		<title>In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner</title>
		<link>https://theintercept.com/2016/08/14/nsa-gcsb-prism-surveillance-fullman-fiji/</link>
		<comments>https://theintercept.com/2016/08/14/nsa-gcsb-prism-surveillance-fullman-fiji/#comments</comments>
		<pubDate>Mon, 15 Aug 2016 02:11:29 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=57336</guid>
		<description><![CDATA[<p>How a middle-aged pro-democracy activist was falsely accused of terrorism and placed on a top-secret NSA surveillance list.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/08/14/nsa-gcsb-prism-surveillance-fullman-fiji/">In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span class="dropcap">T</span><u>ony Fullman is</u> a middle-aged former tax man and a pro-democracy activist. But four years ago, a botched operation launched by New Zealand spies meant he suddenly found himself deemed a potential terrorist &#8212; his passport was revoked, his home was raided, and he was placed on a top-secret National Security Agency surveillance list.</p>
<p>The extraordinary covert operation, revealed Sunday by <a href="https://www.tvnz.co.nz/one-news/new-zealand/special-investigation-inside-one-siss-biggest-anti-terrorism-operations">Television New Zealand</a> in collaboration with <em>The Intercept</em>, was launched in 2012 after New Zealand authorities believed they had identified a group planning to violently overthrow Fiji&#8217;s military regime.</p>
<iframe src='//player.vimeo.com/video/178627219?title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;color=ff0179' width='100%' height='400px' frameborder='0' webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>
<p>As part of the spy mission, the NSA used its powerful global surveillance apparatus to intercept the emails and Facebook chats of people associated with a Fijian “thumbs up for democracy” campaign. The agency then passed the messages to its New Zealand counterpart, Government Communications Security Bureau, or GCSB.</p>
<p>One of the main targets was Fullman, a New Zealand citizen, whose communications were monitored by the NSA after New Zealand authorities, citing secret evidence, accused him of planning an “an act of terrorism” overseas.</p>
<p>But it turned out that the claims were baseless &#8212; Fullman, then 47, was not involved in any violent plot. He was a long-time public servant and peaceful pro-democracy activist who, like the New Zealand and Australian governments at that time, was opposed to Fiji&#8217;s authoritarian military ruler Frank Bainimarama.</p>
<p>Details about the surveillance are contained in documents obtained by <em>The Intercept</em> from NSA whistleblower Edward Snowden. More than 190 pages of top-secret NSA logs of intercepted communications dated between May and August 2012 show that the agency used the controversial internet surveillance system PRISM to eavesdrop on Fullman and other Fiji pro-democracy advocates’ Gmail and Facebook messages. Fullman is the first person in the world to be publicly identified as a confirmed PRISM target.</p>
<p>At the time of the spying, New Zealand&#8217;s surveillance agency was not permitted to monitor New Zealand citizens. Despite this, it worked with the NSA to eavesdrop on Fullman&#8217;s communications, which suggests he is one of 88 unnamed New Zealanders who were spied on between 2003 and 2012 in operations that may have been illegal, as <a href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&amp;objectid=10876424">revealed</a> in an explosive 2013 New Zealand government report.</p>
<p>In response to questions for this story, the NSA declined to address the Fullman case directly. A spokesperson for the agency, Michael Halbig, said in a statement to <em>The Intercept</em> that it &#8220;works with a number of partners in meeting its foreign-intelligence mission goals, and those operations comply with U.S. law and with the applicable laws under which those partners operate.&#8221;</p>
<p>Antony Byers, a spokesperson for New Zealand&#8217;s intelligence agencies, said he would not comment &#8220;on matters that may or may not be operational.” The country&#8217;s spy agencies &#8220;operate within the law,” Byers said, adding: “We do not ask partners to do things that would circumvent the law, and New Zealand gets significant value from our international relationships.&#8221;</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/soldier-fiji-e1470951880216.jpg"><img class="aligncenter size-large wp-image-79406" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/soldier-fiji-e1470951880216.jpg" alt="A Fijian military soldier stands guard on Parliament grounds." /></a></p>
<p class="caption overlayed">A Fijian military soldier stands guard on Parliament grounds.</p>
<p><p class='caption source' style=''>Photo: Phil Walter/Getty Images</p></div>
<h2>Unexpected Twist</h2>
<p>Fullman was born in Fiji in 1965 and emigrated to New Zealand when he was about 21. He became naturalized as a New Zealand citizen and spent most of his working life in the country, including more than 20 years in various roles at the government&#8217;s tax department, where he was based out of offices first in Auckland and later in the capital city of Wellington.</p>
<p>In his spare time, Fullman worked as an amateur boxing judge and referee and helped out once a month at a Wellington soup kitchen run by a Christian charity. Between 2001 and 2003, he attended graduate school, earning two masters degrees: one in public management, the other in information systems. And in 2009, he decided to return to Fiji after he was offered a job as chief executive of the Fiji Water Authority.</p>
<p>The move back to Fiji, however, led to a dramatic and unexpected twist in the course of his life &#8212; partly due to an old childhood friend.</p>
<p><div class='img-wrap align-right width-fixed' style='width:300px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/08/Dinner-in-Fiji-with-Ratu-David1.jpg"><img class="alignright size-medium wp-image-79515" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/Dinner-in-Fiji-with-Ratu-David1-300x225.jpg" alt="Dinner-in-Fiji-with-Ratu-David1" /></a></p>
<p class="caption">Fullman (left) and Mara having dinner in Fiji, December 2005.</p>
<p><p class='caption source pullright' style=''>Photo: Tony Fullman</p></div>Fullman had grown up in Fiji in the port town of Levuka. There, during the 1960s, his mother had worked as secretary to Kamisese Mara, an influental local politician who went on to serve as Fiji&#8217;s prime minister between 1970 and 1992. Kamisese had a young son &#8212; Ratu Tevita Mara &#8212; who was about the same age as Fullman. The two boys became best friends, together attending school, playing rugby, and going on trips.</p>
<p>“Weekends we would go fishing or go up to his mother&#8217;s farm, help out on the farm,” Fullman recalled in an interview with <em>The Intercept</em>. “We spent a lot of time together. He was like a brother to me.”</p>
<p>When Fullman left Fiji for New Zealand in his early 20s, he kept in contact with Mara through phone and email. And by the time Fullman returned to Fiji in 2009 to take the water authority job, Mara had become a powerful military officer, serving as the Fijian army&#8217;s chief of staff.</p>
<p>But the political situation in Fiji was now highly unstable, and Mara was at the center of some of the tensions. The country had experienced three military coups between 1987 and 2006 that were rooted in ethnic and religious divisions. Following the latest coup in 2006, which had brought authoritarian ruler Bainimarama to power, the military government and police were <a href="https://www.hrw.org/news/2011/12/02/fiji-end-rights-abuses">accused</a> of systematically cracking down on freedom of speech and arresting critics and human rights defenders.</p>
<p>Mara was dissatisfied with the leadership and, in May 2011, he became embroiled in a high-profile dispute with the Bainimarama regime. He was accused of plotting to overthrow the government and charged with uttering a seditious comment. He was hauled before a court, where he was threatened with imprisonment for allegedly uttering the words, “This government is fuck all.”</p>
<p>Mara was freed on bail while the case against him remained ongoing. But he was concerned about the prospect of ultimately receiving a lengthy jail term. He decided to take a drastic course of action &#8212; and fled Fiji, escaping on a boat to nearby Tonga.</p>
<p>Following Mara&#8217;s dramatic getaway, Fullman was questioned by the Fijian military. It had found records of phone calls between him and Mara dated from shortly before Mara had left. Facing potential punishment over allegations that he helped Mara escape, Fullman decided that he too would have to promptly leave Fiji.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-1.jpg"><img class="aligncenter size-article-large wp-image-79410" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-1-1000x750.jpg" alt="NSA-1" /></a></p>
<p class="caption">The NSA surveillance file shows a photo of Fullman that he uploaded to Facebook.</p>
<p><p class='caption source pullright' style=''>Source: NSA</p></div>
<h2>NSA Spying</h2>
<p>By 2012, Fullman had moved to Sydney, Australia, where he was living with his sister and her family. Alongside Mara and other former Fiji residents, he was working with a group called the Fiji Movement for Freedom and Democracy, which was campaigning against the Bainimarama regime.</p>
<p>In early July 2012, Fullman and Mara traveled to New Zealand, where they held meetings with some of the group&#8217;s supporters in Auckland. The meetings appear to have attracted the attention of New Zealand&#8217;s spies &#8212; and culminated in an extraordinary sequence of events: Fullman&#8217;s home was raided, his passport revoked, and both he and Mara were put under top-secret NSA surveillance.</p>
<p><div class='img-wrap align-right width-fixed' style='width:540px'> <a href="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/thumbs-up-e1470951762149.jpg"><img class="alignright size-article-medium wp-image-79414" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/thumbs-up-e1470951762149-540x379.jpg" alt="thumbs-up" /></a></p>
<p class="caption">Ratu Tevita Mara pictured in a video made for the pro-democracy campaign.</p>
<p><p class='caption source pullright' style=''>Source: Youtube</p></div>A New Zealand government source familiar with the operation that targeted the democracy group, who spoke on condition of anonymity to discuss classified information, told <em>The Intercept</em> that an investigation was launched after New Zealand&#8217;s equivalent of the FBI, the Security Intelligence Service, bugged telephone calls in which it believed it heard people discussing a plot to violently overthrow Bainimarama. According to the source, security officials were “very excited,” thinking they “finally had some baddies, real live terrorists in New Zealand.”</p>
<p>At the time, the New Zealand government had been keeping close tabs on the political situation in Fiji, which consists of some 333 small islands located about a three-hour flight north of Auckland. Fiji has historically maintained strong trading and tourism links with New Zealand, but the relationship had soured in the aftermath of the 2006 military coup. The New Zealand government expressed its opposition to the Bainimarama regime&#8217;s takeover, placing sanctions on Fiji and calling for the restoration of democracy. By mid-2012, however, relations between the countries were beginning to thaw. New Zealand government officials were openly discussing the possibility of ending the sanctions, in part because they may have been concerned that Fiji seemed to be moving closer to forming an allegiance with China and other Asian nations.</p>
<p>At 7am on July 17, 2012, about a week after Fullman had returned to Australia from the trip to New Zealand, a team of more than a dozen Australian security agents and two Australian federal police detectives arrived at his sister&#8217;s home in Sydney looking for weapons and other evidence of the suspected plot.</p>
<p>They seized computers, phones and documents from the premises and confiscated Fullman&#8217;s passport on behalf of the New Zealand authorities. Teams of New Zealand Security Intelligence Service officers and police simultaneously raided Fullman&#8217;s former apartment in the Wellington suburb of Karori and the homes of at least three other Fiji Freedom and Democracy movement supporters in Auckland, seizing their computers and other property.</p>
<p>The same day that the raids took place, New Zealand Minister of Internal Affairs Chris Tremain signed a notice canceling Fullman&#8217;s passport. The notice said the minister had canceled the passport based on secret details provided by the Security Intelligence Service: “The majority of [the] information is classified but in summary I have good reason to believe that &#8230; you are involved in planning violent action intended to force a change of Government in a foreign state; and you intend to engage in, or facilitate, an act of terrorism overseas.”</p>
<p>Fullman was baffled by the allegations, which he denied, and sought legal advice to challenge them. At the same time, unknown to him, he had also entered onto the radar of the world&#8217;s most powerful surveillance agency: the NSA.</p>
<p>Between early July and early August 2012, New Zealand spies appear to have requested American assistance to obtain the emails and Facebook communications of Fullman and Mara, including from a “democfiji” email address used by Fullman to organize events for the campaign group, whose slogan was “thumbs up for democracy.”</p>
<p>The NSA&#8217;s documents contain a “priority list” that names the two men as “Fiji targets” alongside their Gmail addresses and an account number identifying Fullman&#8217;s Facebook page. The documents indicate that the NSA began intercepting messages associated with Mara&#8217;s accounts on about the July 9, 2012 and on August 3 started spying on Fullman&#8217;s messages. The agency also obtained historic messages from the two men dating back to the beginning of May 2012.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/PRISM_Collection_Details.jpg"><img class="aligncenter size-article-large wp-image-79420" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/PRISM_Collection_Details-1000x750.jpg" alt="PRISM_Collection_Details" /></a></p>
<p class="caption">A slide from a leaked NSA document about PRISM, published by the Washington Post in 2013.</p>
<p><p class='caption source pullright' style=''>Source: Washington Post/NSA</p></div>
<p>To conduct the electronic eavesdropping, the NSA turned to one of its most controversial surveillance programs: PRISM. The agency uses PRISM to secretly obtain communications that are processed by major technology companies like Google, Apple, Microsoft, and Yahoo, as the <em><a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html">Washington Post</a></em> and <em><a href="https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data">The Guardian</a></em> first reported in 2013.</p>
<p>Almost all of the more than 190 pages of intercepted Gmail and Facebook messages from Fullman and Mara is headed “<a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/08/prismslide.jpg">US-984XN</a>,” the code for surveillance that is carried out under PRISM. The pages reveal that the legal justifications NSA cited for the surveillance were selected inconsistently. Most of Fullman&#8217;s emails and Facebook messages were obtained as “foreign government” targets, while others such as his bank statements and Facebook photographs were collected under the category of “counter-terrorism.”</p>
<p>The classification markings on some of the files &#8212; “REL TO USA/NZ” &#8212; make clear that the intercepted communications were to be released to New Zealand spies. In one of the files showing Fullman&#8217;s intercepted emails and Facebook chats, the NSA <a href="https://theintercept.com/document/2016/08/14/tony-fullman-nsa-file-4/">explicitly noted</a> that the intercepted material had been forwarded to its New Zealand intelligence counterpart, the GCSB. (New Zealand is a member of the Five Eyes, a surveillance alliance that also includes electronic eavesdropping agencies from the United States, the United Kingdom, Canada, and Australia.)</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-3.jpg"><img class="aligncenter size-article-large wp-image-79423" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-3-1000x750.jpg" alt="NSA-3" /></a></p>
<p class="caption">The NSA collected Fullman&#8217;s bank records. (Reproduced here with Fullman&#8217;s consent.)</p>
<p><p class='caption source pullright' style=''>Source: NSA</p></div>
