Russia!Russia!Russia! is destroying The Intercept

The Intercept was founded several years ago as a bastion of “confrontational journalism” by a distinguished group of contributing editors, including Democracy Now! veteran reporter Jeremy Scahill and Glenn Greenwald. It sprang directly out of the work of Greenwald, a lawyer, who helped Edward Snowden survive to publish his groundbreaking 2013 and 2014 exposes of NSA domestic wiretapping.

With private funding from eBay founder, Pierre Omidyar, at its launch in February 2014, The Intercept promised to revive investigative journalism, nearly dead after decades of neglect and abuse by consolidated corporate media.

Now, four years later, one can only hope that Glenn & Jeremy find a way to distance themselves for some of the others at The Intercept. The Intercept appears to have been turned into a vehicle to take down Wikileaks.

Immediately after a Justice of the High Court in London refused on Tuesday to lift an arrest warrant for Wikileaks founder Julian Assange, The Intercept published a controversial story that adds fuel to the cooling Russiagate fire.

Under the by-lines of two relatively obscure contributors, Micah Lee and Cora Currier, appeared, “In Leaked Chats, WikiLeaks Discusses Preference for GOP Over Clinton, Russia, Trolling, and Feminists They Don’t Like” https://theintercept.com/2018/02/14/julian-assange-wikileaks-election-cl...

That story by Lee and Currier alleges to be based upon Twitter direct messages from Assange to a private group of Wikileaks supporters, including a 2015 message explaining why he thought it might be better if Clinton and the Democrats were to lose the election.

Does this signal that Greenwald and Scahill now believe Assange helped Putin spoil President Hillary’s destiny? No. I have the feeling, though, that like many others, they may be undecided or ambivalent about much of the Russiagate evidence.

Some of the reoccurring Russia!Russia!Russia! narrative at Intercept is clearly fraudulent. Like much of the Steele Dossier, the Russiagate narrative is either the product of entrapment by agents provocateur or sources in the intelligence agencies who are spinning what they think they know. Like most of the media, the Intercept has been printing both unquestioningly as the truth. An example of the latter is the Intercept’s publication last June of scanned materials provided by Reality Winner, an NSA contractor, who was arrested an hour after The Intercept published. The authors had (mistakenly, they said afterwards) showed a government contractor an unredacted copy of what turned out to be marked government documents, alerting the NSA to the identity of the leaker. https://theintercept.com/2017/06/05/top-secret-nsa-report-details-russia...

Ms. Winner leaked the incriminating documents because she was outraged by the contents which described Russian intelligence operations that were datamining US voter registration records. What she did not seem to understand — and the Intercept’s editors did not bother to provide this context — is that Russian military intelligence (the GRU) routinely hacks into the databases of US political institutions just as the NSA and CIA harvest the databases of Russian political parties and quasi-governmental agencies. Both do it for exactly the same reasons, and it’s routine.

Wikileaks revealed that the CIA did exactly the same thing during the 2012 French elections. https://wikileaks.org/cia-france-elections-2012/ Without that context, the article published by the Intercept seems much more alarming than it really is. It is actually pretty routine stuff for state intelligence agencies – but, propaganda journalists don’t inform their readers about such inconvenient facts that might disrupt their narrative.

Meanwhile, like all disinformation, there is some truth to it. Similarly, there is plenty of reason to assume that Trump is all mobbed up, corrupt as hell, and has been for two generations.

The problem with the Intercept’s Computer Guru, Micah Lee, in particular, is that he’s technically sophisticated but fundamentally naive about international relations and how all intelligence agencies act. He expresses outrage because Assange seems to grasp that Russia sees western destabilization efforts as a threat. Here’s Lee’s take on what Julien Assange communicated about Russia:

Micah Lee‏Verified account @micahflee Feb 14

The Intercept has obtained DMs from a private Twitter group with @WikiLeaks and its most loyal supporters. It includes:

– A desire for GOP to win the 2016 election
– Trolling
– Anti-semitism
– Rampant misogyny, sexist attacks on feminists
– Transphobiahttps://t.co/pYtZqRvVOG

— Micah Lee (@micahflee) February 14, 2018
At one point, Assange went into detail about its thoughts on Russia. Russia is “absolutely terrified”; “US hacks the hell out of it.” WikiLeaks thinks Kremlin is “deeply paranoid” of foreign NGOs and “invading ‘western’ cultural practices, like gays and the internet”

In the minds of many, hacking becomes proof of a Russian plot to change the results of the 2016 election, and that Assange was acting as a Russian agent. The Intercept articles seem designed to add to that impression.

