The Edward Snowden Affair (16 page)

Read The Edward Snowden Affair Online

Authors: Michael Gurnow

Tags: #History, #Legal, #Nonfiction, #Political, #Retail

BOOK: The Edward Snowden Affair
11.84Mb size Format: txt, pdf, ePub

If American Bob is on vacation in France and emails American Mary, they may be surveilled. If Bob is in San Francisco and Mary is in New York their conversation can be recorded if an analyst isn’t able to determine where Bob’s telephone is transmitting from or easily locate Mary’s naturalization papers. Also, if Bob is believed to be associated with a foreign political group after posting on a socialist Internet forum based in Venezuela, has a foreign telephone account or utilizes a non-domestic email service, he may become a suspect. Anyone who has electronically “friended” a non-American can be made a target. It is clear that under this policy, reverse targeting can occur. If a person of potential interest does not elicit lawful targeting, all an analyst needs to do is look at the web of associations and find one foreign contact at a distance of two or fewer hops to substantiate an investigation upon the otherwise legally-protected individual. Once the American’s identity is removed, collected data can be disseminated to other agencies or “friendly governments.” After Bob and Mary’s names are removed from their emailed love letter, the NSA can hand it over to the CIA, FBI or GCHQ with no questions asked.

Once a person is verified to be within the United States, all targeting is to cease, with the exception of bulk data collection. The NSA is permitted to retain non- and American information using this method based upon the premise that the intelligence agency is unable to filter the two types of communication. If the NSA dragnets American “backbone” hubs, this would permit almost all American communications to be collected with impunity. Contrary to Clapper’s claims, if it is later revealed during “post-target analysis” that a subject was within the U.S. during transmission or interception, the accrued information is granted grandfather amnesty and retained for review. All of this directly contradicts Obama and the intelligence community’s reassurances that the U.S. government cannot use purloined domestic data without individual, court-issued consent.

The most condemning passage found in the disclosures is the only one marked “Top Secret” within a document already labeled “Top Secret.” It reads, “In addition, in those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country. In either event, NSA will direct surveillance at a party to the communication reasonably believed to be outside the United States.” By being allowed to “acquire communication
about
[my emphasis] the target” that is not “to or from” the suspect, an analyst is given license to follow leads that do not necessarily begin outside the United States but “terminate in a foreign country.” The only way to determine if communications are “about” a target is to collect bulk data and analyze the contents.

Greenwald closes by mindfully stepping back to provide a comprehensive picture of the legal implications. Holder’s orders force the PRISM-affiliated companies to surrender all data for anyone who falls under these 2009 provisions. Under these clauses, American information is freely handed over without a warrant. In many respects, “The top secret rules that allow NSA to use US data without a warrant” is the most condemning article to date because when placed alongside the NSA’s “hopping” protocol, on paper the NSA has the right to surveil most every American due to happenstance association.

Almost seven hours after Gellman’s PRISM rewrite appeared—complemented by
The Guardian
’s “UK gathering secret intelligence via covert NSA operation,” both of which implicated GCHQ in the espionage controversy—sensing its association with the NSA and its own intelligence programs might be further comprised, the British government issued a “D-Notice” to the English press.
54
A “D-Notice” or “Defence Advisory Notice” is an official request for the media to remain silent on an issue pertaining to national security. The nonSnowden-leaked D-Notice reads, in part, “Although none of these recent articles has contravened any of the guidelines contained within the Defence Advisory Notice System, the intelligence services are concerned that further developments of this same theme may begin to jeopardize both national security and possibly UK personnel.”
55
A day after the island nation learned the whistleblower’s identity, British authorities sought retribution by issuing a global travel alert. It instructed airlines around the world to deny Snowden flight privileges because “the individual is highly likely to be refused entry to the U.K.”
56
The warning was largely symbolic because Britain could not force non-English airports to comply (merely charge a reimbursement fee of $3,100 for detention and removal of Snowden if he stepped foot on British soil), nor did it reasonably believe Snowden would be foolish enough to enter the country. Snowden would have his just desserts 11 days later. It was now 11 days later.