<p>The NSA surveillance, however, produced no evidence of a plot. The intercepted messages contained personal information and typical Facebook chit chat. The NSA collected Fullman&#8217;s bank statements, which were attached to his emails and showed his visits to a coffee shop, a pharmacy, and purchases at a shoe store. There was correspondence about Fullman working to establish a tourism venture on an island in Tonga, emails about a birthday party, many communications about the Fijian pro-democracy group&#8217;s blog posts, and details about alleged abuses committed by Fijian military officials. There were discussions about an unwell mother and a young relative with a confidential health problem. A top-secret intelligence document <a href="https://theintercept.com/document/2016/08/14/tony-fullman-nsa-file-2/">even reproduced</a> a photograph of Fullman&#8217;s silver Mitsubishi station wagon alongside details of its precise location. But there was not a single hint of any plans for violence or other clandestine activity.</p>
<p>It would soon become clear that there was no evidence to support the New Zealand authorities&#8217; suspicions. And gradually, their case would fall apart.</p>
<p>On 16 April, 2013, the internal affairs minister, Tremain, wrote again to Fullman. Contrary to the earlier notice he had issued, Tremain now said that “based on advice” provided by the Security Intelligence Service, there were “no longer national security concerns” about Fullman. The cancellation of his passport was lifted “without requiring an application for a replacement, or payment of a fee.” The change of position followed Fullman initiating legal action against the New Zealand government in the Wellington High Court two months earlier.</p>
<blockquote class='stylized pull-right'>The NSA intercepted Fullman&#8217;s discussions about an unwell mother and a young relative with a confidential health problem.</blockquote>
<p>Another of the pro-democracy members whose home was raided during the operation was former Fiji sports minister and then-grocery store owner Rajesh Singh. After his home was searched by police and security agents, Singh complained to New Zealand&#8217;s inspector general of intelligence and security, Andrew McGechan, who questioned the officers involved and reviewed the investigation. His report said the Security Intelligence Service had applied for a domestic intelligence warrant “against a number of individuals” because of “suspicions of a plan to inflict violence.”</p>
<p>But McGechan identified neither unlawful behavior by Singh nor evidence of the supposed terrorist plot. His May 2014 report said: “There is nothing in the issue of the Warrant itself or in the questions and answers that followed &#8230; which comes even near to approaching proof of criminal activity or participation in terrorism.” He noted that “no police activity has resulted, or charges been laid.”</p>
<p><em>The Intercept</em> asked Fullman if he or Mara had ever heard of &#8212; or been involved in &#8212; discussions about overthrowing or assassinating Bainimarama. Far from denying it, he said that sort of talk happened frequently within Fijian pro-democracy circles. However, he said it was just angry ranting, when the alcohol was flowing, something completely different from real plans.</p>
<p>“People would say things like, &#8216;Please can we just hire the Americans to send one drone to Fiji to get rid of those bastards&#8217;, or &#8216;Let me go back to Fiji and I&#8217;ll just get a knife and stab him!&#8217;” Fullman said. “It&#8217;s venting. It&#8217;s our way of maintaining sanity &#8212; we just sit and bitch about everything. We don&#8217;t want violence. We want something where there&#8217;s control, a planned approach. More to the effect where it&#8217;s the people who protest and say, &#8216;Enough is enough. This is wrong. We want to go back to the old constitution and have elections.&#8217;”</p>
<p>The New Zealand security agency may not have recognized the difference between eavesdropped venting and an actual plot, prematurely launching its raids and broad secret surveillance operation without any clear evidence.</p>
<p>Four days after the raids on Fullman and his fellow campaigners, New Zealand foreign minister Murray McCully traveled to Fiji for trade talks. Fullman believes that the timing was no coincidence &#8212; and that the raids targeting the pro-democracy group were used by the New Zealand government as a bargaining chip to curry favor with the Bainimarama regime. &#8220;The minister can go to Fiji and say, &#8216;look we saved you, let&#8217;s be friends again, let&#8217;s start talking about how we can help each other again&#8217;,&#8221; Fullman says. &#8220;It was part of the frame up.&#8221;</p>
<p>No charges were ever brought against any of the Fiji campaigners, yet the ramifications of the case are still felt. Fullman says he gets pulled out of airline queues for security searches every time he travels, and he has had trouble finding work since news reports following the raids in 2012 linked him to a Fiji assassination plan. He told <em>The Intercept</em> that he was never notified that his private communications had been monitored by New Zealand with the help of American counterparts at the NSA &#8212; possibly illegally &#8212; nor did he ever receive an apology or compensation for his treatment.</p>
<p>As he recalls the saga, there is no anger in Fullman&#8217;s voice, only disappointment. Since the affair, he has not felt like returning to live in New Zealand and plans to stay in Australia for the foreseeable future. “To be betrayed by your own country, it&#8217;s really hard,” he says, letting out a sigh. “It puts a sour taste in your mouth.”</p>
<p><em>Documents published with this story:</em></p>
<ul>
<li><a href="https://www.documentcloud.org/public/search/%22Project%20ID%22:%20%2228715-tony-fullman-nsa-file%22">Tony Fullman NSA files</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/08/14/nsa-gcsb-prism-surveillance-fullman-fiji/">In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/08/14/nsa-gcsb-prism-surveillance-fullman-fiji/feed/</wfw:commentRss>
		<slash:comments>131</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/08/soldier-fiji-e1470951880216-440x440.jpg" />
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/soldier-fiji-e1470951880216.jpg" medium="image">
			<media:title type="html">Commander Frank Bainimarama Siezes Control</media:title>
			<media:description type="html">TK TK SUVA, FIJI - DECEMBER 06:  A Fijian military soldier stands guard on Parliament grounds, where the Senate was in session condemning the actions of military Commander Frank Bainimarama, December 6, 2006 in Suva, Fiji. Bainimarama has seized sole control in Fiji and assumed presidential powers after sacking the entire government, including the president, who refused to sanction the military takeover.  (Photo by Phil Walter/Getty Images)</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/08/soldier-fiji-e1470951880216-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/08/Dinner-in-Fiji-with-Ratu-David1.jpg" medium="image">
			<media:title type="html">Dinner-in-Fiji-with-Ratu-David1</media:title>
			<media:description type="html">Dinner in the Fiji with Ratu David.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/Dinner-in-Fiji-with-Ratu-David1-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-1.jpg" medium="image">
			<media:title type="html">NSA-1</media:title>
			<media:description type="html">TK shows photo of himself that he uploaded to Facebook.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-1-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2016/08/thumbs-up-e1470951762149.jpg" medium="image">
			<media:title type="html">thumbs-up</media:title>
			<media:description type="html">TKTK Thumbs up for democracy by
Ratu Tevita Uluilakeba Mara -
Message to the Nation Video</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/08/thumbs-up-e1470951762149-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/PRISM_Collection_Details.jpg" medium="image">
			<media:title type="html">PRISM_Collection_Details</media:title>
			<media:description type="html">TK TK</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/08/PRISM_Collection_Details-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-3.jpg" medium="image">
			<media:title type="html">NSA-3</media:title>
			<media:description type="html">TK TK</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/08/NSA-3-440x440.jpg" />
		</media:content>
	</item>
		<item>
		<title>Snowden Disclosure Prompts Backlash in Scotland</title>
		<link>https://theintercept.com/2016/06/15/snowden-scottish-recording-centre-parliament-milkwhite/</link>
		<comments>https://theintercept.com/2016/06/15/snowden-scottish-recording-centre-parliament-milkwhite/#comments</comments>
		<pubDate>Wed, 15 Jun 2016 19:37:47 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uproxx]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=68941</guid>
		<description><![CDATA[<p>The Scottish government is facing calls to reveal information about a top-secret surveillance program involving the country's police.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/06/15/snowden-scottish-recording-centre-parliament-milkwhite/">Snowden Disclosure Prompts Backlash in Scotland</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>Top government officials</u> in Scotland are under pressure to explain their knowledge of a secretive police surveillance unit that was exposed in documents leaked by National Security Agency whistleblower Edward Snowden.</p>
<p>On Tuesday, cabinet secretary for justice Michael Matheson was <a href="https://www.youtube.com/watch?v=QuNamn0qg5s&amp;feature=youtu.be&amp;t=18m30s">grilled</a> in the country&#8217;s parliament about the so-called Scottish Recording Centre and its previously undisclosed involvement in covert surveillance operations.</p>
<p>As <em>The Intercept</em> <a href="https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/">revealed last week</a>, the Recording Centre is one of several domestic organizations within the United Kingdom involved in a top-secret program named MILKWHITE, which has provided law enforcement agencies with access to &#8220;bulk&#8221; internet data intercepted by the British eavesdropping agency Government Communications Headquarters, or GCHQ. Prior to the disclosure, few in Scotland knew the Recording Centre even existed &#8212; much less that it has been tapping into GCHQ&#8217;s troves of data.</p>
<p>In recent days, several <a href="http://www.heraldscotland.com/news/14551829.Secret_police_phone_tap_unit_was_run_by_Strathclyde_Police/">Scottish</a> <a href="https://theferret.scot/scots-police-had-access-to-top-secret-gchq-spy-programme/">media</a> <a href="http://www.thenational.scot/news/us-whistleblower-snowden-reveals-gchq-spy-programme-with-secret-link-to-scottish-police.18661">outlets</a> have picked up the issue, increasing pressure on the government. Questioned about the revelations on Tuesday, Matheson told the Scottish parliament that the government &#8220;takes the protection of our citizens&#8217; civil liberties extremely seriously and we are clear that investigatory powers should only be used when it is necessary and proportionate to do so. But we must always balance those fundamental civil liberties with the need to ensure our law enforcement bodies have effective powers to investigate and deal with serious organized crime.&#8221;</p>
<p>He declined to comment on any relationship with GCHQ and stated that police must obtain a warrant signed off by a government minister to intercept communications. However, <a href="https://www.documentcloud.org/public/search/Text:%20%22Project%20ID%22:%20%2227335-uk-overcollection%22">documents</a> about the MILKWHITE program show that it stores <em>metadata</em> about emails, instant messenger chats, and social media activity, meaning it contains information that could reveal the sender and recipient of an email or message, but not the written content. And police agencies in the U.K. do not require a warrant to access this kind of information. They only require a warrant when they want to monitor the <em>content</em> of a communication &#8212; for instance, the audio of a call or the body of an email.</p>
<p>Matheson&#8217;s response, perhaps unsurprisingly, did not satisfy opposition politicians. John Finnie, a member of the Scottish parliament representing the Green party, said in <a href="https://greens.scot/news/blanket-surveillance-incompatible-with-human-rights">a statement</a>: &#8220;The Cabinet Secretary today attempted to give the impression that all policing activities in Scotland are proportional and that interceptions are independently approved but as we know that is not always the case. There is clearly a culture of bulk collection of data that needs [to be] reined in. I will continue to challenge such over-reaching activities.&#8221;</p>
<p>The revelation about the Recording Centre, the first from the Snowden archive to implicate Scotland&#8217;s authorities, has put the ruling Scottish National Party in an awkward spot.</p>
<p>Just last week, the party&#8217;s leadership took a <a href="http://www.snp.org/the_snp_won_t_support_the_investigatory_powers_bill_unless_it_is_amended">strong stand</a> against the U.K. government&#8217;s push to obtain more surveillance powers through the controversial Investigatory Powers Bill, dubbed the &#8220;Snoopers&#8217; Charter&#8221; by critics. Joanna Cherry, the Scottish National Party&#8217;s spokesperson on justice and home affairs, had raised concerns about the proposed new powers for &#8220;bulk&#8221; surveillance, which she blasted as &#8220;extremely intrusive.&#8221;</p>
<p>However, the Snowden documents about MILKWHITE indicate that Scotland&#8217;s police forces &#8212; through the Recording Centre &#8212; have been accessing bulk data for years, presumably with sanction from top Scottish government ministers.</p>
<p>Alistair Carmichael, a Liberal Democrat member of parliament, was quick to <a href="https://libdemhame.org/2016/06/14/lib-dems-seek-answers-on-scottish-spy-system/">point out</a> this inconsistency &#8212; and has pledged to take up the issues surrounding the Recording Centre and the MILKWHITE program with the British government&#8217;s <a href="https://www.gov.uk/government/organisations/home-office">Home Office</a> in an attempt to obtain more information.</p>
<p>“In the House of Commons last week, [former Scottish first minister] Alex Salmond voted with the Liberal Democrats against Tory moves that would see our internet histories recorded and made available to the intelligence services,&#8221; Carmichael said. &#8220;Now it seems that a centre established when he was First Minister was at the heart of the mass surveillance of our personal information.&#8221;</p>
<p>If it turns out that the Scottish government claims it was not in fact aware of the MILKWHITE program, Carmichael said, it would raise “big questions over the role of the U.K. intelligence services.” And if it <em>were</em> aware and yet &#8220;did nothing to raise the alarm, then we need to be told why they were happy for Scots to be left in the dark,” he added.</p>
<p>Scottish police and GCHQ have declined to answer questions about MILKWHITE, citing policy not to comment on “intelligence matters.” The Home Office has also refused to comment, claiming that it never discusses anything derived from leaked documents.</p>
<p>Sign up for The Intercept Newsletter <a href='https://theintercept.us11.list-manage.com/subscribe?u=43fc0c0fce9292d8bed09ca27&id=e00a5122d3'>here</a>.</p><p>The post <a rel="nofollow" href="https://theintercept.com/2016/06/15/snowden-scottish-recording-centre-parliament-milkwhite/">Snowden Disclosure Prompts Backlash in Scotland</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/06/15/snowden-scottish-recording-centre-parliament-milkwhite/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
	
<leadImageArt>https://theintercept.com/wp-uploads/sites/1/2016/06/matheson.png</leadImageArt><leadImageArtCredit>Credit: Scottish Government/YouTube</leadImageArtCredit>	</item>
		<item>
		<title>Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure</title>
		<link>https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/</link>
		<comments>https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/#comments</comments>
		<pubDate>Tue, 07 Jun 2016 08:38:04 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uproxx]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=66399</guid>
		<description><![CDATA[<p>A secret report warned that British spies may have put lives at risk because their surveillance systems were sweeping up more data than could be analyzed.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/">Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span class="dropcap">A</span> <u>secret report warned</u> that British spies may have put lives at risk because their surveillance systems were sweeping up more data than could be analyzed, leading them to miss clues to possible security threats.</p>
<p>The concern was sent to top British government officials in an explosive classified document, which outlined methods being developed by the United Kingdom&#8217;s domestic intelligence agency to covertly monitor internet communications.</p>
