Posts

The Rationale for NSA’s Bottomless Pit of Data: Hackers

In his must-read report on the bottomless data pit containing the NSA is building in Utah, James Bamford described the public explanations NSA Deputy Director Chris Inglis made when he broke ground on the facility.

[NSA deputy director Chris Inglis] arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agency’s associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed “the spy center.” Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? “Absolutely not,” he said with a self-conscious half laugh. “Nor do I want them spying on me.”

For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? [my emphasis]

Inglis used hackers as cover for a spying facility that would collect and decrypt “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter’.” That is, Inglis used the threat of hackers to cover up for the fact that the government was spying on everyone.

Mind you, this was back in January 2011–before Anonymous threatened to take the Toobz down at a time when a key Anonymous hacker was being run by the FBI. Indeed, Inglis used hackers as his excuse for collecting massive amounts of data on everyone in the thick of the WikiLeaks excitement.

Nevertheless, Bamford describes Inglis publicly misleading about the centrality of hackers in the purpose of the bottomless pit when in fact the purpose is far broader. Particularly given the FBI’s recently exposed role running hackers, Inglis’ “double-talk” raises real questions about all the fear-mongering about hackers.

Well, This Should Make the President-Elect More Anxious to Overturn Domestic Spying

Getting snooped on by Verizon employees…

Some Verizon Wireless employees accessed billing records from a cell phone President-elect Barack Obama had used, the Obama transition and Verizon Wireless said Thursday.

[snip]

Verizon Wireless CEO Lowell McAdam issued a statement apologizing to Obama. He also said that whether they were authorized or not, the employees who breached the president-elect’s account face possible disciplinary action and were immediately put on leave without pay. [my emphasis]

I’m sorry, Mr. McAdam. Are you suggesting these Verizon employees may have been authorized to access Obama’s records? By whom?

I’m preparing my Book Salon review for James Bamford’s Shadow Factory right now. (Bamford will be at FDL Sunday at 5PM ET.) And his story of Verizon’s Israeli-connected spooky side is way more troubling than the already troubling AT&T Israeli-connected spooky side.

Update: The CNN story on this makes it sound like the authorized v. unauthorized question pertains more to whether people had any business with Obama’s call records. Also note it says those involved were suspended with pay.

Verizon Wireless, meanwhile, has launched an internal probe to determine whether Obama’s information was simply shared among employees or whether "the information of our customer had in any way been compromised outside our company, and this investigation continues," McAdam said in an internal company e-mail obtained by CNN.

"Employees with legitimate business needs for access will be returned to their positions, while employees who have accessed the account improperly and without legitimate business justification will face appropriate disciplinary action," McAdam said, "up to and including termination." [my emphasis]