As Washington was kept busy by yet another Greenwaldsponsored media blitz,
The Guardian
returned its attention to Britain. Greenwald passed the journalistic baton back to MacAskill’s team, which gave Snowden a birthday present titled, “GCHQ taps fibre-optic cables for secret access to world’s communications.”
57
The journalists based their report on data Snowden had stolen while at Dell.
58
Predictably Washington knew restrictive legal hurdles would remain even if it used covert court orders to collect domestic information. It would be much more prudent to have another country spy on “foreign” America. The U.S. could then exchange foreign intelligence data to gain insight into its own citizenry.
59
That is exactly what it does with GCHQ’s Tempora program.

Even though GCHQ had copies of PRISM, it didn’t need it. Tempora debuted in 2008 before being fully inaugurated at the beginning of 2012. It is a program that vacuums everything that crosses fiber-optic cables, storing metadata for 30 days and live content for three, thereby granting ample time for the information to be categorized, analyzed and recorded. Its access points are intercept probes where transatlantic cables enter British shores. This includes cables used by American Internet servers.

After Americans had been allowed to use Tempora on a provisional basis, they were granted full access. By May 2012, 300 GCHQ and 250 NSA analysts were tasked with sifting through Tempora’s incoming data. Thirteen months later, Clapper would testify on national television, “We [the intelligence community] couldn’t do it [access, analyze, and record domestic data] even if we wanted to.”
60
Human sifting occurs after Tempora has winnowed frivolous information. Relevant data is captured using “selectors” chosen by both agencies.

Tempora’s aperture is wide. GCHQ chose 40,000 and the NSA 30,000 triggers. A “trigger” is a term or designation which, when found, culls the host document for further review. Each trigger adds another weave to the surveillance net. The denser the weave, the greater the amount of information is pulled out of the World Wide Web. Yahoo and Gmail use a similar program to scan the content of email in order to insert content-related advertising into user accounts.

The greater the number of triggers, the more data there is to analyze. Admittedly, even after filtration, the influx of information outpaces the joint effort. In 2012 GCHQ had taps on over 200 cables, cataloging the information as it went, but was only able to successfully analyze the contents of 46 lines. Each cable is able to process 21 petabytes a day. This is 192 times the amount of information found in all of the books in the British Library. The British Library houses over 150 million items. Due to bulk data analysis being labor and money intensive, Britain is increasing its storage capacity. If it cannot immediately analyze the data, it intends to keep it until it has the time and resources to do so.

GCHQ was not modest when outlining the program’s agenda. Two of its key components are titled “Mastering the Internet” and “Global Telecoms Exploitation.” Not to be outdone in respect to ambition, during a June 2008 visit overseas, General Alexander pondered, “Why can’t we collect all the signals all the time? Sounds like a good summer project for Menwith.” The quotation is included as a slogan on one of the disclosed Tempora slides.

Under the ruse of national self-defense, the countries have carte blanche license to gather anything and everything “foreign” to that particular country, including the contents of telephone calls and email messages, Facebook entries and browser history. In the event Holder’s disclosure is met with an American citizen who never leaves the country and has no foreign contacts, Britain is free to investigate the “foreigner” on America’s behalf. MacAskill reports that
The Guardian
was given to understand 850,000 NSA employees and contractors have access to GCHQ databases.
The Guardian
team leaves the reader to assume reciprocity applies to America’s surveillance records since England is a “friendly government.”

Like America, Britain also has domestic commercial “intercept partners”—BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel and Interoute—which comply under covert legal “agreements” complete with gag orders. Analogous to U.S. law, British wiretapping requires a signed warrant unless surveillance involves foreign communications, then a notarized blanket certificate suffices. A portion of domestic communications is conveniently relayed abroad before returning to Britain.