<p>The Security Service, also known as MI5, had become the “principal collector and exploiter” of digital communications within the U.K., the eight-page report noted, but the agency&#8217;s surveillance capabilities had “grown significantly over the last few years.”</p>
<p>MI5 “can currently collect (whether itself or through partners &#8230;) significantly more than it is able to exploit fully,” the report warned. “This creates a real risk of ‘intelligence failure’ i.e. from the Service being unable to access potentially life-saving intelligence from data that it has already collected.”</p>
<p>A <a href="https://theintercept.com/document/2016/06/07/digint-narrative/">draft copy</a> of the report, obtained by <em>The Intercept</em> from National Security Agency whistleblower Edward Snowden, is marked with the classification “U.K. Secret” and dated February 12, 2010. It was prepared by British spy agency officials to brief the government&#8217;s Cabinet Office and Treasury Department about the U.K.&#8217;s surveillance capabilities.</p>
<p>Notably, three years after the report was authored, two Islamic extremists killed and attempted to decapitate a British soldier, Lee Rigby, on a London street. An <a href="http://isc.independent.gov.uk/files/20141125_ISC_Woolwich_Report(website).pdf">investigation</a> into the incident found that the two perpetrators were well-known to MI5, but the agency had missed significant warning signs about the men, including records of phone calls one of them had made to an al Qaeda-affiliated radical in Yemen, and an online message in which the same individual had discussed in graphic detail his intention to murder a soldier.</p>
<p>The new revelations raise questions about whether problems sifting through the troves of data collected by British spies may have been a factor in the failure to prevent the Rigby killing. But they are also of broader relevance to an ongoing debate in the U.K. about surveillance. In recent months, the British government has been trying to pass a new law, the Investigatory Powers Bill, which would grant MI5 and other agencies access to more data.</p>
<p>Silkie Carlo, a policy officer at the London-based human rights group <a href="https://www.liberty-human-rights.org.uk/">Liberty</a>, told <em>The Intercept</em> that the details contained in the secret report highlighted the need for a comprehensive independent review of the proposed new surveillance powers.</p>
<p>“Intelligence whistleblowers have warned that the agencies are drowning in data &#8212; and now we have it confirmed from the heart of the U.K. government,” Carlo said. “If our agencies have risked missing &#8216;life-saving intelligence&#8217; by collecting &#8216;significantly&#8217; more data than they can analyze, how can they justify casting the net yet wider in the toxic Investigatory Powers Bill?”</p>
<p>The British government&#8217;s <a href="https://www.gov.uk/government/organisations/home-office">Home Office</a>, which handles media requests related to MI5, declined to comment for this story.</p>
<h3>&#8220;Lack of staff and tools&#8221;</h3>
<p>The leaked report outlines efforts by British agencies to conduct both “large-scale” and “small-scale” eavesdropping of domestic communications within the U.K. It focuses primarily on an MI5 program called DIGINT, or digital intelligence, which was aimed at transforming the agency&#8217;s ability to covertly monitor internet communications.</p>
<p>DIGINT was established for counterterrorism purposes, and “more generally for wider national security purposes,” the report said. The program was described as being focused on “the activities of key investigative targets, and on those exploitation activities that will drive greatest investigative benefits with respect to U.K. domestic threats.”</p>
<p>The amount of data being collected, however, proved difficult for MI5 to handle. In March 2010, in <a href="https://theintercept.com/document/2016/06/07/digint-imbalance">another secret report</a>, concerns were reiterated about the agency&#8217;s difficulties processing the material it was harvesting. “There is an imbalance between collection and exploitation capabilities, resulting in a failure to make effective use of some of the intelligence collected today,” the report noted. “With the exception of the highest priority investigations, a lack of staff and tools means that investigators are presented with raw and unfiltered DIGINT data. Frequently, this material is not fully assessed because of the significant time required to review it.”</p>
<blockquote class='stylized pull-right'>97 percent of the calls, messages, and data the program had collected were found to have been “not viewed” by the authorities.</blockquote>
<p>The problem was not unique to MI5.</p>
<p>Many of the agency&#8217;s larger-scale surveillance operations were being conducted in coordination with the National Technical Assistance Centre, a unit of the electronic eavesdropping agency Government Communications Headquarters, better known as GCHQ.</p>
<p>The Centre plays a vital but little-known role. One of its main functions is to act as a kind of intermediary, managing the highly sensitive data-sharing relationships that exist among British telecommunications companies and law enforcement and spy agencies.</p>
<p>Perhaps the most important program the Centre helps deliver is code-named PRESTON, which covertly intercepts phone calls, text messages, and internet data sent or received by people or organizations in the U.K. who have been named as surveillance targets on warrants signed off by a government minister.</p>
<p>A <a href="https://theintercept.com/document/2016/06/07/preston-study/">top-secret 2009 study</a> found that, in one six-month period, the PRESTON program had intercepted more than 5 million communications. Remarkably, 97 percent of the calls, messages, and data it had collected were found to have been “not viewed” by the authorities.</p>
<p>The authors of the study were alarmed because PRESTON was supposedly focused on known suspects, and yet most of the communications it was monitoring appeared to be getting ignored &#8212; meaning crucial intelligence could have been missed.</p>
<p>“Only a small proportion of the Preston Traffic is viewed,” they noted. “This is of concern as the collection is all warranted.”</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2016/05/preston-study-5.jpg" target="_blank"><img class="aligncenter wp-image-66445 size-article-large" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2016/05/preston-study-5-e1464200559274-1000x700.jpg" alt="preston-study-5" width="1000" height="700" /></a></p>
<p class="caption">Chart: A top-secret study outlines PRESTON data collection by month.</p>
<p></div>
<h3>&#8220;Politically contentious&#8221;</h3>
<p>For most of the last decade, successive British governments have attempted to obtain more surveillance powers, but their efforts have met with public opposition and ultimately failed. The present government&#8217;s effort to push through a sweeping surveillance law &#8212; the Investigatory Powers Bill &#8212; is currently being considered by the Parliament.</p>
<p>Documents provided by Snowden show that the U.K.&#8217;s intelligence and security agencies have wanted to obtain new powers to store domestic data about internet communications to address the “growing range of services available to internet users.” This reflects the position that has been adopted publicly in recent years by the government, which has <a href="http://www.bbc.com/news/uk-politics-30778424">argued</a> that expanded internet surveillance is necessary to keep up with changes in technology.</p>
<p>However, the Snowden documents also reveal a more candid internal assessment of the need for bolstered spy laws and shine light on major aspects of the U.K.&#8217;s existing surveillance apparatus that government and security officials have <em>not</em> publicly acknowledged in their pursuit of the new powers.</p>
<p>In <a href="https://theintercept.com/document/2016/06/07/communications-capabilities-development-programme">one document</a> dated from 2012, GCHQ stated that it was “not dependent” on a new surveillance law coming into force, presumably due to the <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">extensive capabilities</a> already at its disposal. GCHQ added that new powers were of greater importance to the U.K.&#8217;s law enforcement agencies, which were facing “a significant decline” in ability to intercept communications due to people increasingly using internet services &#8212; as opposed to conventional landlines and cellphones &#8212; to talk or exchange messages.</p>
<p>But passing a new surveillance law would be a “politically contentious [and] technically complex” process, GCHQ said in the document. In the meantime, therefore, it devised something of a workaround by creating a secret stop-gap surveillance solution for law enforcement officials.</p>
<p>As part of a program named <a href="https://theintercept.com/document/2016/06/07/milkwhite/">MILKWHITE</a>, GCHQ made some of its huge troves of metadata about people&#8217;s online activities accessible to MI5, London&#8217;s Metropolitan Police, the tax agency Her Majesty&#8217;s Revenue and Customs, the Serious Organized Crime Agency (now merged into the National Crime Agency), the Police Service of Northern Ireland, and an obscure Scotland-based surveillance unit called the Scottish Recording Centre.</p>
<p>Metadata reveals information about communications &#8212; such as the sender and recipient of an email, or the phone numbers someone called and at what time &#8212; but not the written content of the message or the audio of the call. GCHQ&#8217;s definition of metadata is broad and also encompasses location data that can be used to track people&#8217;s movements, login passwords, and website browsing histories, as <em>The Intercept</em> has <a href="https://theintercept.com/document/2015/09/25/content-metadata-matrix">previously revealed</a>.</p>
<p>The MILKWHITE program was developed as early as September 2009, and it seems to have been operational under both the Labour and the Conservative-Liberal Democrat governments of that period. One of its purposes was to allow law enforcement agencies and MI5 to sift through the troves of metadata to discover internet “selectors” for their surveillance targets &#8212; meaning unique identifiers, such as a username or IP address, that can be used to home in on and monitor a person&#8217;s online activities.</p>
<blockquote class='stylized pull-right'>&#8220;It now appears it has been ‘business as usual’ for the tax man to access mass internet data for years.&#8221;</blockquote>
<p>GCHQ focuses primarily on intercepting foreign communications that are “external” to the U.K. But in the process of doing so &#8212; by tapping into international cables that carry phone calls and internet traffic between countries &#8212; the agency vacuums up large quantities of data on British calls, emails, and web browsing habits, too. It is this British data &#8212; some of which appears to have been made accessible through MILKWHITE &#8212; that would be of most interest to MI5, police, and tax officers, as it is their role to conduct “internal” investigations within the U.K.</p>
<p>A GCHQ <a href="https://theintercept.com/document/2016/06/07/mobile-apps-checkpoint-meeting-archives">document dated from late 2010</a> indicated that MILKWHITE was storing data about people&#8217;s usage of smartphone chat apps like WhatsApp and Viber, instant messenger services such as Jabber, and social networking websites, including Facebook, MySpace, and LinkedIn. Access to the data was provided to law enforcement through an “internet data unit” hosted by the Serious Organized Crime Agency and it was accessible to tax investigators through what one GCHQ document described as established “business as usual” channels.</p>
<p>By March 2011, GCHQ <a href="https://theintercept.com/document/2016/06/07/milkwhite/">noted</a> that there was “increasing customer demand” for the service offered by MILKWHITE and the agency planned to grow its capacity, seeking £20.8 million ($30.6 million) to update the program&#8217;s “advanced analytics” capabilities and to maintain its “bulk” storage of metadata records. “Bulk” is a term GCHQ uses to refer to large troves of data that are not focused on individual targets; rather, they include millions and <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">in some cases billions</a> of records about ordinary people&#8217;s communications and internet activity.</p>
<p>Carlo, the policy analyst with Liberty, said the revelations about MILKWHITE suggested members of Parliament had been misled about how so-called bulk data is handled. “While MPs have been told that bulk powers have been used only by the intelligence community, it now appears it has been &#8216;business as usual&#8217; for the tax man to access mass internet data for years,” she said. “This vindicates the warnings of security experts and the call by opposition parties for an urgent, independent review of bulk powers. The compromise review <a href="http://www.theguardian.com/world/2016/may/24/theresa-may-review-snoopers-charter-surveillance-powers-concession">recently announced</a> is a poor substitute and without the time and technical expertise, will struggle to address this issue of national importance.”</p>
<p>GCHQ declined to answer questions for this story. A spokesperson for the agency said in a statement: &#8220;It is long-standing policy that we do not comment on intelligence matters. Furthermore, all of GCHQ&#8217;s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position. In addition, the U.K.&#8217;s interception regime is entirely compatible with the European Convention on Human Rights.&#8221;</p>
<p>&nbsp;</p>
<p><em>Documents published with this article</em>:</p>
<ul>
<li><a href="https://theintercept.com/document/2016/06/07/digint-narrative/">Digint Narrative</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/milkwhite/">Milkwhite</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/preston-business-processes/">Preston Business Processes</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/communications-capabilities-development-programme/">Communications Capabilities Development Programme</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/ntac-overview">NTAC Overview</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/preston-architecture/">Preston Architecture</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/digint-imbalance">Digint Imbalance</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/mobile-apps-checkpoint-meeting-archives">Mobile Apps Checkpoint Meeting Archives</a></li>
<li><a href="https://theintercept.com/document/2016/06/07/preston-study/">Preston Study</a></li>
</ul>
<p><em>Related: </em></p>
<ul>
<li><a href="https://theintercept.com/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/">Inside NSA, Officials Privately Criticize “Collect It All” Surveillance</a></li>
</ul>
<p>Sign up for The Intercept Newsletter <a href='https://theintercept.us11.list-manage.com/subscribe?u=43fc0c0fce9292d8bed09ca27&id=e00a5122d3'>here</a>.</p><p>The post <a rel="nofollow" href="https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/">Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/06/07/mi5-gchq-digint-surveillance-data-deluge/feed/</wfw:commentRss>
		<slash:comments>72</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/05/preston-study-5-e1464200559274-440x440.jpg" />
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/05/preston-study-5-e1464200559274.jpg" medium="image">
			<media:title type="html">preston-study-5</media:title>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2016/05/preston-study-5-e1464200559274-440x440.jpg" />
		</media:content>
<leadImageArt>https://theintercept.com/wp-uploads/sites/1/2016/05/lead1.jpg</leadImageArt><leadImageArtCredit>Photo: Michael Bocchieri/Getty Images</leadImageArtCredit>	</item>
		<item>
		<title>British Hacker Wins Court Battle Over Encryption Keys</title>
		<link>https://theintercept.com/2016/05/10/uk-hacker-lauri-love-encryption-court-victory/</link>
		<comments>https://theintercept.com/2016/05/10/uk-hacker-lauri-love-encryption-court-victory/#comments</comments>
		<pubDate>Tue, 10 May 2016 15:42:19 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uproxx]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=64502</guid>
		<description><![CDATA[<p>A British court on Tuesday rejected an attempt by security agents to force an alleged hacker to hand over his encryption keys.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/05/10/uk-hacker-lauri-love-encryption-court-victory/">British Hacker Wins Court Battle Over Encryption Keys</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>A British court</u> on Tuesday rejected an attempt by security agents to force an alleged hacker to hand over his encryption keys.</p>
<p>Thirty-one-year-old Lauri Love has been accused by U.S. authorities of hacking into U.S. government networks between 2012 and 2013, including those of the Department of Defense, the Environmental Protection Agency, the Department of Energy, and NASA.</p>
