Lavabit was under FBI pressure to decrypt Snowden connections, court reveals

Lavabit home

When Lavabit shut down in the wake of Edward Snowden’s leaks, it left a big question unanswered: just what did the US government want that was supposedly so egregious? Thanks to newly unsealed court documents obtained by Wired, we now know much more of the story. The FBI had served Lavabit an order requiring that it hand over Snowden’s encryption keys, helping the agency install a device that would collect metadata from its suspect’s email connections. Lavabit repeatedly turned down the requests since it could have given access to data from every user of the service — at one point it did serve up the SSL keys, but printed out on 11 pages in 4pt type — which led to threats of criminal contempt charges and fines. We all know what happened afterward — company founder Ladar Levison chose to shutter Lavabit rather than comply with the FBI’s demands. While the new details aren’t shocking given the government’s desire to catch Snowden, they help explain Levison’s past statements; he felt that it was better to defend Lavabit in court than risk violating the privacy of his customers.

Filed under:

Comments

Source: Wired

NYT: NSA monitors, graphs some US Citizens’ social activity with collected metadata

Just how does the NSA piece together all that metadata it collects? Thanks to “newly disclosed documents and interviews with officials,” The New York Times today shed light on how the agency plots out the social activity and connections of those it’s spying on. Up until 2010, the NSA only traced and analyzed the metadata of emails and phone calls from foreigners, so anything from US citizens in the chains created stopgaps. Snowden-provided documents note the policy shifted later in that year to allow for the inclusion of Americans’ metadata in such analysis. An NSA representative explained to the NYT that, “all data queries must include a foreign intelligence justification, period.”

During “large-scale graph analysis,” collected metadata is cross-referenced with commercial, public and “enrichment data” (some examples included GPS locations, social media accounts and banking info) to create a contact chain tied to any foreigner under review and scope out its activity. The highlighted ingestion tool in this instance goes by the name Mainway. The NYT article also highlights a secret report, dubbed “Better Person Centric Analysis,” which details how data is sorted into 164 searchable “relationship types” and 94 “entity types” (email and IP addresses, along with phone numbers). Other documents highlight that during 2011 the NSA took in over 700 million phone records daily on its own, along with an “unnamed American service provider” that began funneling in an additional 1.1 billion cellphone records that August. In addition to that, Snowden’s leak of the NSA’s classified 2013 budget cites it as hoping to capture “20 billion ‘record events’ daily” that would be available for review by the agency’s analysts in an hour’s time. As you might expect, the number of US citizens that’ve had their info bunched up into all of this currently remains a secret — national security, of course. Extended details are available at the source links.

Filed under: ,

Comments

Via: The Verge

Source: New York Times

Snowden leak suggests UK was spying on Belgian telecom

Snowden leaks suggest UK was spying on Belgian telecom, not NSA

When Belgian prosecutors suggested that Belgacom was the target of foreign espionage, many blamed the NSA — it has a history of snooping on other countries, after all. Those accusations may have been off the mark, however. Der Spiegel has revealed documents leaked by Edward Snowden which hint that the UK’s Government Communications Headquarters (GCHQ) was responsible. The intelligence agency reportedly tricked key Belgacom staff into visiting a malware-loaded website that hijacked their PCs. GCHQ could then spy on smartphones, map the network and investigate secure VPN connections. Neither Belgacom nor Belgium has responded to this latest Snowden leak, but we wouldn’t be surprised if the apparent evidence speeds up their investigation.

Filed under: , ,

Comments

Via: Ars Technica

Source: Der Spiegel (translated)

American and British spy agencies can thwart internet security and encryption

American and British spy agencies can thwart internet security and encryption

As reporters at the New York Times, the Guardian and ProPublica dig deeper into the documents leaked by Edward Snowden, new and disturbing revelations continue to be made. Two programs, dubbed Bullrun (NSA) and Edgehill (GCHQ), have just come to light, that focus on circumventing or breaking the security and encryption tools used across the internet. The effort dwarfs the $20 million Prism program that simply gobbled up data. Under the auspices of “Sigint (signals intelligence) enabling” in a recent budget request, the NSA was allocated roughly $255 million dollars this year alone to fund its anti-encryption program.

The agencies’ efforts are multi-tiered, and start with a strong cracking tool. Not much detail about the methods or software are known, but a leaked memo indicates that the NSA successfully unlocked “vast amounts” of data in 2010. By then it was already collecting massive quantities of data from taps on internet pipelines, but much of it was safely protected by industry standard encryption protocols. Once that wall fell, what was once simply a torrent of scrambled ones and zeros, became a font of “exploitable” information. HTTPS, VoIP and SSL are all confirmed to have been compromised through Bullrun, though, it appears that some solutions to the NSA’s “problem” are less elegant than others. In some cases a super computer and simple brute force are necessary to peel back the layers of encryption.

Filed under:

Comments

Source: New York TImes, Guardian, ProPublica

Report: NSA used taxpayer dollars to cover PRISM compliance costs for tech companies

Report NSA used taxpayer dollars to cover PRISM compliance costs for tech companies

The mounting national debt? Yeah, you’re probably better off just ignoring why exactly it’s mounting. The Guardian is continuing the blow the lid off of the whole NSA / PRISM saga, today revealing new documents that detail how the NSA paid out “millions” of dollars to cover PRISM compliance costs for a multitude of monolithic tech outfits. As the story goes, the National Security Agency (hence, tax dollars from American taxpayers) coughed up millions “to cover the costs of major internet companies involved in the PRISM surveillance program after a court ruled that some of the agency’s activities were unconstitutional.” The likes of Yahoo, Google, Microsoft and Facebook are expressly named, and while Google is still angling for permission to reveal more about its side of the story, other firms have conflicting tales.

