Posts Tagged ‘NSA electronic surveillance program’
Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using DROPOUT JEEP:
“DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”
The flowchart of how the NSA makes your iPhone its iPhone is presented below:
- NSA ROC operator
- Load specified module
- Send data request
- iPhone accepts request
- Retrieves required SIGINT data
- Encrypt and send exfil data
- Rinse repeat
Big Victory: Judge Pushes Jewel v. NSA Forward
We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.
This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.
This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.
In the NSA’s own words, EO 12333 is "the primary source of the NSA’s foreign intelligence-gathering authority."
Surveillance conducted under EO 12333 is implemented almost entirely by the executive branch, without review by Congress or the courts. EO 12333 lacks even the plainly inadequate legislative and judicial checks on the two more well-known surveillance authorities — Section 215 of the Patriot Act and the FISA Amendments Act.
- Legal Fact Sheet: Executive Order 12333; dated 19 June 2013
- Full Story w Links to Documents: New NSA Documents Shine More Light into Black Box of Executive Order 12333 | American Civil Liberties Union
The Fourth Amendment to the US Constitution:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
A list of what the NSA can actually do:
[BN: Full list edited to only those used against Americans]
- It can track the numbers of both parties on a phone call, as well location, time and duration. (More)
- It can set up fake internet cafes. (More)
- It can tap underwater fiber-optic cables. (More)
- It can track bank transactions. (More)
- It can monitor text messages. (More)
- It can access your email, chat, and web browsing history. (More)
- It can map your social networks. (More)
- It can access your smartphone app data. (More)
- It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
- It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
- It can set up a fake LinkedIn. (More)
- It can track the reservations at upscale hotels. (More)
- It can crack cellphone encryption codes. (More)
- It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access computers through radio waves on which it has already installed hidden devices.) (More)
- It can intercept phone calls by setting up fake base stations. (More)
- It can remotely access a computer by setting up a fake wireless connection. (More)
- It can install fake SIM cards to then control a cell phone. (More)
- It can fake a USB thumb drive that’s actually a monitoring device. (More)
- It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
- It can go into online games and monitor communication. (More)
- It can intercept communications between aircraft and airports. (More)
- It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
The NSA and their contractors are using our tax dollars to violate our freedoms while our elected representatives repeatedly fail to actually represent us.
America, as The New Atlantis? One question. Is The New New Atlantis taking applications?
See the Full Original List here: Obama Speech on NSA Reforms a Sad Joke, 4th Amendment Destruction Now Sealed With Presidential Approval | The Daily Sheeple
By JENNIFER BAIN
Last Updated: 6:18 PM, June 17, 2013
Police Commissioner Ray Kelly launched a stinging rebuke to the federal government’s secret phone and Internet monitoring campaign — and suggested leaker Edward Snowden was right about privacy “abuse.”
“I don’t think it ever should have been made secret,” Kelly said today, breaking ranks with US law-enforcement officials.
“I think the American public can accept the fact if you tell them that every time you pick up the phone it’s going to be recorded and it goes to be recorded and it goes to the government,” Kelly said. “I think the public can understand that. I see no reason why that program was placed in the secret category.”
“Secondly, I think if you listen to Snowden, he indicates that there’s some sort of malfeasance, people . . . sitting around and watching the data. So I think the question is: What sort of oversight is there inside the [National Security Agency] NSA to prevent that abuse, if it’s taking place?”
Kelly said of the leaker:
“He tried to give the impression, it seems to me, that these system administrators had carte blanche to do what they wanted to do,” he said. “I think it’s a problem if that’s in fact what’s happening.”