<p>In October 2013, the U.K.’s equivalent of the FBI, the National Crime Agency, raided Love&#8217;s home and seized his computers and hard drives. But some of the devices contained encrypted data, meaning the agency could not access it.</p>
<p>Initially the British authorities served Love with an order under <a href="http://www.legislation.gov.uk/ukpga/2000/23/section/49">Section 49</a> of the U.K’s controversial Regulation of Investigatory Powers Act, which demanded that he hand over his passwords to open encrypted files stored on the devices. He declined to comply, and the National Crime Agency did not push the issue; Love was not charged with an offense under any British laws.</p>
<p>However, when Love recently launched a civil case seeking the return of his computers and storage devices, the agency renewed its encryption demand, and attempted to turn the civil proceedings around on him by using them as new means to get a judge to order Love to disclose his passwords and encryption keys. Investigators refused to return Love&#8217;s computers and hard drives on the basis that they claimed the devices could contain data that he did not have legitimate “ownership” of – for instance, hacked files. The authorities stated that if Love wanted to get his devices back, he would have to first turn over his passwords and show what was contained on them.</p>
<p>As <i>The Intercept </i><a href="https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/">previously reported</a>, civil liberties campaigners were alarmed by this development, because it seemed to be an effort to bypass the normal procedure under the Regulation of Investigatory Powers Act, which includes safeguards against abuse. The campaigners feared that, if successful, the case would set a new precedent that could have had implications for journalists, activists, and others who need to guard confidential information, potentially making it easier in the future for British police and security agencies to gain access to, or to seize and retain, encrypted material.</p>
<p>On Tuesday, at Westminster Magistrates&#8217; Court in London, judge Nina Tempia <a href="https://www.documentcloud.org/documents/2828389-Lauri-Love-RIPA-10-May-2016.html">ruled in Love&#8217;s favor</a>. Tempia said that she was “not persuaded” by the National Crime Agency&#8217;s argument that Love should be compelled to disclose his passwords and encryption keys to prove his ownership of the data. She also took a swipe at the agency&#8217;s attempt to “circumvent” the Regulation of Investigatory Powers Act, which she described as the “specific legislation that has been passed in order to deal with the disclosure sought.”</p>
<p>Karen Todner, Love&#8217;s attorney, welcomed the decision. &#8220;The case raised important issues of principle in relation to the right to respect for private life and right to enjoyment of property and the use of the Court’s case management powers,” Todner said in a statement. A ruling in the authorities&#8217; favor, she added, &#8220;would have set a worrying precedent for future investigations of this nature and the protection of these important human rights.”</p>
<p>A spokeswoman for the National Crime Agency declined to comment, citing an ongoing investigation and judicial proceedings.</p>
<p>It has not yet been determined whether Love will be able to get his seized devices back. The next hearing in his civil case has been set for July. Moreover, the U.S. Justice Department is actively seeking Love&#8217;s extradition on hacking charges.</p>
<p>Love, who has been diagnosed with Asperger’s syndrome, argues that he would not get a fair trial in the U.S., where his legal team says he could face a sentence of up to 99 years in prison. He has vowed to fight the extradition and says, whatever happens, he won&#8217;t give up his encryption keys. “There will be no decryption,” he declared Tuesday, standing outside the courtroom following the judgment.</p>
<p>“If they&#8217;d ruled in the other way it would have been very concerning for anyone who has to store sensitive information, especially people with obligations to clients, people under their care in terms of their confidentiality,” he said.</p>
<p>Love, who turned up late for the hearing wearing a black suit jacket, white shirt and sneakers, was pleased with the outcome. “It&#8217;s a victory,” he said, “it&#8217;s an avoidance of a disaster.”</p>
<p>Sign up for The Intercept Newsletter <a href='https://theintercept.us11.list-manage.com/subscribe?u=43fc0c0fce9292d8bed09ca27&id=e00a5122d3'>here</a>.</p><p>The post <a rel="nofollow" href="https://theintercept.com/2016/05/10/uk-hacker-lauri-love-encryption-court-victory/">British Hacker Wins Court Battle Over Encryption Keys</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/05/10/uk-hacker-lauri-love-encryption-court-victory/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
	
<leadImageArt>https://theintercept.com/wp-uploads/sites/1/2016/05/lauri-love.jpg</leadImageArt><leadImageArtCredit>Photo: Lauren Hurley/PA/AP</leadImageArtCredit>	</item>
		<item>
		<title>Documents Reveal Secretive U.K. Surveillance Policies</title>
		<link>https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/</link>
		<comments>https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/#comments</comments>
		<pubDate>Thu, 21 Apr 2016 00:33:35 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=61578</guid>
		<description><![CDATA[<p>Newly disclosed documents offer a rare insight into the secretive legal regime underpinning the British government's controversial mass surveillance programs.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/">Documents Reveal Secretive U.K. Surveillance Policies</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p lang="en-US"><u>Newly disclosed documents</u> offer a rare insight into the secretive legal regime underpinning the British government&#8217;s controversial mass surveillance programs.</p>
<p lang="en-US">The London-based group <a href="https://privacyinternational.org">Privacy International</a> obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies&#8217; covert collection of huge troves of private data.</p>
<p lang="en-US">Millie Graham Wood, legal officer at Privacy International, said in a statement Wednesday that the documents show “the staggering extent to which the intelligence agencies hoover up our data. This can be anything from your private medical records, your correspondence with your doctor or lawyer, even what petitions you have signed, your financial data, and commercial activities.”</p>
<p lang="en-US">She added: “The agencies themselves admit that the majority of data collected relates to individuals who are not a threat to national security or suspected of a crime. This highly sensitive information about us is vulnerable to attack from hackers, foreign governments, and criminals.”</p>
<p lang="en-US">The documents, <a href="https://privacyinternational.org/node/843">published online</a> Wednesday, primarily relate to the opaque rules regulating British spy agencies&#8217; use of so-called bulk personal data sets, which are obtained without any judicial authorization and contain “personal data about a wide range of individuals, the majority of whom are not of direct intelligence interest,&#8221; according to the agencies&#8217; <a href="https://privacyinternational.org/sites/default/files/1.%20All%20Intelligence%20Services%20.%20SIA%20Bulk%20Personal%20Data%20Policy%20.%20February%202015_0.PDF">own definition</a> of them.</p>
<p lang="en-US">The data sets could cover a wide variety of information, the documents suggest, potentially revealing details deemed particularly “sensitive,” such as people&#8217;s political opinions, religious beliefs, union affiliation, physical or mental health status, sexual preferences, biometric data, and financial records. They may also contain data revealing legally privileged information, journalists&#8217; confidential sources, and “details about individuals who are dead,&#8221; <a href="https://privacyinternational.org/sites/default/files/1.%20All%20Intelligence%20Services%20.%20SIA%20Bulk%20Personal%20Data%20Policy%20.%20February%202015_0.PDF">one document</a> says.</p>
<p lang="en-US">The documents include internal guidance codes for spies who have access to the surveillance systems. One <a href="https://privacyinternational.org/sites/default/files/44.%20Secret%20Intelligence%20Service.%20Messages%20to%20SIS%20database%20users%20on%2012%20June%202014%20and%201%20June%202015_0.PDF">memo</a>, dated June 2014, warns employees of MI6, the U.K.&#8217;s equivalent of the CIA, against performing a “self-search” for data on themselves, offering a bizarre example that serves to illustrate the scope of what some of the repositories contain.</p>
<p lang="en-US">“An example of an inappropriate &#8216;self search&#8217; would be to use the database to remind yourself where you have traveled so you can update your records,” the memo says. “This is not a proportionate use of the system, as you could find this information by another means (i.e. check the stamps in your passport or keep a running record of your travel) that would avoid collateral intrusion into other people&#8217;s data.”</p>
<p lang="en-US">Another <a href="https://privacyinternational.org/sites/default/files/39.%20Secret%20Intelligence%20Service.%20SIS%20Database%20.%20Code%20of%20Practice%20version%203%20October%202014%20to%20November%202015_0.PDF">document warns</a> MI6&#8217;s employees that they must not trawl the surveillance databases “for information about other members of staff, neighbors, friends, acquaintances, family members and public figures.” That is, it adds, “unless it is necessary to do so as part of your official duties.” The agency says that it has monitoring systems in place to catch any abuses, but it is unclear whether the checks that are in place are sufficient. One <a href="https://privacyinternational.org/sites/default/files/43.%20Secret%20Intelligence%20Service%20.%20SIS%20Bulk%20Data%20Acquisition%20Exploitation%20and%20Retention%20policy%20November%202010_0.PDF">2010 policy paper</a> from MI6 states there is &#8220;no external oversight&#8221; of it or its partners&#8217; &#8220;bulk data operations,&#8221; though the paper adds that this was subject to review.</p>
<p lang="en-US">Elsewhere in the documents, eavesdropping agency Government Communications Headquarters (GCHQ) and domestic intelligence agency MI5 admit that they have obtained the bulk data sets on several occasions dating back more than a decade &#8212; GCHQ beginning in 1998, and MI5 in 2005 &#8212; under Section 94 of the 1984 <a href="http://www.legislation.gov.uk/ukpga/1984/12/section/94">Telecommunications Act</a>. The agencies <a href="https://privacyinternational.org/sites/default/files/2.%20Respondents%27%20Amended%20Response.PDF#overlay-context=node/843">argue</a> that the data has thwarted terror plots and is needed “to identify subjects of interest, or unknown individuals who surface in the course of investigations; to establish links between individuals and groups, or otherwise improve understanding of a target’s behavior and connections; to validate intelligence obtained through other sources; or to ensure the security of operations or staff.”</p>
<p lang="en-US">Last year, <em>The Intercept</em> <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">exposed</a> how GCHQ has in recent years attempted to create what it described as the world&#8217;s largest surveillance system, covertly harvesting in excess of 50 billion records every day about people&#8217;s emails, phone calls, and web browsing habits. In one program code-named KARMA POLICE, the agency said it was seeking to obtain “a web browsing profile for every visible user on the internet.”</p>
<p class="caption">Top photo: Inside GCHQ headquarters in Cheltenham, England.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/">Documents Reveal Secretive U.K. Surveillance Policies</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/04/20/uk-surveillance-bulk-datasets-gchq/feed/</wfw:commentRss>
		<slash:comments>26</slash:comments>
	
	</item>
		<item>
		<title>British Authorities Demand Encryption Keys in Case With “Huge Implications”</title>
		<link>https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/</link>
		<comments>https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/#comments</comments>
		<pubDate>Fri, 01 Apr 2016 15:23:45 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=58298</guid>
		<description><![CDATA[<p>The alleged hacker was charged with breaching the U.S. Department of Defense, Environmental Protection Agency, Department of Energy, and NASA.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/">British Authorities Demand Encryption Keys in Case With “Huge Implications”</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>BRITISH AUTHORITIES</u> are attempting to force a man accused of hacking the U.S. government to hand over his encryption keys in a case that campaigners believe could have ramifications for journalists and activists.</p>
<p>England-based Lauri Love (pictured above) was arrested in October 2013 by the U.K.&#8217;s equivalent of the FBI, the National Crime Agency, over allegations that he hacked a range of U.S. government systems between 2012 and 2013, including those of the Department of Defense, the Environmental Protection Agency, the Department of Energy, and NASA.</p>
<p>The U.S. Justice Department is seeking the extradition of Love, <a href="https://www.justice.gov/usao-nj/pr/alleged-hacker-indicted-new-jersey-data-breach-conspiracy-targeting-government-agency">claiming</a> that he and a group of conspirators breached “thousands of networks” in total and caused millions of dollars in damages. But Love has been fighting the extradition attempt in British courts, insisting that he should be tried for the alleged offenses within the U.K. The 31-year-old, who has been diagnosed with Asperger&#8217;s syndrome, has argued that he would not get a fair trial in the U.S., where his legal team says he could face a sentence of up to 99 years in jail.</p>
<p>The issues raised by Love&#8217;s case, however, are not limited to hacking. In recent weeks, his case has taken on a new dimension &#8212; opening up another potential battleground in the ongoing international debate about encrypted data and the power governments should have to access it.</p>
<p>Following Love&#8217;s arrest in 2013, the National Crime Agency, or NCA, seized computers and hard drives in his possession. He was then served with an order under <a href="http://www.legislation.gov.uk/ukpga/2000/23/section/49">Section 49</a> of the U.K&#8217;s controversial Regulation of Investigatory Powers Act, which demanded that he hand over his passwords to open encrypted files stored on the devices. Love refused, and when the NCA did not push the issue any further, it appeared that the agency had given up on its attempt to make him comply.</p>
<p>Subsequently, Love sued the NCA in an attempt to have his seized computers and hard drives returned. But that effort has now culminated in the NCA doubling down and renewing its demand that he turn over his encryption keys. According to <a href="https://www.documentcloud.org/documents/2781972-Lauri-Love-case-directions-April-2016.html">a court document</a> dated March 2, 2016, the agency is asking that Love “provide the encryption key or password” for data encrypted using TrueCrypt software that was found on his Samsung laptop, two hard drives, and a memory card.</p>
<p>Naomi Colvin, a campaigner for transparency advocacy group the <a href="https://www.couragefound.org">Courage Foundation</a>, told <em>The Intercept</em> that she believed the case could have “huge implications for journalists, activists, and others who need to guard confidential information” &#8212; potentially setting a precedent that could make it easier in the future for British police and security agencies to gain access to, or to seize and retain, encrypted material.</p>
<p>Colvin said that the Courage Foundation, which is raising funds for Love&#8217;s legal defense, is backing him because “his case fits in to a pattern of political prosecutions of hacktivists and other truthtellers.” She added: “From our work with some of our other beneficiaries &#8212; particularly Jeremy Hammond and Barrett Brown &#8212; we&#8217;re very familiar with the prosecutorial overreach, inflated damage figures, absurd sentencing, and discriminatory prison treatment, including frequent spells in solitary confinement, that is common in these kinds of cases.”</p>
<p>The encryption key demand is set to be the focus of an April 12 court hearing, at which a judge is expected to rule on whether Love should be ordered to turn over his passwords. But regardless of the hearing&#8217;s outcome, Love has no intention of turning over his encryption keys.</p>
<p>“I don&#8217;t have any alternative but to refuse to comply,” he told <em>The Intercept</em>. “The NCA are trying to establish a precedent so that an executive body &#8212; i.e., the police &#8212; can take away your computers and if they are unable to comprehend certain portions of data held on them, then you lose the right to retain them. It&#8217;s a presumption of guilt for random data.”</p>