For whatever it’s worth, a Yahoo spokesperson seemed a-okay with the whole ordeal, casually noting that this type of behavior is perfectly legal: “Federal law requires the US government to reimburse providers for costs incurred to respond to compulsory legal process imposed by the government. We have requested reimbursement consistent with this law.” Meanwhile, Facebook stated that it had “never received any compensation in connection with responding to a government data request.” Microsoft, as you might imagine, declined to comment, though we heard that Steve Ballmer could be seen in the distance throwing up a peace sign. At any rate, it’s fairly safe to assume that your worst nightmares are indeed a reality, and you may have a far more enjoyable weekend if you just accept the fact that The Man knows everything. Better, right?

Filed under: ,

Comments

Source: The Guardian

Lavabit founder chafes under NSA scrutiny, speaks out against govermental privacy violations

Lavabit founder chafes under NSA scrutiny, speaks out against govermental privacy violations

Lavabit shut down its email services a couple weeks ago in response to governmental pressure regarding NSA whistleblower Edward Snowden’s account. At the time, founder Ladar Levison stated he was shutting down Lavabit because he didn’t want to “become complicit in crimes against the American people,” but didn’t expound upon what that statement meant due to a governmental gag order. The Guardian spoke with Levison recently, however, and while he still didn’t deliver details about his legal dealings with Uncle Sam, he did share some thoughts about governmental surveillance in general.

As you might expect, Levison is against ubiquitous governmental surveillance of communications between citizens. To that end, he’s calling for a change to be made in US law so that private and secure communications services can operate without being used as “listening posts for an American surveillance network.” He’s not wholly against the feds tapping phone lines, though, as he recognizes the role such surveillance plays in law enforcement. However, he thinks the methods that are being used to conduct that surveillance should be made public — not an unreasonable request, by any means. You can read Levison’s full take on the matter, along with a recounting of reasons behind Lavabit’s creation at the source below.

Filed under: ,

Comments

Source: The Guardian

Leaked NSA audit shows privacy violations in cellular and fiber optic surveillance

NSA seal

The NSA insists that it respects American privacy, but documents leaked by Edward Snowden to the Washington Post suggest that the agency has trouble maintaining that respect. A May 2012 audit, buried in the documents, 2,776 incidents where the NSA’s Washington-area facilities inadvertently obtained protected American data through a mix of human errors and technical limits. Among its larger gaffes, the NSA regularly had problems determining when foreign cellphones were roaming in the US, leading to unintentional snooping on domestic calls. The agency also spent months tapping and temporarily storing a mix of international and domestic data from US fiber lines until the Foreign Intelligence Surveilliance Court ruled that the technique was unconstitutional. NSA officials responding to the leak say that their agency corrects and mitigates incidents where possible, and argue that it’s difficult for the organization to avoid errors altogether. However, the audit also reveals that the NSA doesn’t always report violations to overseers — the division may be interested in fixing mistakes, but it’s not eager to mention them.

Filed under: , ,

Comments

Via: GigaOM

Source: Washington Post

Lavabit, reportedly Edward Snowden’s email service of choice, shuts down

It looks like Edward Snowden is going to have to find a new email service as the one he supposedly used — Lavabit — has abruptly closed its doors. The company’s owner, Ladar Levison, posted an open letter on the site today, saying, “I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit.” Levison also claimed to be unable to speak to the specifics surrounding the situation, stating that a Congressionally approved gag order prevented him from doing so. While Lavabit’s situation seems pretty dire, it might not be curtains just yet. In his message, Levison stated that he would take his fight to reinstate Lavabit to the Fourth Circuit Court of Appeals. To read the missive in full, head on over to the source link below.

Filed under:

Comments

Via: Boing Boing

Source: Lavabit

Snowden leaves neutral confines of Moscow airport, enters Russia

Edward Snowden has finally escaped his month-long Moscow airport purgatory and arrived in Russian territory, according to the Associated Press. The NSA whistleblower had already been granted temporary asylum by the Putin-led government after Bolivia and Venezuela also offered to take the fugitive, and was awaiting paperwork in order to leave Sheremetyevo Airport. The NSA’s arch-enemy will be granted a year’s stay, according to his Russian lawyer, and will be able to re-apply to remain after that. Now that his Russian residency has been established, most press outlets expect a strong reaction from the US government after it assured Moscow that Snowden wouldn’t face the death penalty if deported. For its part, Russia said it has no intention of handing over the man who blew the lid off the pervasive PRISM monitoring program.

Filed under:

Comments

Source: AP (Twitter), WSJ

The Guardian: NSA’s XKeyscore tool is its ‘widest reaching’ system for collecting online data

The Guardian NSA's XKeyscore tool is its 'widest reaching' system for collecting online data

Edward Snowden has said that he still has more information about the NSA than what he’s already leaked, and we’re now getting a look at another big piece of that. According to a new set of documents provided to The Guardian, the NSA is using a tool called XKeyscore that is said to be its “widest reaching” system for collecting information from the internet — one that lets it examine “nearly everything a typical user does on the internet,” as one presentation slide explains. That apparently includes both metadata and the contents of emails, as well as social media activity, which can reportedly be accessed by NSA analysts without prior authorization; as The Guardian notes, a FISA warrant is required if the target of the surveillance is a US citizen, but not if a foreign target is communicating with an American.

According to The Guardian, the amount of data collected is so large that content is only able to stored in the system for three to five days, or as little as 24 hours in some cases, while metadata is stored for 30 days. That’s reportedly led the NSA to develop a multi-tiered system that lets it move what’s described as “interesting” content to other databases where it can be stored for as much as five years. In a statement provided to The Guardian, the NSA says that “XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system,” and that “allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks.” The agency further adds that “every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.”

Filed under:

Comments

Source: The Guardian, NSA