Congressional Rep. John Carter Discovers Encryption; Worries It May One Day Be Used On Computers To Protect Your Data

Here’s a suggestion: if you’re a Congressional Representative whose job it is to regulate all sorts of important things, and you state in a hearing “I don’t know anything about this stuff” before spouting off on your crazy opinions about how something must be done… maybe, just maybe educate yourself before confirming to the world that you’re ignorant of the very thing you’re regulating. We famously saw this during the SOPA debate, where Representatives seemed proud of their own ignorance. As we noted at the time, it’s simply not okay for Congress to be proud of their own ignorance of technology, especially when they’re in charge of regulating it. But things have not changed all that much apparently.

We already wrote about FBI Director James Comey’s bizarre Congressional hearing earlier this week, in which he warned those in attendance about the horrible world that faced us when the FBI couldn’t spy on absolutely everything. But the folks holding the hearing were suckers for this, and none more so than Rep. John Carter. The ACLU’s Chris Soghoian alerts us to the following clip of Carter at that hearing, which he says “is going to be the new ‘The Internet is a Series of Tubes'” video. I would embed the video, but for reasons that are beyond me, C-SPAN doesn’t use HTTPS so an embed wouldn’t work here (randomly: Soghoian should offer CSPAN a bottle of whiskey to fix that…).

Here’s the basic transcript though:

Rep. John Carter: I’m chairman of Homeland Security Appropriations. I serve on Defense and Defense subcommittees. We have all the national defense issues with cyber. And now, sir, on this wonderful committee. So cyber is just pounding me from every direction. And every time I hear something, or something just pops in my head — because I don’t know anything about this stuff. If they can do that to a cell phone why can’t they do that to every computer in the country, and nobody can get into it? If that’s the case, then that’s the solution to the invaders from around the world who are trying to get in here. [Smug grin]

FBI Director Comey: [Chuckle and gives smug, knowing grin]

Carter: Then if that gets to be the wall, the stone wall, and even the law can’t penetrate it, then aren’t we creating an instrument [that] is the perfect tool for lawlessness. This is a very interesting conundrum that’s developing in the law. If they, at their own will at Microsoft can put something in a computer — or at Apple — can put something in thatcomputer [points on a smartphone], which it is, to where nobody but that owner can open it, then why can’t they put it in the big giant super computers, that nobody but that owner can open it. And everything gets locked away secretly. And that sounds like a solution to this great cyber attack problem, but in turn it allows those who would do us harm [chuckles] to have a tool to do a great deal of harm where law enforcement can’t reach them. This is a problem that’s gotta be solved.

Link (Techdirt)

Dangerously Underpowered NSA Begging Legislators For Permission To Go To Cyberwar

NSA director Mike Rogers testified in front of a Senate committee this week, lamenting that the poor ol’ NSA just doesn’t have the “cyber-offensive” capabilities (read: the ability to hack people) it needs to adequately defend the US. How cyber-attacking countries will help cyber-defense is anybody’s guess, but the idea that the NSA is somehow hamstrung is absurd.

Yes, we (or rather, our representatives) are expected to believe the NSA is just barely getting by when it comes to cyber-capabilities. Somehow, backdoors in phone SIM cards, backdoors in networking hardware, backdoors in hard drives, compromised encryption standards, collection points on internet backbones, the cooperation of national security agencies around the world, stealth deployment of malicious spyware, the phone records of pretty much every American, access to major tech company data centers, an arsenal of purchased software and hardware exploits, various odds and ends yet to be disclosed and the full support of the last two administrations just isn’t enough. Now, it wants the blessing of lawmakers to do even more than it already does. Which is quite a bit, actually.

The NSA runs sophisticated hacking operations all over the world. A Washington Post report showed that the NSA carried out 231 “offensive” operations in 2011 – and that number has surely grown since then. That report also revealed that the NSA runs a $652m project that has infected tens of thousands of computers with malware.

That was four years ago — a lifetime when it comes to an agency with the capabilities the NSA possesses. Anyone who believes the current numbers are lower is probably lobbying increased power. And they don’t believe it. They’d just act like they do.

Link (Techdirt)

Inquiry Launched into New Zealand Mass Surveillance

New Zealand’s spy agency watchdog is launching an investigation into the scope of the country’s secret surveillance operations following a series of reports from The Intercept and its partners.

On Thursday, Cheryl Gwyn, New Zealand’s inspector-general of intelligence and security, announced that she would be opening an inquiry after receiving complaints about spying being conducted in the South Pacific by eavesdropping agency Government Communications Security Bureau, or GCSB.

In a press release, Gwyn’s office said: “The complaints follow recent public allegations about GCSB activities. The complaints, and these public allegations, raise wider questions regarding the collection, retention and sharing of communications data.”

