dagblog - Comments for "Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)" http://dagblog.com/link/edward-snowden-former-cia-employee-comes-forward-source-nsa-leaks-video-interview-16820 Comments for "Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)" en He explains more @ 11:55 am, http://dagblog.com/comment/179406#comment-179406 <a id="comment-179406"></a> <p><em>In reply to <a href="http://dagblog.com/comment/179405#comment-179405">They talked about the access</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>He explains more <a href="http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower?guni=Network%20front:network-front%20aux-1%20Mini-bento:Bento%20box%208%20col:Position2#block-51bf2e06e4b03725b2ebf323">@ 11:55 am</a>, about the problem with the filters:</p> <div class="block-elements"> <p><strong>Question:</strong></p> <figure class="element element-comment" data-canonical-url="http://discussion.guardian.co.uk/comment-permalink/24388604"><div class="d2-comment-embedded" itemscope="" itemtype="http://schema.org/Comment"> <div class="d2-left-col"> <a href="http://www.guardian.co.uk/discussion/user/id/10684565" title="View MonaHol’s profile"><img alt="User avatar for MonaHol" class="d2-avatar" height="40" src="http://static.guim.co.uk/sys-images/discussion/avatars/2013/04/27/10684565/75d5c188-d7cc-4264-8e14-d75a990fcba7/60x60.png" width="40" /></a></div> <div class="d2-right-col"> <div itemprop="author" itemscope="" itemtype="http://schema.org/Person"> <a class="d2-username" href="http://www.guardian.co.uk/discussion/user/id/10684565" itemprop="url" title="View MonaHol’s profile"><span itemprop="givenName">MonaHol</span> </a></div> <div class="d2-permalink"> <a class="d2-datetime" href="http://discussion.guardian.co.uk/comment-permalink/24388604" itemprop="datePublished" title="Link to this comment">17 June 2013 4:37pm</a></div> <div class="d2-body" itemprop="text"> <p>Ed Snowden, I thank you for your brave service to our country.</p> <p>Some skepticism exists about certain of your claims, including this:</p> <blockquote> <p>I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email.</p> </blockquote> <p>Do you stand by that, and if so, could you elaborate?</p> </div> </div> </div> </figure><p><strong>Answer:</strong></p> <blockquote class="quoted"> <p>Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with.</p> <p>More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."</p> </blockquote> </div> <p> </p> </div></div></div> Mon, 17 Jun 2013 19:50:51 +0000 artappraiser comment 179406 at http://dagblog.com They talked about the access http://dagblog.com/comment/179405#comment-179405 <a id="comment-179405"></a> <p><em>In reply to <a href="http://dagblog.com/comment/179286#comment-179286">Probably not, because he uses</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>They talked about the access problem in the Guardian chat today. Sounds to me like he is claiming that the system was set up lousy as to security of privacy rights and therefore 1)  is invaded without good authority all the time "by accident" and 2) when "warrants" are involved they are not much more than just rubber stamped forms:</p> <p>@ <a href="http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower?guni=Network%20front:network-front%20aux-1%20Mini-bento:Bento%20box%208%20col:Position2#block-51bf2ac1e4b05a46aeeb319b">11:27</a> am and @ <a href="http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower?guni=Network%20front:network-front%20aux-1%20Mini-bento:Bento%20box%208%20col:Position2#block-51bf2e06e4b03725b2ebf323">11:40am</a></p> <div class="block-elements"> <p><strong>Question:</strong></p> <figure class="element element-comment" data-canonical-url="http://discussion.guardian.co.uk/comment-permalink/24383903"><div class="d2-comment-embedded" itemscope="" itemtype="http://schema.org/Comment"> <div class="d2-left-col"> <a href="http://www.guardian.co.uk/discussion/user/id/12006937" title="View Anthony De Rosa’s profile"><img alt="User avatar for Anthony De Rosa" class="d2-avatar" height="40" src="http://static.guim.co.uk/sys-images/Guardian/Pix/site_furniture/2010/09/01/no-user-image.gif" width="40" /></a></div> <div class="d2-right-col"> <div itemprop="author" itemscope="" itemtype="http://schema.org/Person"> <a class="d2-username" href="http://www.guardian.co.uk/discussion/user/id/12006937" itemprop="url" title="View Anthony De Rosa’s profile"><span itemprop="givenName">Anthony De Rosa</span> </a></div> <div class="d2-permalink"> <a class="d2-datetime" href="http://discussion.guardian.co.uk/comment-permalink/24383903" itemprop="datePublished" title="Link to this comment">17 June 2013 2:18pm</a></div> <div class="d2-body" itemprop="text"> <p>1) Define in as much detail as you can what "direct access" means.</p> <p>2) Can analysts listen to content of domestic calls without a warrant?</p> </div> </div> </div> </figure><p><strong>Answer:</strong></p> <blockquote class="quoted"> <p>1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.