MacAskill conclusively documents America’s joint espionage enterprises with Britain. He also introduces a worldwide conspiracy which answers why GCHQ was not concerned about Canada or Australia during the G20 summits. The United States and England’s data sharing is not bilateral. They are only two of what is referred to as the “Five Eyes” of the world. Canada, Australia and New Zealand are included in the surveillance coop. (In intelligence terms, the United States is the first party, members of the Five Eyes are deemed second parties and all other nations are labeled third parties.)
61
In 2012 Britain reported it had the “biggest internet access” of any of the clandestine association’s members. This is due to location but also because Britain, in GCHQ’s attorneys’ words, has “a light oversight regime compared with the U.S.” As NSA analysts were being briefed on Tempora, when they asked what the legal limits of surveillance were in England, the Americans were informed it was “your call.”

The Five Eyes are not a recent surveillance development. They are an extension of post-World War II alliances between the five English-speaking countries. An intelligence exchange program was designed, agreed upon and signed in 1947. It was referred to as the “Secret Treaty.”
62

Of the various reactions to Tempora, the most adamant was Germany. In a matter of days, local newspapers reported one of the main cables connecting northern Germany to the United States was compromised at its British transition point. Federal Minister of Justice Sabine Leutheusser-Schnarrenberger referred to Tempora as a “nightmare.”
63
Berlin demanded legal justification for England’s actions. Jan Philipp Albrecht, German member of the European Parliament, requested infringement procedures begin because Article 16 of the Treaties of the European Union had been violated.
64
The United Nations (U.N.) had not been informed about Tempora and a vote had not been taken which permitted international surveillance.

Once it was established that GCHQ’s spying was not limited to isolated political events and operated at a level which made PRISM appear juvenile, as the world waited for more information about the other “three eyes” of global espionage, Snowden nodded his consent for the
SCMP
to continue its reporting on the NSA’s surveillance of China. On June 22, the day following the Tempora disclosures,
SCMP
premiered three articles.

Characteristically sparse, the Eastern periodical debuted “Snowden reveals more US cyberspying details”
65
and “US spies on Chinese mobile phone companies, steals SMS data”
66
an hour apart. The two exposés reveal the global telecommunications provider with over 46,000 kilometers of fiber-optic cable worldwide, Pacnet, had been mined by the NSA for its SMS data. SMS data is short for “small message service” and refers to the interception of millions of Chinese text messages. Pacnet’s headquarters are in Singapore and Hong Kong. The cable connects to data centers in mainland China, Hong Kong, Japan, Singapore, South Korea and Taiwan.

The NSA conducted its Pacnet espionage by exploiting technology gaps in American-made-and-sold Pacnet components which granted the agency backdoor access. The nation’s second-largest communications provider, China Unicom, finished replacing its American-made Cisco routers by Halloween 2012.
67
Through these deliberately flawed
68
products, the NSA had been spying on China Unicom’s 258 million users. Though China Unicom found this exploitation point on its own, Snowden’s disclosures undoubtedly spurred all Chinese technology firms to begin replacing and banning American communication hardware. But Snowden’s files were a double-edged sword. They also provided the Chinese government justification for implementing even stricter Internet controls.

“NSA targeted China’s Tsinghua University in extensive hacking attacks, says Snowden”
69
arrived a little under two hours later. The report focuses on NSA-led cyberespionage on the computers and servers at another central Asian hub, this time in mainland China: Tsinghua University in Beijing. As with Chinese University, because the data collected includes specific IP addresses, foreign possession of the data confirms NSA hacking. The revealed documents also show the attacks were focused efforts. Within a single day in January 2013, a minimum of 63 computers and servers had been compromised by the American agency. The U.S. intelligence community has a preoccupation with the Tsinghua system because it houses the world’s largest national research portal, the China Education and Research Network.

Other books

Jars of Clay by Lee Strauss
Hunters: A Trilogy by Rice, Paul A.
Scent of Darkness by Christina Dodd
Natural Blond Instincts by Jill Shalvis
Marked by Grief by Caitlin Ricci
Proposition by Unknown