This month, The Intercept has shined a light on the GCSB’s surveillance with investigative reports produced in partnership with the New Zealand Herald, Herald on Sunday, and Sunday-Star-Times.

The reports, based on information from National Security Agency whistleblower Edward Snowden and other sources, have revealed how the GCSB has been intercepting communications in bulk across a variety of neighboring South Pacific islands, raising concerns that New Zealand citizens’ emails and phone calls are being swept up in the dragnet.

The reports have also shown how the GCSB is funneling data into the NSA’s XKEYSCORE internet surveillance system from a surveillance base in the Waihopai Valley and is spying on about 20 countries across the world, predominantly in the Asia-Pacific region, including major trading partners such as Japan, Vietnam and China. The most recent stories have revealed that GCSB used XKEYSCORE to spy on emails about candidates vying to be the director general of the World Trade Organization and target top government officials and an anti-corruption campaigner in the Solomon Islands.

Following the disclosures, several of New Zealand’s opposition political leaders have criticized the surveillance and filed complaints with Gwyn, the inspector-general of intelligence and security.

In her statement on Thursday announcing the initiation of an inquiry, Gwyn said she would be conducting “a focused review of a particular area of GCSB or New Zealand Security Intelligence Service practice.”

She added: “I have today notified the acting director of the GCSB of my inquiry and of my intention in this inquiry to provide as much information to the public on my findings as I can, withholding only that information that cannot be disclosed without endangering national security. The director has assured me of the Bureau’s full co-operation.”

John Key, New Zealand’s prime minister, last year claimed that “there has never been any mass surveillance and New Zealand has not gathered mass information and provided it to international agencies.”

However, after The Intercept’s recent reports, former GCSB chief Bruce Ferguson admitted that the agency had been engaged in “mass collection” of data and said it was “mission impossible” to eliminate New Zealand citizens’ communications from being vacuumed up.

Responding to the news about the inspector general’s inquiry on Thursday, Prime Minister Key told the media he was “not fearful in the slightest” about its findings.

“That’s the reason we beefed up the inspector-general and, in fact, we’ve been talking to her,” Key said. “We’ve got absolutely no concerns about it.”

Link (The Intercept)

Deployment of Controversial Urban Sensor System Aided by Aggressive Lobbying

“Is NYC’s new gunshot detection system recording private conversations?” asks Fusion in a recent story about ShotSpotter, a sensor technology currently being set up in the Bronx and Brooklyn.

ShotSpotter sensors use microphone and satellite technology to detect, locate and report gunshots to police. Critics worry that the microphones are prone to false alarms, and more troubling, appear to vacuum up street-level conversations in the neighborhoods where it has been installed. Evidence from conversations recorded by ShotSpotter microphones has been used to prosecute criminals in court.

While questions linger for watchdog and privacy groups about the use of ShotSpotter technology, an aggressive lobbying campaign has helped ensure the devices have been deployed in over 90 cities across the country.

The Ferguson Group, a Washington, D.C.-based lobbying firm, boasts that it secured more than $7 million in federal funding to support the purchase of ShotSpotter. “TFG has conversations with interested communities and discusses process and assesses viability of request [sic], drafts and provides briefing sheets to communities and submits requests to their House and Senate delegation,” reads a case study posted on The Ferguson Group’s website.

ShotSpotter contracts with four D.C. lobbying shops, including the powerhouse Squire Patton Boggs and the Raben Group, the firm that helps orchestrate Mayors Against Illegal Guns, an advocacy group closely aligned with former New York mayor Michael Bloomberg and various police unions across the country. The firm also has an array of local and state lobbyists on contract. In New York City, for instance, the company retained Greenberg Traurig in the past, and now works with a former aides to Sheldon Silver and Bloomberg through the firm Mercury Group Public Affairs.

The company’s approach is detailed in emails from Phil Dailly, Southeast Region Sales Director for ShotSpotter, to the City of Miami. Dailly references a supportive city resolution and lists viable funding mechanisms, including purchasing the technology through the Community Oriented Policing program, a special fund administered by the Department of Justice, or through police department asset forfeiture money, funds often raised through drug busts. Promotional materials also list the DOJ’s Justice Assistance Grant program, Public Housing Agencies and Community Benefit Funds as potential funding sources. The company retained two local lobbyists in Miami to help move the process along.