<a class="d2-username" href="http://www.guardian.co.uk/discussion/user/id/12006937" itemprop="url" title="View Anthony De Rosa’s profile"> </a></p> </blockquote> </div> <div class="d2-right-col"> <blockquote> <div class="d2-body" itemprop="text"> <p>2) NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.</p> </div> </blockquote> </div> <p><strong>Glenn Greenwald follow up: </strong>When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content?</p> <blockquote class="quoted"> <p>Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.</p> </blockquote> </div></div></div> Mon, 17 Jun 2013 19:43:08 +0000 artappraiser comment 179405 at http://dagblog.com Surely he didn't have the http://dagblog.com/comment/179288#comment-179288 <a id="comment-179288"></a> <p><em>In reply to <a href="http://dagblog.com/comment/179286#comment-179286">Probably not, because he uses</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><em>Surely he didn't have the authority to choose, on his own volition, to eavesdrop on the President's communications even if the system made it possible.</em></p> <p>Good point. So it remains unclear what he meant by that....</p> </div></div></div> Sun, 16 Jun 2013 01:26:09 +0000 artappraiser comment 179288 at http://dagblog.com Probably not, because he uses http://dagblog.com/comment/179286#comment-179286 <a id="comment-179286"></a> <p><em>In reply to <a href="http://dagblog.com/comment/179273#comment-179273">He was on the job at Booz</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><blockquote> <p>Probably not, because he uses the words "had the authority." Hosenball's sources are implying a Systems Administrator does not have that authority.</p> </blockquote> <p>Ever since hearing that statement by Snowden I have assumed that he misspoke when he used the word "authority". I think he must have meant that he had the <em>ability</em>. Surely he didn't have the authority to choose, on his own volition, to eavesdrop on the President's communications even if the system made it possible. </p> <blockquote> <p>So does that mean he was saying  that a systems administrator geek like him could hack the database without authorization?</p> </blockquote> <p>I think that is what he was saying, that his position made it possible to access anything in the data base with, but also obviously without, authorization.</p> <p> </p> <p> </p> </div></div></div> Sun, 16 Jun 2013 01:10:43 +0000 A Guy Called LULU comment 179286 at http://dagblog.com He was on the job at Booz http://dagblog.com/comment/179273#comment-179273 <a id="comment-179273"></a> <p><em>In reply to <a href="http://dagblog.com/link/edward-snowden-former-cia-employee-comes-forward-source-nsa-leaks-video-interview-16820">Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>He was on the job at Booz only 4 weeks, then took the unpaid medical leave of absence, and when he did not come back from that, the Feds did go looking for him,<a href="http://www.reuters.com/article/2013/06/12/us-usa-security-snowden-hunt-idUSBRE95B1A220130612"> from Mark Rosenball @ <em>Reuters:</em></a></p> <blockquote> <p><span id="articleText">Snowden already had a Top Secret clearance before he joined Booz Allen in April, two sources said, adding that he likely obtained that clearance - which involves passing a polygraph exam - when he previously worked for the Central Intelligence Agency.</span></p> <p><span id="articleText">For his first week or two with Booz Allen, Snowden attended training sessions near Fort Meade, the Maryland military installation where NSA headquarters is located and where numerous agency contractors have offices.</span></p> <p><span id="articleText">After that, Snowden moved to take up his assignment with a company team based at the NSA installation in Hawaii. He was only on the job for around four weeks when he told his employers he was ill and requested leave without pay, the sources said.</span></p> <p><span id="articleText">When Booz Allen checked in with him, Snowden said he was suffering from epilepsy and needed more time off. When he failed to return after a longer period, and the company could not find him, it notified intelligence officials because of Snowden's high-level security clearance, one of the sources said.</span></p> <p><span id="articleText">Government agents spent several days in the field trying to find Snowden, according to the source, but they were unable to do so before the first news story based on Snowden's revelations appeared in the Guardian and then in the Washington Post.</span></p> <p><span id="articleText">The government did not know Snowden was the source for the stories until he admitted it on Sunday, the sources said.</span></p> </blockquote> <p><span>Noted this conflict:</span></p> <blockquote> <p><span id="articleText">Several sources said that as a systems administrator, Snowden would have been unable to actively spy on people, even though he told the Guardian newspaper, "I, sitting at my desk, certainly had the authority to wiretap anyone, from you or your accountant, to a federal judge, to even the President."</span></p> </blockquote> <p>So does that mean he was saying  that a systems administrator geek like him could hack the database without authorization? Probably not, because he uses the words "had the authority." Hosenball's sources are implying a Systems Administrator does not have that authority.