<p>Notably, in the lead-up to the April 12 hearing, the NCA has appeared keen to keep public discussion of the case out of the media, perhaps in light of a recent high-profile controversy on the other side of the Atlantic over FBI demands that Apple Inc. help thwart the encryption on an iPhone.</p>
<p>Court documents show that the agency requested &#8212; and a judge approved &#8212; that witness statements and skeleton arguments should not be disclosed “to the press, the public, or any third party save with the leave of the court until after the final hearing, and then only in relation to such matters as are referred to in open court or as permitted or directed by the court.”</p>
<p>Karen Todner, Love&#8217;s attorney, told <em>The Intercept</em> that the NCA&#8217;s apparent desire to minimize publicity was quite unusual. “In other cases that I&#8217;ve dealt with &#8212; not necessarily about extradition, but computer hacking cases &#8212; they&#8217;ve put out press statements and been quite proactive in the press,” she said.</p>
<p>Todner noted that Love&#8217;s case has similarities to that of Gary McKinnon, a Scottish man who successfully fought extradition to the U.S. over allegations that he hacked NASA and U.S. military computers. Like Love, McKinnon had also been diagnosed with Asperger&#8217;s syndrome. After a 10-year campaign and lengthy legal battle, McKinnon&#8217;s extradition was <a href="http://www.bbc.com/news/uk-19957138">ultimately blocked</a> by the British government over health concerns.</p>
<p>“I think that they [the NCA] are possibly nervous because of the McKinnon case, because certainly the press that McKinnon received was helpful to his case. It courted public opinion and certainly Lauri&#8217;s case would probably also court public opinion.”</p>
<p lang="en-US">The NCA declined to comment for this story.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/">British Authorities Demand Encryption Keys in Case With “Huge Implications”</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/04/01/british-authorities-demand-encryption-keys-in-closely-watched-case/feed/</wfw:commentRss>
		<slash:comments>29</slash:comments>
	
	</item>
		<item>
		<title>U.K. Parliament Debates &#8220;Snoopers’ Charter&#8221;</title>
		<link>https://theintercept.com/2016/03/15/uk-parliament-debates-snoopers-charter/</link>
		<comments>https://theintercept.com/2016/03/15/uk-parliament-debates-snoopers-charter/#comments</comments>
		<pubDate>Tue, 15 Mar 2016 19:40:53 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=55622</guid>
		<description><![CDATA[<p>The British government’s controversial attempt to pass sweeping new surveillance powers was debated in Parliament for the first time Tuesday, with opposition politicians raising privacy concerns.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/03/15/uk-parliament-debates-snoopers-charter/">U.K. Parliament Debates &#8220;Snoopers’ Charter&#8221;</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>THE BRITISH GOVERNMENT&#8217;S</u> controversial attempt to pass sweeping new surveillance powers was debated in Parliament for the first time Tuesday, with opposition politicians raising privacy concerns and calling for significant changes to the plans.</p>
<p>The government&#8217;s draft Investigatory Powers Bill &#8212; the so-called snoopers’ charter &#8212; was published in November last year. If passed into law in its current form, it would mandate a data retention regime unprecedented in any Western democracy, forcing internet companies to store records showing every website visited by every person in the U.K. for a period of 12 months. The bill also codifies powers that would allow British security agencies to conduct large-scale hacks of computer networks, and it will also hand spies the power to secretly monitor journalists and their sources, as <em>The Intercept</em> has <a href="https://theintercept.com/2015/11/05/seven-major-takeaways-from-the-u-k-s-proposed-surveillance-rules/">previously reported</a>.</p>
<p>During Tuesday&#8217;s debate in Parliament, the government&#8217;s home secretary, Theresa May (pictured above), defended the proposed law, stating that it was &#8220;world-leading legislation&#8221; necessary to combat terrorism threats. However, Labour, Liberal Democrat, and Scottish National Party representatives criticized the bill and vowed not to support it unless it is rewritten in several areas.</p>
<p>“The truth is we are some way from finding a consensus in the form that this legislation should take,” said Labour&#8217;s Andy Burnham. “We&#8217;ve recognized the country needs a new law, but I&#8217;ve also said that the government&#8217;s bill is not yet worthy of support. There are significant weaknesses in this bill.”</p>
<p>Following the debate, there was set to be a vote to pass the bill to the next stage of parliamentary scrutiny. The Labour and Scottish National parties both said they would abstain, while the Liberal Democrats <a href="https://twitter.com/LibDemPress/status/709738101418160128">announced</a> they would vote against the bill, calling the proposed legislation “awful.” However, the governing Conservative party, which has a narrow majority of members in the Parliament, will almost certainly obtain enough votes to move the bill forward.</p>
<p>The months ahead will see the continuation of a heated debate around the government&#8217;s proposals, which have faced severe criticism in recent weeks. On Tuesday, 200 legal experts signed <a href="http://www.theguardian.com/world/2016/mar/14/investigatory-powers-bill-not-fit-for-purpose-say-200-senior-lawyers">a letter</a> in <em>The</em> <em>Guardian</em> asserting that the Investigatory Powers Bill “fails to meet international standards for surveillance powers” and “may be illegal.”</p>
<p>Earlier in March, the U.N.&#8217;s special rapporteur on the right to privacy <a href="http://www.wired.co.uk/news/archive/2016-03/09/un-privacy-ip-bill-not-compliant-international-law">criticized</a> the draft law as “disproportionate,” and said that it would “undermine the spirit of the very right to privacy.”</p>
<p>Meanwhile, three separate British parliamentary reports have <a href="http://www.wired.co.uk/news/archive/2016-02/11/uk-mass-surveillance-justification">raised concerns</a> about the scope of the broad surveillance plans. In February, one of the committees that scrutinized the plans made 86 detailed recommendations for improvements and <a href="http://www.parliament.uk/business/committees/committees-a-z/joint-select/draft-investigatory-powers-bill/news-parliament-2015/report-published/">said</a> that the government had “a significant amount of further work to do before Parliament can be confident that the provisions have been fully thought through.”</p>
<p><strong>Update: March 15, 2016, 15:30 ET<br />
</strong>As expected, members of Parliament have voted in favor of the surveillance bill. It was approved by 281 votes to 15 and will now move to the next stage of parliamentary scrutiny &#8212; known as the &#8220;<a href="http://www.parliament.uk/about/how/laws/passage-bill/commons/coms-commons-comittee-stage/">committee stage</a>&#8221; &#8212; during which the legislation will be debated in detail and various amendments proposed.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/03/15/uk-parliament-debates-snoopers-charter/">U.K. Parliament Debates &#8220;Snoopers’ Charter&#8221;</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/03/15/uk-parliament-debates-snoopers-charter/feed/</wfw:commentRss>
		<slash:comments>16</slash:comments>
	
	</item>
		<item>
		<title>U.K. Court, in David Miranda Case, Rules Terrorism Act Violates Fundamental Rights of Free Press</title>
		<link>https://theintercept.com/2016/01/19/miranda-appeal-uk-terrorism-fundamental-rights-violated/</link>
		<comments>https://theintercept.com/2016/01/19/miranda-appeal-uk-terrorism-fundamental-rights-violated/#comments</comments>
		<pubDate>Tue, 19 Jan 2016 12:02:10 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=48479</guid>
		<description><![CDATA[<p>In a case involving the seizure of secret documents leaked by Edward Snowden, a sweeping British counterterrorism law has been ruled "incompatible" with journalists' rights in a landmark decision.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/01/19/miranda-appeal-uk-terrorism-fundamental-rights-violated/">U.K. Court, in David Miranda Case, Rules Terrorism Act Violates Fundamental Rights of Free Press</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p lang="en-US"><u>A BRITISH APPEALS COURT</u> has ruled that the United Kingdom&#8217;s broad counterterrorism laws breach fundamental rights in a case involving the seizure of encrypted documents from David Miranda, the partner of <i>Intercept </i>co-founder Glenn Greenwald, at a London airport in 2013.</p>
<p lang="en-US">Miranda (pictured above) was detained and interrogated for nine hours at Heathrow Airport in August 2013 while he was assisting Greenwald&#8217;s reporting on documents about government mass surveillance leaked by National Security Agency whistleblower Edward Snowden.</p>
<p><span lang="en-US">Last year, the High Court in London <a href="https://theintercept.com/2014/02/19/uk-court-david-miranda-detention-legal-terrorism-law/">dismissed</a> a legal challenge brought by Miranda over the case </span>on the grounds that it reasonably regarded his actions as “terrorism” as defined by the law<span lang="en-US">. However, that decision was partially <a href="https://www.judiciary.gov.uk/judgments/david-miranda-v-secretary-of-state-for-the-home-department/">overturned Tuesday</a> by the Court of Appeal in a ruling that will be viewed as a major victory for press freedom campaigners.</span></p>
<p lang="en-US">The ruling finds that the police followed the law when detaining Miranda under a controversial section of the Terrorism Act, <a href="http://www.legislation.gov.uk/ukpga/2000/11/schedule/7">Schedule 7</a>. However, crucially, it asserts that the statute itself &#8220;is not subject to adequate safeguards against its arbitrary exercise&#8221; and is &#8220;incompatible&#8221; with Article 10 of the <a href="http://rightsinfo.org/the-rights-in-the-european-convention/">European Convention on Human Rights</a>, which provides the right to &#8220;receive and impart information and ideas without interference by public authority and regardless of frontiers.&#8221;</p>
<p lang="en-US">The Court of Appeal&#8217;s most senior judge, Lord Dyson MR, stated in the ruling that he accepted there were already some &#8220;constraints on the exercise of the power,&#8221; but he believed that these &#8220;do not afford effective protection of journalists’ Article 10 rights.&#8221; He added:</p>
<blockquote>
<p lang="en-US">The central concern is that disclosure of journalistic material (whether or not it involves the identification of a journalist’s source) undermines the confidentiality that is inherent in such material and which is necessary to avoid the chilling effect of disclosure and to protect Article 10 rights. If journalists and their sources can have no expectation of confidentiality, they may decide against providing information on sensitive matters of public interest. That is why the confidentiality of such information is so important.</p>
</blockquote>
<p>Miranda’s appeal was supported by a press freedom litigation fund established by First Look Media, <em>The Intercept</em>’s parent company. It was also supported by the rights groups Liberty, Article 19, English PEN, and the Media Defense Initiative. The latter three organizations argued in <a href="https://webcache.googleusercontent.com/search?q=cache%3AvXDylTkDhXUJ%3Ahttps%3A//www.article19.org/data/files/medialibrary/38226/R-%20Miranda%20-v-SSHD-Court-of-Appeal-Written-Submissions-Free-Speech-Interveners-FINAL.pdf+&amp;cd=2&amp;hl=en&amp;ct=clnk#5358360070584683283">a joint submission</a> to the court that the treatment of Miranda “raised very serious concerns about the adequacy of the safeguards available in the United Kingdom for those undertaking, or assisting in, journalist work in the public interest, or their sources.”</p>
<p>Miranda, a Brazilian national, was detained in London at the height of the international fallout from the Snowden revelations, which featured <a href="http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">major disclosures</a> about British mass surveillance programs. At the time of his August 2013 detention, Miranda was transporting a batch of the Snowden documents from one reporter to another — from Laura Poitras in Berlin to Greenwald in Rio de Janeiro. Poitras had been working on stories sourced from the Snowden material with the <em>New York Times </em>and <em>Der Spiegel</em>, while Greenwald was reporting for <em>The</em> <em>Guardian</em>, which had paid for Miranda’s trip. (Greenwald, who was then a columnist for the London-based newspaper, left in October 2013 to co-found<em> The Intercept</em> with Poitras.)</p>
<p lang="en-US">Shortly after Miranda was detained, British authorities claimed that encrypted material seized from him included 58,000 “highly classified” British documents derived from the Snowden leaks, 75 of which they said they had “reconstructed” and been able to decrypt and view. The seizure of the documents led to the London police counterterrorism division launching a criminal investigation that focused in part on journalists who had handled the files. The probe, which was designated the code name “Operation Curable,” remained ongoing as recently as November of last year, <i>The Intercept</i> has <a href="https://theintercept.com/2015/11/13/code-name-uk-probe-snowden-reporting-revealed-operation-curable/">previously reported</a>.</p>
<p lang="en-US">To justify their seizure of the documents, British authorities had argued that publication of the Snowden files was itself a terrorist act. A memo <a href="http://www.huffingtonpost.com/2013/11/02/david-miranda-terrorism-glenn-greenwald-british_n_4199838.html">circulated by security services</a> prior to Miranda&#8217;s detention asserted that “the disclosure [of the Snowden documents], or threat of disclosure, is designed to influence a government and is made for the purpose of promoting a political or ideological cause. This therefore falls within the definition of terrorism.” This position was seemingly accepted by the High Court in February 2014, which ruled in favor of the government in a ruling <a href="http://www.theguardian.com/world/2014/feb/19/high-court-ruling-on-david-miranda-heathrow-detention-live-coverage#block-5304c33be4b086afb98106d2">staunchly criticized</a> by press freedom groups such as Reporters without Borders. It also appeared to concern the U.K. government&#8217;s independent reviewer of terrorism laws, David Anderson, who warned in a <a href="https://terrorismlegislationreviewer.independent.gov.uk/the-terrorism-acts-in-2013-july-2014/">July 2014 report</a> that the High Court ruling had set a precedent that could mean in some cases that the “writing of a book, an article or a blog may therefore amount to terrorism.”</p>
<p lang="en-US">The appeals court&#8217;s judgment, however, appears to overturn this aspect of the High Court&#8217;s earlier ruling, significantly reining in its conflation of journalism with terrorism. It makes clear that under the European Convention on Human Rights, journalists are entitled to legal protections and should not be subjected to arbitrary stops and searches under counterterrorism laws. The law used to detain Miranda will now have to be changed so that journalists are better protected in the future.</p>
<p lang="en-US">Kate Goold, a lawyer for the London firm Bindmans who represented Miranda in the case, said that Tuesday&#8217;s ruling “emphasizes the importance of interpreting terrorism with its ordinary natural meaning to ensure that legitimate public interest journalism is not stifled through the use of draconian powers.”</p>
<p lang="en-US">“The notion of a journalist becoming an &#8216;accidental terrorist&#8217; has been wholeheartedly rejected,&#8221; Goold said. &#8220;We welcome this court’s principled and decisive ruling that Schedule 7 needs to come in line with other legislation to ensure that the seizure of journalistic material is protected by judicial safeguards.”</p>
<p lang="en-US">Responding to the news Tuesday, Miranda <a href="https://twitter.com/davidmirandario/status/689407688871047168">tweeted</a> that he was &#8220;Thrilled with the court ruling!&#8221; He added: &#8220;My purpose was to show U.K.&#8217;s terrorism law violates press freedoms. And journalism isn&#8217;t &#8216;terrorism.&#8217; We won!&#8221;</p>
<p>The British government could attempt to launch a challenge against the Court of Appeal’s ruling with the U.K.’s Supreme Court. However, it was not immediately clear whether it intends to pursue the case further.</p>