Of course the DNC was hacked, but we really don’t have enough information to know if the Russian government was the source of the Wikileaks material that exposed collusion between the DNC, HRC Campaign and Podesta. The DNC was cover for Ukranian regime change operators such as Alexandra Chalupa, and it only makes sense that the GRU and SVR were surveiling DNC communications. The CIA/NSA hacks and spies inside Russian political party headquarters and all manner of databases, too – might as well call overhead satellite surveillance an “act of war.” It isn’t. Surveillance, hacking and data-mining of important political organizations, civilian and military, is just how all state intelligence agencies operate.

There’s a lot of co-mingling of things — normal and nasty — going on here by people like Lee that feed the narrative, either by ignorance or avarice, or both. Someone of Glenn or Jeremy’s stature needs to cut through the intentional comingling and spin and tell it straight, revealing how the HRC and Democratic pols pushing Russia!Russia!Russia! have exploited old McCarthyite tactics, coopting “progressive” media to spread Cold War divisions and have created chaos and fear for partisan reasons.

Share
up
0 users have voted.

Comments

Just like counterpunch and truthout.
There's good writers and bad ones

up
0 users have voted.
hecate's picture

submitted the material to The Intercept precisely because of Scahill and Greenwald's skepticism.

She had access to a five-page classified report detailing a Russian attempt to access American election infrastructure through a private software company. This would be, ultimately, the document she leaked. According to the analysis in the report, Russian intelligence sent phishing emails to the employees of a company that provides election support to eight states. After obtaining log-in credentials, the Russians sent emails infected with malware to over 100 election officials, days before the election, from what looked like the software company’s address.

Reality listened to a podcast called Intercepted, hosted by the left-wing anti-security-state website the Intercept’s Jeremy Scahill and featuring its public face, Glenn Greenwald, and listened intensely enough to email the Intercept and ask for a transcript of an episode. Scahill and Greenwald had been, and continue to be, cautious about accusations of Russian election meddling, which they foresee being used as a pretext for justifying U.S. militarism. “There is a tremendous amount of hysterics, a lot of theories, a lot of premature conclusions being drawn around all of this Russia stuff,” Scahill said on the podcast in March. “And there’s not a lot of hard evidence to back it up. There may be evidence, but it’s not here yet.”

There was evidence available to Reality.

The document was marked top secret, which is supposed to mean that its disclosure could “reasonably be expected” to cause “exceptionally grave damage” to the U.S. Sometimes, this is true. Reality would have known that, in releasing the document, she ran the risk of alerting the Russians to what the intelligence community knew, but it seemed to her that this specific account ought to be a matter of public discourse. Why isn’t this getting out there? she thought. Why can’t this be public? It was surprising to her that someone hadn’t already done it.

Why do I have this job, Reality thought, if I’m just going to sit back and be helpless?

The way The Intercept handled her submission was unconscionable. They put her in jail.

The Assange piece is just bizarre. First there is the reckless assumption that all posts in a collective account were authored by Assange. Then there is the fact there are no real thought-crimes revealed therein. Reading the piece, I kept waiting for the boom to drop. It never did. The way the chats have been hysterically portrayed in twitworld by Lee & Co. is nearly as bad as the witch-burning of Quinn Norton.

up
0 users have voted.
mimi's picture

That's odd, no?

I don't know if this is snark or not, but I guess it's not. I mean, who cares for all of those writers when the bombs start falling on YOUR heads? I guess nobody.

up
0 users have voted.
Amanda Matthews's picture

visitors to one side of an argument or issue when you can get supporters from both sides to visit your site?

It’s just doing business in the marketplace and capturing all the customers possible.

up
0 users have voted.

I'm tired of this back-slapping "Isn't humanity neat?" bullshit. We're a virus with shoes, okay? That's all we are. - Bill Hicks

Politics is the entertainment branch of industry. - Frank Zappa

Just to mention, re 'Russian hacking' (all emphasis in anything below, mine.):

https://www.commondreams.org/views/2016/12/15/us-intel-vets-dispute-russ...

Published on
Thursday, December 15, 2016
by
Consortium News
US Intel Vets Dispute Russia Hacking Claims

As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans
by
Veteran Intelligence Professionals for Sanity

...MEMORANDUM

Allegations of Hacking Election Are Baseless

A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else. ...

... In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.

We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:

Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.

All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.

In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.

Awesome Technical Capabilities

Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.

In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network. ...

... all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.

These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. ...

...it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking.

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

Larry Johnson, former CIA Intelligence Officer & former State Department Counter-Terrorism Official

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

https://en.wikipedia.org/wiki/William_Binney_%28U.S._intelligence_offici...