</p> </div></div></div> Sat, 15 Jun 2013 22:09:42 +0000 artappraiser comment 179273 at http://dagblog.com "The Falcon" speaks his http://dagblog.com/comment/179233#comment-179233 <a id="comment-179233"></a> <p><em>In reply to <a href="http://dagblog.com/link/edward-snowden-former-cia-employee-comes-forward-source-nsa-leaks-video-interview-16820">Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://www.cnn.com/2013/06/14/world/asia/hong-kong-boyce-snowden">"The Falcon" speaks his thoughts</a> to a  <em>CNN r</em>eporter,</p> <p>and</p> <p><a href="http://www.nytimes.com/2013/06/15/world/asia/ex-nsa-contractors-disclosures-could-complicate-his-fate.html?pagewanted=all&amp;_r=0"><em>NYT</em>'s  Keith Bradsher,</a> working overtime in Hong Kong , getting a lot of conflicting answers from people who ought to know wassup....</p> </div></div></div> Sat, 15 Jun 2013 04:52:12 +0000 artappraiser comment 179233 at http://dagblog.com Occurs to me that bringing up http://dagblog.com/comment/179120#comment-179120 <a id="comment-179120"></a> <p><em>In reply to <a href="http://dagblog.com/comment/179116#comment-179116">Mr. Snowden?s decision to</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>Occurs to me that bringing up <a href="http://dagblog.com/link/obama-orders-us-draw-overseas-target-list-cyber-attacks-16812#comment-179099">U.S. hacking of Hong Kong targets in the interview with the <em>South China Morning Post</em></a> may be an attempt to affect the above government proceedings/procedures.</p> </div></div></div> Wed, 12 Jun 2013 21:33:38 +0000 artappraiser comment 179120 at http://dagblog.com Mr. Snowden?s decision to http://dagblog.com/comment/179116#comment-179116 <a id="comment-179116"></a> <p><em>In reply to <a href="http://dagblog.com/link/edward-snowden-former-cia-employee-comes-forward-source-nsa-leaks-video-interview-16820">Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><blockquote> <p itemprop="articleBody">Mr. Snowden’s decision to stay in Hong Kong came as a person with knowledge of the Hong Kong government’s work on the case said local government lawyers, working with United States government lawyers, had identified 36 offenses with which Mr. Snowden could be charged under both Hong Kong and American laws.</p> <p itemprop="articleBody">The United States and Hong Kong operate under a 1996 bilateral extradition agreement, and any attempt by the United States to extradite Mr. Snowden would have to cite offenses that violate the laws in both countries, are punishable by jail terms of a year or more and meet the terms of that agreement. One of the 36 offenses involves the release of official secrets, which is illegal in Hong Kong and the United States, said the person familiar with Hong Kong government efforts, who spoke on the condition of anonymity because of the delicate legal and diplomatic aspects of the case.</p> <p itemprop="articleBody">Mr. Snowden could delay extradition proceedings by requesting political asylum in Hong Kong. But he will almost certainly be taken into custody and jailed as soon as he files for asylum, because he would no longer qualify as a visitor to Hong Kong, the person said.</p> </blockquote> <p itemprop="articleBody">from</p> <p itemprop="articleBody"><a href="http://www.nytimes.com/2013/06/13/world/asia/nsa-leaker-says-he-will-stay-in-hong-kong-and-fight-extradition.html?hp">N.S.A. Leaker Vows to Fight Extradition From Hong Kong</a><br /> By Keith Bradsher, <em>New York Times</em>, June 12, 2013</p> <p itemprop="articleBody">with much more on the legal details therein (Bradsher does have excellent connections/sources in both Hong Kong and China, mho.)</p> </div></div></div> Wed, 12 Jun 2013 21:19:48 +0000 artappraiser comment 179116 at http://dagblog.com How the leaks went http://dagblog.com/comment/178973#comment-178973 <a id="comment-178973"></a> <p><em>In reply to <a href="http://dagblog.com/link/edward-snowden-former-cia-employee-comes-forward-source-nsa-leaks-video-interview-16820">Edward Snowden, former CIA employee, comes forward as source of NSA leaks (with video interview)</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><em>How</em> the leaks went down:</p> <p><a href="http://www.nytimes.com/2013/06/11/us/how-edward-j-snowden-orchestrated-a-blockbuster-story.html?pagewanted=1">Cryptic Overtures and a Clandestine Meeting Gave Birth to a Blockbuster Story</a>,</p> <p>by Charlie Savage and Mark Mazzetti @ New York Times, June 10, 2013</p> </div></div></div> Tue, 11 Jun 2013 18:17:57 +0000 artappraiser comment 178973 at http://dagblog.com Ask me if I've ever done http://dagblog.com/comment/178949#comment-178949 <a id="comment-178949"></a> <p><em>In reply to <a href="http://dagblog.com/comment/178946#comment-178946">I hear they call the BIG</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>Ask me if I've ever done anything <em>right</em>.</p> </div></div></div> Tue, 11 Jun 2013 13:49:08 +0000 PeraclesPlease comment 178949 at http://dagblog.com