Rep. Aaron Schock is frequently referred to as a “rising star” in Congress, but this week, the Associated Press reported on a scandal involving Schock and his use of taxpayer and campaign funds for things like flights on private jets (owned by key donors) and a Katy Perry concert. Frankly, I think some of the “scandal” here is a bit overblown. But what struck me is part of how the AP tracked these details about Schock down:
The AP tracked Schock’s reliance on the aircraft partly through the congressman’s penchant for uploading pictures and videos of himself to his Instagram account. The AP extracted location data associated with each image then correlated it with flight records showing airport stopovers and expenses later billed for air travel against Schock’s office and campaign records.
In short, the metadata brought Schock down. Of course, as we’ve been describing, anyone who says that we shouldn’t be concerned about the NSA’s surveillance of metadata, or brushes it away as “just metadata,” doesn’t understand how powerful metadata can be. As former NSA/CIA boss Michael Hayden has said, the government kills people based on metadata.
But it does seem noteworthy that Schock was one of those who claimed that Ed Snowden’s leaking of how the NSA collected metadata on nearly everyone amounted to treason. I wonder if he still feels that way…
Tag: CIA
European Lawmakers Demand Answers on Phone Key Theft
European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday.
The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys.
The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.”
“Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal.
Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
“If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday.
The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said.
Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request.
Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year.
The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
Eric Holder Says Putting Reporter James Risen Through Hell Is A Good ‘Example’ Of DOJ Process For Leak Investigations
Attorney General Holder raised some eyebrows earlier this week when answering a question about his Justice Department’s notorious crackdown on leaks, and by extension the press, most notably saying this about its notorious pursuit of New York Times reporter James Risen, while claiming the DOJ did nothing wrong:
If you look at the last case involving Mr. Risen, the way in which that case was handled after the new policies were put in place [is] an example of how the Justice Department can proceed.
The District Sentinel aptly took apart most of Holder’s comments, and they also provoked a stinging rebuke from Risen himself last night on Twitter. However, I think the facts of Risen’s case deserve a closer look to see just how unbelievable Holder’s statement is.
Let’s recap: since the very start of the Obama administration (read: for SIX years), the Justice Department was trying to subpoena James Risen. It fought for him to testify at a grand jury of CIA officer Jeffrey Sterling, which he refused to do, and when they were rejected by the court, it fought to have him testify in Sterling’s trial. They fought Risen on this all the way up to the Supreme Court.
Also, keep in mind, while the “new” media/leak guidelines that Holder bragged about are certainly a step forward, the old guidelines that applied to Risen’s case should have protected him just the same from the start—if they were actually enforced. He doesn’t get to pretend the preceding five and a half years didn’t happen just because he stregthened the Justice Department’s rules after public protest.
The case cost Risen and his publisher an untold fortune in legal fees, dominated his life, took away from time he could’ve spent reporting, and likely cost the taxpayers millions of dollars.
Along the way, we found out that the government had spied on virtually every aspect of James Risen’s digital life from phone calls, to emails, to credit card statements, bank records and more. (By the way, we still have no idea how they got this information. That’s secret.)
The Justice Department argued in court that not only was there no reporter’s privilege whatsoever — either embedded in the First Amendment or in Fourth Circuit common law — but also that journalists protecting sources was analogous to protecting drug dealers from prosecution.
CIA Wanted To Throw The CFAA At Senate Staffers For Unauthorized Googling
Marcy Wheeler has picked up on an interesting claim made in the CIA’s “We Did Nothing Wrong” report. This report — an in-house investigation of the CIA’s snooping on/hacking Senate staffers during the compilation of the Torture Report — tossed out the Inspector General’s findings and cleared the agency of any misconduct. It then went on to disingenuously claim that it was the Senate, not the CIA, that broke the rules.
According to the CIA’s investigators, Senate staffers accessed documents they weren’t supposed to see, apparently by “abusing” the shared network set up explicitly for the Torture Report compilation. What Wheeler spotted — in a very thorough fisking of the CIA investigative report by Katherine Hawkins of Just Security — is the attempted criminalization of Google searches.
Waterboarding Whistleblower Released From Prison, Two Months After Torture Report’s Release Vindicated His Actions
Guess who went to jail because of the CIA’s long-running, illegal torture programs.
It wasn’t former director Leon Panetta, who was ultimately responsible for the actions of his agency. It wasn’t any number of agents, officials or supervisors who directly or indirectly participated in the ultimately useless torture of detainees. It wasn’t the private contractors who profited from these horrendous acts committed in the name of “national security.”
The single person to be put behind bars thanks to the CIA’s torture programs was the man who blew the whistle on the agency’s waterboarding: John Kiriakou. Now, he’s finally free again (mostly), two months after the Torture Report that corroborates his allegations was released.
Kiriakou is serving out the remainder of his sentence for “revealing an undercover operative’s identity” under house arrest. While still imprisoned, Kiriakou wondered aloud (in the Los Angeles Times) why Panetta wasn’t facing similar charges, considering the former CIA head had disclosed far more sensitive information, including the names of SEAL operatives to a civilian — the screenwriter for Zero Dark Thirty.