Link (The Intercept)

FBI Quietly Removes Recommendation To Encrypt Your Phone… As FBI Director Warns How Encryption Will Lead To Tears

Back in October, we highlighted the contradiction of FBI Director James Comey raging against encryption and demanding backdoors, while at the very same time the FBI’s own website wassuggesting mobile encryption as a way to stay safe. Sometime after that post went online, all of the information on that page about staying safe magically disappeared, though thankfully I screenshotted it at the time:

 

If you really want, you can still see that information over at the Internet Archive or in a separate press release the FBI apparently didn’t track down and memory hole yet. Still, it’s no surprise that the FBI quietly deleted that original page recommending that you encrypt your phones “to protect the user’s personal data,” because the big boss man is going around spreading a bunch of scare stories about how we’re all going to be dead or crying if people actually encrypted their phones:

Calling the use of encrypted phones and computers a “huge problem” and an affront to the “rule of law,” Comey, painted an apocalyptic picture of the world if the communications technology isn’t banned.

“We’re drifting to a place where a whole lot of people are going to look at us with tears in their eyes,” he told the House Appropriations Committee, describing a hypothetical in which a kidnapped young girl’s phone is discovered but can’t be unlocked.

So, until recently, the FBI was actively recommending you encrypt your data to protect your safety — and yet, today it’s “an affront to the rule of law.” Is this guy serious?

More directly, this should raise serious questions about what Comey thinks his role is at the FBI (or the FBI’s role is for the country)? Is it to keep Americans safe — or is it to undermine their privacy and security just so it can spy on everyone?

Link (Techdirt)

Spookception: US spied on Israel spying on US-Iran nuke talks

Israel spied on the recent US-Iran nuclear talks, alleges America. And the US knows enough about it to say it publicly because the NSA is spying on Israel, along with everyone else.

The Wall Street Journal reports that Israel handed over confidential information from the negotiations with friendly members of the US Congress in a bid to derail any deal.

Israel denies the accusations, which highlight a widening gulf between Binyamin Netanyahu’s hawkish government in Israel and the Obama administration.

Link (The Register)

California bill requires warrant for stingray use

Some actual good news for once

SACRAMENTO, Calif.—A California state bill that would require a warrant to access all kinds of digital data passed its first hurdle after being approved by the Senate Public Safety Committee on Tuesday.

Among other sweeping new requirements to enhance digital privacy, the bill notably imposes a warrant requirement before police can access nearly any type of digital data produced by or contained within a device or service.

In other words, that would include any use of a stingray, also known as a cell-site simulator, which can not only used to determine a phone’s location, but can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones—not just the target phone.

Link (Ars Technica)

UK Police Can’t Confirm Or Deny Investigation Of Journalists It Publicly Confirmed In 2013

If you’re a UK-based journalist who’s reported on the Snowden leaks, it’s safe to say you’re under investigation. Not only are you being investigated, but that investigation itself is so secret, it can’t be discussed. The Intercept’s Ryan Gallagher sent a Freedom of Information request to London’s Metropolitan Police (the Met) for more information about the investigation — something twice publiclyconfirmed by Met representatives.

But when asked specifically for information on the ongoing investigation, the agency had nothing to say.

[T]he Metropolitan Police… says everything about the investigation’s existence is a secret and too dangerous to disclose. In response to a Freedom of Information Act request from this reporter, the force has repeatedly refused to release any information about the status of the investigation, how many officers are working on it, or how much taxpayer money has been spent on it. The Met wrote in its response:

“to confirm or deny whether we hold any information concerning any current or previous investigations into the alleged actions of Edward Snowden could potentially be misused proving detrimental to national security.’

In this current environment, where there is a possibility of increased threat of terrorist activity, providing any details even to confirm or deny that any information exists could assist any group or persons who wish to cause harm to the people of the nation which would undermine the safeguarding of national security.”

Link (Techdirt)

New Zealand Spied on WTO Director Candidates

New Zealand launched a covert surveillance operation targeting candidates vying to be director general of the World Trade Organization, a top-secret document reveals.

In the period leading up to the May 2013 appointment, the country’s electronic eavesdropping agency programmed an Internet spying system to intercept emails about a list of high-profile candidates from Brazil, Costa Rica, Ghana, Indonesia, Jordan, Kenya, Mexico, and South Korea.

New Zealand’s trade minister Tim Groser was one of nine candidates in contention for the position at the WTO, a powerful international organization based in Geneva, Switzerland that negotiates trade agreements between nations. The surveillance operation, carried out by Government Communications Security Bureau, or GCSB, appears to have been part of a secret effort to help Groser win the job.

Groser ultimately failed to get the position.

A top-secret document obtained by The Intercept and the New Zealand Herald reveals how GCSB used the XKEYSCORE Internet surveillance system to collect communications about the WTO director general candidates.

XKEYSCORE is run by the National Security Agency and is used to analyze billions of emails, Internet browsing sessions and online chats that are vacuumed up from about 150 different locations worldwide. GCSB has gained access to XKEYSCORE because New Zealand is a member of the Five Eyes surveillance alliance alongside the United States, the United Kingdom, Canada and Australia.

Link (The Intercept)