<p>A spokesperson for the government&#8217;s Home Office insisted in a statement Tuesday that the appeals court&#8217;s ruling regarding Miranda&#8217;s detention “supports the action taken by police to protect national security.”</p>
<p>The spokesperson added: &#8220;We also note the court&#8217;s decision that Schedule 7 [of the Terrorism Act], as in force at the time of this incident, did not provide sufficient protection against the examination of journalistic material.</p>
<p>&#8220;The government is constantly working to ensure our counterterrorism powers are both effective and fair. That is why in 2015 we changed the Code of Practice for examining officers to instruct them not to examine journalistic material at all. This goes above and beyond the court&#8217;s recommendations in this case.&#8221;</p>
<p lang="en-US"><strong>Update: January 19, 9:45 a.m.</strong><br />
<em>This post has been updated to include comment from the U.K. government. </em></p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2016/01/19/miranda-appeal-uk-terrorism-fundamental-rights-violated/">U.K. Court, in David Miranda Case, Rules Terrorism Act Violates Fundamental Rights of Free Press</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2016/01/19/miranda-appeal-uk-terrorism-fundamental-rights-violated/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
	
	</item>
		<item>
		<title>NSA Helped British Spies Find Security Holes In Juniper Firewalls</title>
		<link>https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/</link>
		<comments>https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/#comments</comments>
		<pubDate>Wed, 23 Dec 2015 17:25:52 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=46561</guid>
		<description><![CDATA[<p>GCHQ acquired the capability to target 13 different models and, with NSA help, exploited several networks in one year.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/">NSA Helped British Spies Find Security Holes In Juniper Firewalls</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>A TOP-SECRET</u> <a href="https://www.documentcloud.org/documents/2653542-Juniper-Opportunity-Assessment-03FEB11-Redacted.html">document</a> dated February 2011 reveals that British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks, a leading provider of networking and Internet security gear.</p>
<p>The six-page document, titled “Assessment of Intelligence Opportunity – Juniper,” raises questions about whether the intelligence agencies were responsible for or culpable in the creation of security holes <a href="https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554">disclosed</a> by Juniper last week. While it does not establish a certain link between GCHQ, NSA, and the Juniper hacks, it does make clear that, like the unidentified parties behind those hacks, the agencies found ways to penetrate the &#8220;NetScreen&#8221; line of security products, which help companies create online firewalls and virtual private networks, or VPNs. It further indicates that, also like the hackers, GCHQ&#8217;s capabilities clustered around an operating system called &#8220;ScreenOS,&#8221; which powers only a subset of products sold by Juniper, including the NetScreen line. Juniper’s other products, which include high-volume Internet routers, run a different operating system called JUNOS.</p>
<p>The possibility of links between the security holes and the intelligence agencies is particularly important given an ongoing debate in the U.S. and the U.K. over whether governments should have backdoors allowing access to encrypted data. Cryptographers and security researchers have raised the possibility that one of the newly discovered Juniper vulnerabilities stemmed from an encryption backdoor engineered by the NSA and co-opted by someone else. Meanwhile, U.S. officials are <a href="http://www.nytimes.com/reuters/2015/12/21/technology/21reuters-juniper-networks-cyberattack-cisco-systems.html">reviewing</a> how the Juniper hacks could affect their own networks, putting them in the awkward position of scrambling to <a href="http://www.cnn.com/2015/12/18/politics/juniper-networks-us-government-security-hack/index.html">shore up</a> their own encryption even as they criticize the growing use of encryption by others.</p>
<p><div class='img-wrap align-right width-fixed' style='width:540px'> <img class="alignright size-article-medium wp-image-46568" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/12/AP_922527605694-540x360.jpg" alt="The headquarters of Juniper Networks in Sunnyvale, California on January 1, 2014. Photo Credit: Kristoffer Tripplaar/ Sipa USA" /></p>
<p class="caption">The headquarters of Juniper Networks in Sunnyvale, Calif., on Jan. 1, 2014.</p>
<p><p class='caption source pullright' style=''>Photo: Kris Tripplaar/Sipa USA/AP</p></div>The author of the 2011 GCHQ document, an NSA employee who was working with GCHQ as part of an “Access Strategy Team,” takes a similarly adversarial view of encryption, referring to Juniper as a “threat” and a “target” because it provides technology to protect data from eavesdropping. Far from suggesting that security agencies should help U.S. and U.K. companies mend their digital defenses, the document says the agencies must “keep up with Juniper technology” in the pursuit of SIGINT, or signals intelligence.</p>
<p>“The threat comes from Juniper’s investment and emphasis on being a security leader,” the document says. “If the SIGINT community falls behind, it might take years to regain a Juniper firewall or router access capability if Juniper continues to rapidly increase their security.”</p>
<p>The document, provided by NSA whistleblower Edward Snowden, shines light on the agencies&#8217; secret efforts to ensure they could monitor information as it flowed through Juniper&#8217;s products, which are used by Internet providers, banks, universities, and government agencies. It notes that while Juniper trails its competitors, it is a &#8220;technology leader&#8221; with gear &#8220;at the core of the Internet in many countries,” including several deemed to be high priority from a spying perspective: Pakistan, Yemen, and China.</p>
<blockquote class='stylized pull-left'>&#8220;Juniper technology sharing with NSA improved dramatically to exploit several target networks&#8221;</blockquote>
<p>Asked about the document, GCHQ issued a boilerplate response asserting that the agency does not comment on intelligence matters and complies with “a strict legal and policy framework.” The NSA could not immediately respond Tuesday. Juniper sent a written statement saying the company &#8220;operates with the highest of ethical standards, and is committed to maintaining the integrity, security, and quality of our products. As we’ve stated previously … it is against established Juniper policy to intentionally include ‘backdoors’ that would potentially compromise our products or put our customers at risk. Moreover, it is Juniper policy not to work with others to introduce vulnerabilities into our products.”</p>
<p>Juniper’s prominence and ubiquity similarly helped draw attention to the more recent hacks against the company, which first came to light Thursday, when the California firm <a href="https://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10713&amp;cat=SIRT_1&amp;actp=LIST">revealed</a> it had discovered &#8220;unauthorized code&#8221; in ScreenOS enabling two major vulnerabilities. One, first present in an August 2012 <a href="https://www.juniper.net/techpubs/software/screenos/screenos6.3.0/rn-630-r12.pdf">release</a> of ScreenOS, could allow access to encrypted data transmitted over VPNs. The other, first surfacing in a December 2014 ScreenOS <a href="https://www.juniper.net/techpubs/software/screenos/screenos6.3.0/rn-630r17.pdf">release</a>, allows an attacker to remotely administer a firewall, thus leading to &#8220;complete compromise of the affected device,&#8221; according to Juniper. The vulnerabilities remained in versions of ScreenOS <a href="https://www.juniper.net/techpubs/software/screenos/screenos6.3.0/rn-630r19-rev02.pdf">released</a> through at least October of this year.</p>
<p>It is the earlier vulnerability, potentially allowing eavesdropping on VPNs, that has generated vigorous online discussion among computer security experts. Some, like Johns Hopkins professor <a href="http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html">Matthew Green</a> and security researcher <a href="https://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/">Ralf-Philipp Weinmann</a>, have said that an attacker appears to have subverted a backdoor shown, in <a href="http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html">previously disclosed</a> documents from Snowden, to have originated with the NSA. Specifically, the attacker seems to have tampered with a 32-byte value used to seed the generation of random numbers, numbers that are in turn used in the process of encrypting data in ScreenOS. ScreenOS uses the value as a parameter to a standard system for random number generation known as <a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG">Dual Elliptic Curve Deterministic Random Bit Generator</a>. The default 32-byte value in this standard is believed to have been generated by the NSA. Juniper <a href="https://kb.juniper.net/InfoCenter/index?page=content&amp;id=KB28205&amp;pmv=print&amp;actp=LIST">said</a>, in the wake of the Snowden revelations about the standard, that it had replaced this 32-byte value with its own “self-generated basis points.” So the attacker would have replaced Juniper’s replacement of the NSA 32-byte value.</p>
<p>Matt Blaze, a cryptographic researcher and director of the Distributed Systems Lab at the University of Pennsylvania, said the document contains clues that indicate the 2011 capabilities against Juniper are not connected to the recently discovered vulnerabilities. The 2011 assessment notes that “some reverse engineering may be required depending on firmware revisions” affecting targeted NetScreen firewall models. Blaze said this points away from the sort of ScreenOS compromise behind the more recent Juniper vulnerabilities.</p>
<p>“With the [recently discovered] backdoor, a firmware revision would either have the backdoor or it wouldn&#8217;t, and if it was removed, they&#8217;d have to do a lot more than ‘some reverse engineering’ to recover the capability,” Blaze said. “My guess from reading this is that the capabilities discussed here involved exploiting bugs and maybe supply chain attacks, rather than this [recently discovered] backdoor.”</p>
<p>Blaze said the exploit capabilities in the 2011 document seem consistent with a program called “FEEDTROUGH,” first revealed in a 2007 <a href="https://leaksource.files.wordpress.com/2013/12/nsa-ant-feedthrough.jpg">document</a> published alongside an <a href="http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html">article</a> in German newsweekly <em>Der Spiegel</em>.</p>
<p>Even if it outlines capabilities unconnected to the recently discovered Juniper hacks, the 2011 GCHQ assessment makes clear that the author was interested in expanding the agencies&#8217; capabilities against Juniper. &#8220;The vast majority of current Juniper exploits are against firewalls running the ScreenOS operating system,&#8221; the author wrote. &#8220;An effort to ensure exploitation capability&#8221; against Juniper&#8217;s primary operating system, JUNOS, &#8220;should bear fruit against a wide range of Juniper products.&#8221;</p>
<p>The document suggests that the intelligence agencies successfully used the security holes they identified in Juniper&#8217;s devices to repeatedly penetrate them for surveillance, stating that &#8220;Juniper technology sharing with NSA improved dramatically during [calendar year] 2010 to exploit several target networks where GCHQ had access primacy.&#8221;</p>
<p>The assessment also notes that, because Juniper is a U.S.-based company, there is both “opportunity and complication” in targeting its technology. “There is potential to leverage a corporate relationship should one exist with NSA,” it says, adding: “Any GCHQ efforts to exploit Juniper must begin with close coordination with NSA.”</p>
<p>It further states that GCHQ has a “current exploit capability” against 13 Juniper models, all of which run ScreenOS: NS5gt, N25, NS50, NS500, NS204, NS208, NS5200, NS5000, SSG5, SSG20, SSG140, ISG 1000, ISG 2000. It reveals that the agency was developing an additional surveillance capability to hack into high-capacity Juniper M320 routers, which were designed to be used by Internet service providers.</p>
<p>“The ability to exploit Juniper servers and firewalls,” the document says, &#8220;will pay many dividends over the years.&#8221;</p>

                <div id='dcv-2653542-Juniper-Opportunity-Assessment-03FEB11-Redacted' class='document-cloud-container'></div>
                <script>
                    DV.load('//www.documentcloud.org/documents/2653542-Juniper-Opportunity-Assessment-03FEB11-Redacted.js', {
                        width: '100%',
                        height: '450',
                        sidebar: false,
                        container: '#dcv-2653542-Juniper-Opportunity-Assessment-03FEB11-Redacted'
                    });
                </script>
            
<p>The post <a rel="nofollow" href="https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/">NSA Helped British Spies Find Security Holes In Juniper Firewalls</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq/feed/</wfw:commentRss>
		<slash:comments>90</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/12/AP_922527605694-440x440.jpg" />
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/12/AP_922527605694.jpg" medium="image">
			<media:title type="html">CA: Juniper Networks Headquarters</media:title>
			<media:description type="html">The headquarters of Juniper Networks in Sunnyvale, California on January 1, 2014. Photo Credit: Kristoffer Tripplaar/ Sipa USA</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/12/AP_922527605694-440x440.jpg" />
		</media:content>
	</item>
		<item>
		<title>From Paris to Boston, Terrorists Were Already Known to Authorities</title>
		<link>https://theintercept.com/2015/11/18/terrorists-were-already-known-to-authorities/</link>
		<comments>https://theintercept.com/2015/11/18/terrorists-were-already-known-to-authorities/#comments</comments>
		<pubDate>Wed, 18 Nov 2015 18:03:34 +0000</pubDate>
		<dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
				<category><![CDATA[Mashable]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://theintercept.com/?p=43365</guid>
		<description><![CDATA[<p>A review of 10 recent high-profile attacks carried out in Western countries between 2013 and 2015 showed that some or all of the perpetrators were already viewed as threats.</p>
<p>The post <a rel="nofollow" href="https://theintercept.com/2015/11/18/terrorists-were-already-known-to-authorities/">From Paris to Boston, Terrorists Were Already Known to Authorities</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><u>WHENEVER A TERRORIST ATTACK OCCURS</u>, it never takes long for politicians to begin calling for more surveillance powers. The horrendous attacks in Paris last week, which left more than 120 people dead, are no exception to this rule. In recent days, officials in the <a href="https://www.theverge.com/2015/11/16/9742182/uk-surveillance-paris-attacks">United Kingdom</a> and the <a href="https://www.washingtonpost.com/news/the-switch/wp/2015/11/16/paris-attacks-should-be-wake-up-call-for-more-digital-surveillance-cia-director-says/">United States</a> have been among those arguing that more surveillance of Internet communications is necessary to prevent further atrocities.</p>
<p>The case for expanded surveillance of communications, however, is complicated by an analysis of recent terrorist attacks. <em>The Intercept </em>has reviewed 10 high-profile jihadi attacks carried out in Western countries between 2013 and 2015 (see below), and in each case some or all of the perpetrators were already known to the authorities before they executed their plot. In other words, most of the terrorists involved were not ghost operatives who sprang from nowhere to commit their crimes; they were already viewed as a potential threat, yet were not subjected to sufficient scrutiny by authorities under existing counterterrorism powers. Some of those involved in last week&#8217;s Paris massacre, for instance, were already known to authorities; at least three of the men appear to have been flagged at different times as having been radicalized, but warning signs were ignored.</p>
<p>In the aftermath of a terrorist atrocity, government officials often seem to talk about surveillance as if it were some sort of panacea, a silver bullet. But what they always fail to explain is how, even with mass surveillance systems already in place in countries like <a href="http://www.theguardian.com/world/2013/jul/04/france-electronic-spying-operation-nsa">France</a>, the <a href="http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order">United States</a>, and the <a href="https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/">United Kingdom</a>, attacks still happen. In reality, it is only possible to watch some of the people some of the time, not all of the people all of the time. Even if you had every single person in the world under constant electronic surveillance, you would still need a human being to analyze the data and assess any threats in a timely fashion. And human resources are limited and fallible.</p>
<p>There is no doubt that we live in a dangerous world and that intelligence agencies and the police have a difficult job to do, particularly in the current geopolitical environment. They know about hundreds or thousands of individuals who sympathize with terrorist groups, any one of whom may be plotting an attack, yet they do not appear to have the means to monitor each of these people closely over sustained periods of time. If any lesson can be learned from studying the perpetrators of recent attacks, it is that there needs to be a greater investment in conducting targeted surveillance of known terror suspects and a move away from the constant knee-jerk expansion of dragnet surveillance, which has simply not proven itself to be effective, regardless of the debate about whether it is legal or ethical in the first place.</p>
<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/map-3.png"><img class="aligncenter size-article-large wp-image-43519" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/map-3.png" alt="map-3" /></a></p>
<p class="caption overlayed">Map of 10 recent attacks carried out in Western countries by Islamic extremists.</p>
<p><p class='caption source' style=''>freevectormaps.com</p></div>
<h4>1. Paris attacks: November 13, 2015</h4>
<p><strong>Victims</strong>: 129 dead. 400+ wounded.<br />
<strong>Named suspected perpetrators</strong>: Ismaël Omar Mostefaï (29; French), Samy Amimour (28; French), Ibrahim Abdeslam (31; French), Bilal Hadfi (20; French), Abdelhamid Abaaoud (27; Belgian), Salah Abdeslam (26; French).<br />
<strong>Weapons</strong>: Assault rifles, hand grenades, suicide vests.</p>
<p><strong>Known to authorities?</strong> At least three of the men involved in planning and carrying out the French attacks were known to European authorities and <a href="http://www.reuters.com/article/2015/11/20/us-france-shooting-watchlists-idUSKCN0T900N20151120">at least four</a> were listed in a U.S. terrorism watchlist database. Ismaël Omar Mostefaï, who helped carry out the massacre at the Bataclan concert venue, had been flagged as a radicalization risk in 2010. French police <a href="http://www.telegraph.co.uk/news/worldnews/europe/france/11996120/Paris-attack-what-we-know-about-the-suspects.html">reportedly</a> ignored two warnings about Mostefaï before he carried out the attacks. Some of his friends claimed to have tried to alert French police about his radical views, but said they were told the authorities could do nothing. Samy Amimour, another of the men involved in the Bataclan massacre, had been previously charged with terrorist offenses &#8220;after an abortive attempt to travel to Yemen,” according to Paris prosecutors.</p>
<p>The alleged ringleader of the attacks, Abdelhamid Abaaoud, was also <a href="http://www.theguardian.com/world/2015/nov/16/abdelhamid-abaaoud-suspected-mastermind-of-paris-terror-attacks">well-known</a> to European police. In 2013, he booked a flight from Cologne to Turkey, which was flagged to German authorities because he was <a href="http://www.wsj.com/articles/paris-attacks-plot-was-hatched-in-plain-sight-1448587309">reportedly</a> on an EU watchlist. But he was not detained and was able to board the flight. From Turkey, Abaaoud entered Syria, where he joined ISIS. Abaaoud later returned to Europe and was <a href="http://www.theguardian.com/world/2015/jan/18/belgian-jihadi-leader-free-two-arrests-greece">named as a wanted extremist</a> in January following a gun battle in Belgium. In February, he featured <a href="http://www.thedailybeast.com/articles/2015/11/16/paris-mastermind-told-isis-magazine-that-bungling-police-officers-let-him-escape.html">prominently</a> in ISIS propaganda magazine Dabiq boasting about how he had been able to evade police detection in Europe.</p>
<p>Others involved in the Paris attacks are also likely to have been on the radar of police and intelligence agencies due to their travels to Syria. Bilal Hadfi, for instance, was living in Belgium after having returned from Syria, where he is believed to have fought with Islamic State militants. Hadfi apparently attended the Instituut Anneessens-Funck college in Brussels; his former history professor <a href="https://www.rtbf.be/info/belgique/detail_l-ex-prof-de-bilal-hadfi-c-est-aussi-un-echec-personnel?id=9139273">recalled</a> that, following the <em>Charlie Hebdo</em> massacre in January 2015, Hadfi defended the attacks. The professor reported him to management due to concerns about his radical views, but management “decided not to intervene, to avoid stigmatizing the young student.” In June, Hadfi <a href="http://www.nytimes.com/interactive/2015/11/15/world/europe/manhunt-for-paris-attackers.html?smid=tw-nytimes&amp;smtyp=cur&amp;_r=1">reportedly</a> posted on his <a href="https://www.facebook.com/berkanoh.versailles">Facebook page</a> encouraging terrorist attacks: “Those dogs are attacking our civilians everywhere. Strike them in their community of pigs so they can’t feel safe again in their own dreams.” The family of Ibrahim Abdeslam, who detonated a suicide vest inside a cafe during the attacks, <a href="http://www.telegraph.co.uk/news/worldnews/islamic-state/11998297/Suicide-bomber-blew-himself-up-because-of-stress-says-Ibrahim-Abdeslams-family.html">said</a> he too had spent “a long time” in Syria before returning to Europe.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/paris-attack-nov2015.jpg"><img class="aligncenter size-article-large wp-image-43400" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/paris-attack-nov2015-1000x585.jpg" alt="Rescue workers gather at victims in the 10th district of Paris, Friday, Nov. 13, 2015. Several dozen people were killed in a series of unprecedented attacks around Paris on Friday, French President Francois Hollande said, announcing that he was closing the country's borders and declaring a state of emergency. (AP Photo/Jacques Brinon)" /></a></p>
<p class="caption">Rescue workers gather to treat victims in Paris&#8217; 10th arrondissement, Friday, Nov. 13, 2015.</p>
<p><p class='caption source pullright' style=''>Photo: Jacques Brinon/AP</p></div>
<h4>2. Thalys train attack, France: August 21, 2015</h4>
<p><strong>Victims: </strong>No deaths. Two wounded.<br />
<strong>Alleged perpetrator: </strong>Ayoub El Khazzani (26; Moroccan).<br />
<strong>Weapons</strong>: Pistol, assault rifle, box cutter, bottle of petrol.</p>
<p><strong>Known to authorities</strong>? Khazzani was <a href="http://www.bbc.com/news/world-europe-34032218">reportedly</a> known to European authorities for his Islamic radicalism. While living in Spain, he had come to security agencies&#8217; attention after he was observed defending jihadis and attending a radical mosque in Algeciras, Spain.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/thalys-train-attack.jpg"><img class="aligncenter size-article-large wp-image-43402" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/thalys-train-attack-1000x684.jpg" alt="French police stand guard along the platform next to a Thalys train of French national railway operator SNCF at the main train station in Arras, northern France, on August 22, 2015, the day after an armed gunman on the train was overpowered by passengers. The gunman opened fire on the train travelling from Amsterdam to Paris, injuring two people before being tackled by several passengers including off-duty American servicemen.  AFP PHOTO PHILIPPE HUGUEN        (Photo credit should read PHILIPPE HUGUEN/AFP/Getty Images)" /></a></p>
<p class="caption">French police stand guard on the platform next to a Thalys train at the station in Arras, northern France, on Aug. 22, 2015, the day after an armed gunman was overpowered by passengers. <p class='caption source pullright' style=''>Photo: Philippe Huguen/AFP/Getty Images</p></div>
<h4>3. Curtis Culwell Center attack, Garland, Texas: May 3, 2015</h4>
<p><strong>Victims: </strong>One wounded.<br />
<strong>Perpetrators: </strong>Elton Simpson (30; American) and Nadir Soofi (34; Pakistani-American).<br />
<strong>Weapons</strong>: Assault rifles, handguns.</p>
<p><strong>Known to authorities?</strong> Elton Simpson had <a href="http://edition.cnn.com/2015/05/05/us/texas-shooting-gunmen">reportedly</a> been placed on the U.S. no-fly list and had been convicted of a terror-related offense in 2011 after being caught discussing traveling to Somalia to engage in violent jihad. Soofi, on the other hand, was <a href="http://edition.cnn.com/2015/05/05/us/texas-shooting-gunmen">reportedly</a> “relatively unknown to federal investigators,” though he lived with Simpson. A third man, Abdul Malik Abdul Kareem, was <a href="http://www.foxnews.com/us/2015/06/16/indictment-phoenix-area-man-helped-plan-provided-guns-for-texas-cartoon-contest/">allegedly responsible</a> for supplying the guns and ammunition used in the attack. Kareem was investigated in 2012 after he was suspected of developing a plot to attack a Super Bowl game in Arizona with explosives.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/11/Curtis-Culwell-Center-shooting.jpg"><img class="aligncenter size-article-large wp-image-43403" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/Curtis-Culwell-Center-shooting-1000x667.jpg" alt="GARLAND, TX - MAY 4: A member of the FBI Evidence Response Team investigates the crime scene outside of the Curtis Culwell Center after a shooting occurred the day before, on May 04, 2015 in Garland, Texas. During the &quot;Muhammad Art Exhibit and Cartoon Contest,&quot; on May 03, Elton Simpson of Phoenix, Arizonia and Nadir Soofi opened fire, wounding a security guard. Police officers shot and killed Simpson at the scene. The provocative cartoon event was billed by organizers as a free speech event while critics deemed it to be anti-Islamic.  (Photo by Ben Torres/Getty Images)" /></a></p>
<p class="caption">An FBI evidence response team member investigates the crime scene after a shooting outside of the Curtis Culwell Center in Garland, Texas, May 4, 2015 . <p class='caption source pullright' style=''>Photo: Ben Torres/Getty Images</p></div>
<h4>4. Shootings in Copenhagen, Denmark: February 14-15, 2015</h4>
<p><strong>Victims: </strong>Two dead. Five wounded.<br />
<strong>Perpetrator: </strong>Omar Abdel Hamid El-Hussein (22; Danish-Jordanian-Palestinian).<br />
<strong>Weapons</strong>: Assault rifle, pistols.</p>
<p><strong>Known to authorities? </strong>Hussein was <a href="http://www.washingtonpost.com/world/danish-police-kill-copenhagen-shooting-suspect/2015/02/15/8bed7a70-b50a-11e4-9423-f3d0a1ec335c_story.html">reportedly</a> well-known to Danish security agencies. Prior to the Copenhagen shootings, he had been imprisoned for stabbing a teenager in the leg on a train. While he was in jail, prison officials <a href="http://www.b.dk/nationalt/pet-ingen-grund-til-at-tro-at-22-aarig-planlagde-terrorangreb">filed a concern report</a> to the Danish intelligence agency PET, warning that his behavior had changed and that he had become extremely religious. Two weeks after he was released from jail he went on the shooting rampage that left three dead and five wounded in different parts of Copenhagen. Shortly before the attacks, Hussein had <a href="http://edition.cnn.com/2015/02/16/europe/denmark-shootings/">apparently</a> sworn allegiance to ISIS in a post on his Facebook page.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/copenhagen-shooting.jpg"><img class="aligncenter size-article-large wp-image-43404" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/copenhagen-shooting-1000x625.jpg" alt="In this image made from TV The lifeless body of a shooting suspect lays on the pavement as Danish police forensic officers examine the scene after Danish police shot and killed the man early Sunday suspected of carrying out shooting attacks at a free speech event and then at a Copenhagen synagogue, in Copenhagen Sunday, Feb. 15, 2015.  The suspect is not yet identified by police. A man opened fire Saturday killing a Danish documentary filmmaker and a member of the Scandinavian country’s Jewish community and wounding five police officers in the attacks. (AP Photo / TV2 Norway) NORWAY OUT - DENMARK OUT - TV OUT" /></a></p>
<p class="caption">The body of a shooting suspect lies on the pavement as Danish forensic police officers examine the scene, Feb. 15, 2015, Copenhagen Denmark.<p class='caption source pullright' style=''>Photo: TV2 Norway/AP</p></div>
<h4>5. Shootings in Paris (Charlie Hebdo and Jewish supermarket): January 7-9, 2015</h4>
<p><strong>Victims</strong>: 17 dead. 20 wounded.<br />
<strong>Perpetrators</strong>: Chérif Kouachi (32; French), Saïd Kouachi (34; French), Amedy Coulibaly (32; French).<br />
<strong>Weapons</strong>: Assault rifles, submachine guns, grenade launcher, pistols, shotgun.</p>
<p><strong>Known to authorities</strong>? Chérif Kouachi was <a href="http://www.bbc.com/news/world-europe-30722038">well-known</a> to French security agencies as an Islamic extremist. In 2005 he was detained trying to board a plane for Syria and in 2008 he was jailed for three years for his role in sending militants to Iraq. Both Chérif and his brother Saïd were alleged to have been involved in a 2010 plot to free from prison Smaïn Ait Ali Belkacem, the French-Algerian extremist responsible for the 1995 Paris metro station bombing. The brothers were never prosecuted over the prison-break plot due to a lack of evidence. In 2011, Saïd traveled to Yemen and allegedly trained with al Qaeda. The U.S. <a href="http://www.wsj.com/articles/u-s-shared-intelligence-with-french-about-paris-brothers-yemen-trip-1420844151">reportedly</a> provided France with intelligence in 2011 showing the brothers received terrorist training in Yemen and French authorities monitored them until the spring of 2014. Amedy Coulibaly was also well-known to the authorities. In 2013 he was sentenced to five years in prison for providing ammunition as part of the 2010 prison-break plot that the Kouachi brothers were also suspected of involvement in. However, Coulibaly <a href="http://www.tabletmag.com/scroll/188518/kosher-supermarket-gunman-caught-on-tape-casing-jewish-school-in-august">reportedly</a> only spent about three months in jail and was released in March 2014.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/01/paris-attack-charlie-hebdo.jpg"><img class="aligncenter size-article-large wp-image-11598" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/01/paris-attack-charlie-hebdo-1000x557.jpg" alt="paris-attack-charlie-hebdo" /></a></p>
<p class="caption">Screen grab of the attack on Charlie Hebdo magazine, Paris, France, Jan. 7, 2015.<p class='caption source pullright' style=''>Photo: Youtube</p></div>
<h4>6. Cafe seige, Sydney, Australia: December 15-16, 2014</h4>
<p><strong>Victims: </strong>Two dead. Four wounded.<br />
<strong>Perpetrator: </strong>Man Haron Monis (50; Iranian-Australian).<br />
<strong>Weapon</strong>: Shotgun.</p>
<p><strong>Known to authorities? </strong>Two months prior to taking 17 people hostage in a Sydney cafe, Monis <a href="http://www.abc.net.au/news/2015-05-28/sydney-siege-man-monis-letter-not-threatening-george-brandis/6502582">wrote a letter</a> to Australia&#8217;s attorney general seeking advice about the legality of communicating with ISIS. He was &#8220;<a href="http://edition.cnn.com/2014/12/15/world/asia/australia-hostage-taker/index.html%20">well-know</a><a href="http://edition.cnn.com/2014/12/15/world/asia/australia-hostage-taker/index.html%20">n</a>&#8221; to federal and state police, as well as the Australian Security Intelligence Organization, and had sent “hate letters” to families of Australian soldiers killed in overseas conflicts. Before carrying out his attacks, Monis <a href="http://www.theguardian.com/australia-news/2014/dec/21/sydney-siege-anonymous-warning-about-man-haron-monis-followed-up-says-pm">apparently</a> pledged allegiance on his website to Islamic State leader Abu Bakr al-Baghdadi. This was reported to Australian authorities, who reviewed Monis&#8217; website and social media posts but (erroneously) concluded he was unlikely to carry out an act of violence.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/sydney-cafe-attack.jpg"><img class="aligncenter size-article-large wp-image-43405" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/11/sydney-cafe-attack-1000x743.jpg" alt="FILE - In this Dec. 15, 2014 file photo, a hostage runs to an armed tactical response police officers for safety after she escaped from a cafe under siege at Martin Place in the central business district of Sydney, Australia.  The man who took 18 people hostage at a Sydney cafe last year was educated and erratic, secretive about his own life and public about his many grievances, and a self-obsessed fabulist who grew increasingly defiant as he edged closer to launching his deadly attack, lawyers told an inquest Monday, May 25, 2015. (AP Photo/Rob Griffith, File)" /></a></p>
<p class="caption">A hostage runs toward tactical response police officers after escaping from a cafe under siege in the central business district of Sydney, Australia, Dec. 15, 2014.<p class='caption source pullright' style=''>Photo: Bob Griffith/AP</p></div>
<h4>7. Canada attacks (Quebec car ramming and parliament shooting): October 20 and 22, 2014</h4>
<p><strong>Victims: </strong>Two dead. Four injured.<br />
<strong>Perpetrators: </strong>Michael Zehaf-Bibeau (32; Canadian-Libyan) and Martin Couture-Rouleau (25; Canadian).<br />
<strong>Weapons</strong>: Rifle, car.<strong> </strong></p>
<p><strong>Known to authorities? </strong>Couture-Rouleau was known to Canadian authorities prior to an attack in which he rammed two Canadian soldiers, killing one and injuring another. He had <a href="http://www.cbc.ca/news/canada/who-is-martin-couture-rouleau-1.2807285">reportedly</a> been “considered some kind of threat by the Canadian government” and had posted a variety of pro-jihadi materials on his Facebook page. Police had been monitoring him over concerns that he had become radicalized and his passport had been seized to prevent him from traveling abroad to join militants. Zehaf-Bibeau, who shot dead a soldier at a war memorial near the Canadian parliament, was a habitual offender who had a criminal record for a number of offenses, including robbery and drug possession. Zehaf-Bibeau was <a href="http://www.theglobeandmail.com/news/national/mps-head-back-to-work-morning-after-ottawa-shooting/article21254540/">reportedly</a> “on the radar” of federal authorities in Canada and his email address had been previously <a href="http://www.bbc.com/news/world-us-canada-29747349">found</a> on the computer hard drive of someone charged with a &#8220;terrorist-related offense.”</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/canada-shooting.jpg"><img class="aligncenter size-article-large wp-image-43413" src="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/canada-shooting-1000x667.jpg" alt="Image #: 32693473    OTTAWA, CANADA - OCTOBER 22: Police, bystanders and soldiers aid a fallen soldier at the War Memorial as police respond to an apparent terrorist attack  on October 22, 2014 in Ottawa, Canada.  A GUNMAN is believed to have shot a soldier as he was standing guard at the National War Memorial in Ottawa, Canada, this morning (Wednesday, October 22). It is believed police then chased the man into the main parliament building at Parliament Hill, where more shots were fired. Police are hunting the streets and buildings for further suspects and have asked the public to stay away from the area. There is also a report of shootings at the Rideau Centre mall in downtown, a short distance from the War Memorial. The wounded soldier was taken into an ambulance and treated by medical personnel and is condition is unclear. The incident comes after Canada raised its terror threat level from low to medium after a Muslim convert deliberately ran over two soldiers, killing one of them.     Wayne Cuddington/Barcroft Media /Landov" /></a></p>
<p class="caption">Police, bystanders and soldiers aid a fallen soldier at the National War Memorial in Ottawa, Canada, the site of an apparent terrorist attack, Oct. 22, 2014.<p class='caption source pullright' style=''>Photo: Cuddington/Barcroft Media /Landov</p></div>
<h4>8. Jewish Museum killings in Brussels: May 24, 2014</h4>
<p><strong>Victims</strong>: Four dead.<br />
<strong>Perpetrator</strong>: Mehdi Nemmouche (29; French)<br />
<strong>Weapons</strong>: Automatic rifle, handgun.</p>
<p><strong>Known to authorities?</strong> Nemmouche had been incarcerated on five occasions in France for various crimes, including armed robbery. In 2013 he had traveled to Syria. When he returned to Europe he was <a href="http://www.theguardian.com/world/2014/jun/01/suspect-arrest-brussels-jewish-museum-shooting">reportedly</a> placed under surveillance by French counterterrorism police, who suspected he had joined with Islamic extremist fighters while in Syria.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/brussels-shooting.jpg"><img class="aligncenter size-article-large wp-image-43414" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/brussels-shooting-1000x653.jpg" alt="A forensic expert enters the site of a shooting, at the Jewish museum in Brussels, Saturday, May 24, 2014. Three people were killed and one seriously injured in a spree of gunfire at the Jewish Museum in Brussels on Saturday, officials said. The attack, which came on the eve of national and European Parliament elections, led officials to raise anti-terror measures.(AP Photo/Yves Logghe)" /></a></p>
<p class="caption">A forensic expert enters the Jewish Museum in Brussels, May 24, 2014.</p>
<p><p class='caption source pullright' style=''>Photo: Yves Logghe/AP</p></div>
<h4><strong>9. Beheading in Woolwich, London: May 22, 2013</strong></h4>
<p><strong>Victims: </strong>One dead.<br />
<strong>Perpetrators: </strong>Michael Adebolajo (28; British-Nigerian) and Michael Adebowale (22; British-Nigerian).<br />
<strong>Weapons: </strong>Cleaver, knives, pistol.</p>
<p><strong>Known to authorities?</strong> Both attackers were known to British authorities and were suspected of having been radicalized prior to their murder of soldier Lee Rigby in Woolwich, London. According to a <a href="https://b1cba9b3-a-5e6631fd-s-sites.googlegroups.com/a/independent.gov.uk/isc/files/20141125_ISC_Woolwich_Report(website).pdf?attachauth=ANoY7cq3E1O04fJFjoWNcuf9fkcB1XjdgxTUIAmUN7Y-3XuwamJVWfcwKKdAX_H47GOiGw5hYUb7OS4AubuVb2658ZTmbCYn78vTj_14RxTZehqgKXY8snZHSYs6vMOnKbt45fFuHoohOadv40Yv2rV_C5ibegN1n6HNYw1qwGo-Fx83zW6AZcKPbdK2wPJSUjfxbwobzIPfPvS7vnbWQ3WegUH7mBSVgaa59o0Yiy4QbPX7CTzHg46Wk9Tr6qFgk36dXJCWhSYo&amp;attredirects=0">U.K. parliamentary report</a> published following the attack, Adebolajo was investigated under five separate police and security service operations. He was believed to have links to several extremist networks and was suspected of having tried to travel overseas to join a terrorist organization. Adebowale was investigated by British spies after he was identified as having viewed extremist material online. London counterterrorism police also received an uncorroborated tip that Adebowale was affiliated with al Qaeda. Investigators reviewed Adebowale&#8217;s cellphone records and apparently did not find anything of interest. But they did not check his landline call records, which if they had would have revealed that he had been in contact with an individual in Yemen linked to al Qaeda. Covert surveillance of both Adebolajo and Adebowale had ceased prior to their attack in London in May 2013, though Adebowale was still the subject of a terrorism-related investigation at the time.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'> <a href="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/woolwich-attack.jpg"><img class="aligncenter size-article-large wp-image-43410" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/woolwich-attack-1000x642.jpg" alt="Image #: 22463877    epa03712953 A British police officer carries a knife in an evidence bag close to the scene where a soldier was murdered in John Wilson Street, Woolwich, south-east London, Britain, 23 May 2013. Two attackers with kitchen knives killed a British soldier on a street 22 May in south-east London afternoon in a case that police were treating as a suspected terrorist attack. Metropolitan Police Commissioner Sir Bernard Hogan-Howe said officers from the counterterrorist unit were leading the investigation into the 'shocking and horrific' slaying in Woolwich with two people arrested. British Prime Minister David Cameron, who was in Paris for a meeting with French President Francois Hollande, cut short the visit to return to London later 22 May. He called the incident 'shocking' and ordered a crisis meeting to coordinate British government response. British Home Secretary Theresa May led a meeting of the government's emergency response committee, with another meeting planned for 23 May.  EPA/FACUNDO ARRIZABALAGA /LANDOV" /></a></p>
<p class="caption">A British police officer carries an evidence bag containing a knife near the scene where a soldier was murdered in Woolwich, Britain, May 23, 2013. <p class='caption source pullright' style=''>Photo: Facundo Arrizabalaga/EPA /Landov</p></div>
<h4>10. Boston Marathon bombing: April 15, 2013</h4>
<p><strong>Victims:</strong> Five dead. 260+ wounded.<br />
<strong>Perpetrators:</strong> Dzhokhar Tsarnaev (19; Kyrgyzstani-American) and Tamerlan Tsarnaev (26; Kyrgyzstani-American).<br />
<strong>Weapons:</strong> Pressure-cooker bombs, semi-automatic pistol, improvised explosive devices.</p>
<p><strong>Known to authorities?</strong> Dzhokhar&#8217;s older brother, Tamerlan, who orchestrated the attacks, was <a href="http://www.nytimes.com/2013/04/25/us/tamerlan-tsarnaev-bomb-suspect-was-on-watch-lists.html?_r=0">placed on two different U.S. government watchlists</a> in late 2011. Russian security agency FSB tipped off the FBI and CIA in 2011 that Tamerlan “was a follower of radical Islam,” and he and his family were subsequently interviewed by American agents, according to the <a href="http://www.huffingtonpost.com/huff-wires/20130420/us-boston-marathon-2011-investigation/?utm_hp_ref=green&amp;ir=green">Associated Press</a>. The CIA <a href="http://www.nytimes.com/2013/04/25/us/tamerlan-tsarnaev-bomb-suspect-was-on-watch-lists.html?_r=0">reportedly</a> “cleared [Tamerlan] of any ties to violent extremism” two years before he and his younger brother carried out the bombing of the marathon.</p>
<div class='img-wrap align-center width-fixed' style='width:1000px'><br />
<a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/boston-marathon-explosion.jpg"><img class="aligncenter size-article-large wp-image-43409" src="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/boston-marathon-explosion-1000x620.jpg" alt="Image #: 21996457    Runners continue to run towards the finish line of the Boston Marathon as an explosion erupts near the finish line of the race in this photo exclusively licensed to Reuters by photographer Dan Lampariello after he took the photo in Boston, Massachusetts, April 15, 2013. Two simultaneous explosions ripped through the crowd at the finish line of the Boston Marathon on Monday, killing at least two people and injuring dozens on a day when tens of thousands of people pack the streets to watch the world famous race.  REUTERS EXCLUSIVE     REUTERS/Dan Lampariello  (UNITED STATES - Tags: CRIME LAW SPORT ATHLETICS TPX IMAGES OF THE DAY ) MANDATORY CREDIT: REUTERS /STRINGER /LANDOV" /></a></p>
<p class="caption">Boston Marathon participants run toward the finish line as an explosion erupts at the race, Boston, Mass., April 15, 2013.</p>
<p><p class='caption source pullright' style=''>Photo: Dan Lampariello/Reuters /Landov</p></div>
<p>Sign up for The Intercept Newsletter <a href='https://theintercept.us11.list-manage.com/subscribe?u=43fc0c0fce9292d8bed09ca27&id=e00a5122d3'>here</a>.</p><p>The post <a rel="nofollow" href="https://theintercept.com/2015/11/18/terrorists-were-already-known-to-authorities/">From Paris to Boston, Terrorists Were Already Known to Authorities</a> appeared first on <a rel="nofollow" href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://theintercept.com/2015/11/18/terrorists-were-already-known-to-authorities/feed/</wfw:commentRss>
		<slash:comments>91</slash:comments>
	
		<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/map-3-440x440.png" />
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/map-3.png" medium="image">
			<media:title type="html">map-3</media:title>
			<media:description type="html">Map of 10 recent attacks carried out in Western democracies by Islamic extremists.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/map-3-440x440.png" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/paris-attack-nov2015.jpg" medium="image">
			<media:title type="html">APTOPIX France Paris Shootings</media:title>
			<media:description type="html">Rescue workers gather at victims in the 10th district of Paris, Friday, Nov. 13, 2015. (AP Photo/Jacques Brinon)</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/paris-attack-nov2015-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/thalys-train-attack.jpg" medium="image">
			<media:title type="html">FRANCE-TRAIN-ATTACK</media:title>
			<media:description type="html">French police stand guard along the platform next to a Thalys train of French national railway operator SNCF at the main train station in Arras, northern France, on August 22, 2015, the day after an armed gunman on the train was overpowered by passengers. The gunman opened fire on the train travelling from Amsterdam to Paris, injuring two people before being tackled by several passengers including off-duty American servicemen.</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/11/thalys-train-attack-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/11/Curtis-Culwell-Center-shooting.jpg" medium="image">
			<media:title type="html">Two Gunmen Killed Outside Mohammed Cartoon Contest Event In Texas</media:title>
			<media:description type="html">A member of the FBI Evidence Response Team investigates the crime scene outside of the Curtis Culwell Center after a shooting occurred the day before, on May 04, 2015 in Garland, Texas. (Photo by Ben Torres/Getty Images)</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/11/Curtis-Culwell-Center-shooting-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/copenhagen-shooting.jpg" medium="image">
			<media:title type="html">Denmark Shots</media:title>
			<media:description type="html">Screen grab of the body of a shooting suspect lays on the pavement as Danish police forensic officers examine the scene, Feb. 15, 2015, Copenhagen Denmark.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/copenhagen-shooting-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/01/paris-attack-charlie-hebdo.jpg" medium="image">
			<media:title type="html">paris-attack-charlie-hebdo</media:title>
			<media:description type="html">Screen grab of attack on magazine Charlie Hebdo, Paris, France January 7, 2015</media:description>
			<media:thumbnail url="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/01/paris-attack-charlie-hebdo-150x150.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/sydney-cafe-attack.jpg" medium="image">
			<media:title type="html">Australia Sydney Siege</media:title>
			<media:description type="html">A hostage runs to an armed tactical response police officers for safety after she escaped from a cafe under siege at Martin Place in the central business district of Sydney, Australia, Dec. 15, 2014.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/sydney-cafe-attack-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/canada-shooting.jpg" medium="image">
			<media:title type="html">CANADIAN FORCES SOLDIER SHOT AT OTTAWA&#8217;S NATIONAL WAR MEMORIAL BEFORE GUNMEN OPEN FIRE IN PARLIAMENT</media:title>
			<media:description type="html">Police, bystanders and soldiers aid a fallen soldier at the War Memorial as police respond to an apparent terrorist attack on October 22, 2014 in Ottawa, Canada.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/canada-shooting-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/brussels-shooting.jpg" medium="image">
			<media:title type="html">Belgium Shooting</media:title>
			<media:description type="html">A forensic expert enters the site of a shooting, at the Jewish museum in Brussels, Saturday, May 24, 2014.</media:description>
			<media:thumbnail url="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/11/brussels-shooting-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/woolwich-attack.jpg" medium="image">
			<media:title type="html">MAN SLAIN IN &#8220;BARBARIC&#8221; KNIFE ATTACK ON LONDON STREET</media:title>
			<media:description type="html">British police officer carries a knife in an evidence bag close to the scene where a soldier was murdered in John Wilson Street, Woolwich, Britain, 23 May 2013.  23 May.  EPA/FACUNDO ARRIZABALAGA /LANDOV</media:description>
			<media:thumbnail url="https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/11/woolwich-attack-440x440.jpg" />
		</media:content>
		<media:content url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/boston-marathon-explosion.jpg" medium="image">
			<media:title type="html">RUNNERS CONTINUE TO RUN TOWARDS THE FINISH LINE AS AN EXPLOSION ERUPTS AT THE FINISH LINE OF THE BOSTON MARATHON</media:title>
			<media:description type="html">Runners continue to run towards the finish line of the Boston Marathon as an explosion erupts near the finish line of the race, Boston, Massachusetts, April 15, 2013.</media:description>
			<media:thumbnail url="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/11/boston-marathon-explosion-440x440.jpg" />
		</media:content>
<leadImageArt>https://theintercept.com/wp-uploads/sites/1/2015/11/paris-attack02.jpg</leadImageArt><leadImageArtCredit>Photo: Tolga Akmen/London News/Zuma Press</leadImageArtCredit>	</item>
	</channel>
</rss>