William Binney (U.S. intelligence official)
From Wikipedia, the free encyclopedia
William Binney
William Binney-IMG 9040.jpg
Binney at the Congress on Privacy & Surveillance (2013) of the École polytechnique fédérale de Lausanne (EPFL)
Born William Edward Binney
September 1943 (age 74)
Pennsylvania, U.S.
Education Pennsylvania State University (B.S., 1970)
Occupation Cryptanalyst-mathematician
Employer National Security Agency (NSA)
Known for Cryptography, SIGINT analysis, whistleblowing
Awards

Meritorious Civilian Service Award Joe A. Callaway Award for Civic Courage (2012)[1] Sam Adams Award (2015)[2]

Signature
William Binney-signature.jpg

William Edward Binney[3] is a former highly placed intelligence official with the United States National Security Agency (NSA)[4] turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency.

He was a high-profile critic of his former employers during the George W. Bush administration, and later criticized the NSA's data collection policies during the Barack Obama administration. In 2016, he said the U.S. intelligence community's assessment that Russia interfered in the 2016 presidential election was false. ...

... Binney was a Russia specialist and worked in the operations side of intelligence, starting as an analyst and ending as a Technical Director prior to becoming a geopolitical world Technical Director. In the 1990s, he co-founded a unit on automating signals intelligence with NSA research chief Dr. John Taggart.[6] Binney's NSA career culminated as Technical Leader for intelligence in 2001. He has expertise in intelligence analysis, traffic analysis, systems analysis, knowledge management, and mathematics (including set theory, number theory, and probability).[7][8] ...

... After the NSA

After he left the NSA in 2001, Binney was one of several people investigated as part of an inquiry into a 2005 The New York Times exposé on the agency’s warrantless eavesdropping program.[citation needed] Binney was cleared of wrongdoing after three interviews with FBI agents beginning in March 2007, but in early July 2007, in an unannounced, armed, early morning raid, a dozen agents armed with rifles appeared at his house, one of whom entered the bathroom and pointed his gun at Binney, who was taking a shower. The FBI confiscated a desktop computer, disks, and personal and business records.[14] The NSA revoked his security clearance, forcing him to close a business he ran with former colleagues at a loss of a reported $300,000 in annual income. The FBI raided the homes of Wiebe and Loomis, as well as House Intelligence Committee staffer Diane Roark, the same morning. Several months later the Bureau raided the home of then still active NSA executive Thomas Andrews Drake who had also contacted DoD IG, but anonymously with confidentiality assured. The Assistant Inspector General, John Crane, in charge of the Whistleblower Program, suspecting his superiors provided confidential information to the Justice Dept (DOJ), challenged them, was eventually forced from his position, and subsequently himself became a public whistleblower. The punitive treatment of Binney, Drake, and the other whistleblowers also led Edward Snowden to go public with his revelations rather than report through the internal whistleblower program.[15] In 2012, Binney and his co-plaintiffs went to federal court to retrieve the confiscated items.[16]
Allegations on intercepts

Binney is known for making the unsubstantiated claim that the NSA collects and stores information about every U.S. communication.[17] Binney was invited as a witness by the NSA commission of the German Bundestag. On July 3, 2014 Der Spiegel wrote, he said that the NSA wanted to have information about everything. In Binney's view this is a totalitarian approach, which had previously been seen only in dictatorships.[18] Binney stated that the goal was to control people. Meanwhile, he said that it is possible in principle to monitor the whole population, abroad and in the U.S., which in his view contradicts the United States Constitution.[18]

In August 2014 Binney was among the signatories of an open letter by the group Veteran Intelligence Professionals for Sanity to German chancellor Angela Merkel in which they urged the Chancellor to be suspicious of U.S. intelligence regarding the alleged invasion of Russia in Eastern Ukraine.[19][20][21] In the open letter, the group said:

[A]ccusations of a major Russian "invasion" of Ukraine appear not to be supported by reliable intelligence. Rather, the "intelligence" seems to be of the same dubious, politically "fixed" kind used 12 years ago to "justify" the U.S.-led attack on Iraq.[20]

Binney's Opinion on "Russian Interference" in the 2016 election

Binney claims the U.S. intelligence community's assessment that Russia interfered in the 2016 presidential election is false, and that the DNC e-mails were leaked by an insider instead.[22][23][24] He has appeared on Fox News at least ten times between September 2016 and November 2017 to promote this theory.[17][22][23] Binney said that the "intelligence community wasn’t being honest here".[22] He has also been frequently cited on Breitbart News.[17] In November 2017 it was reported that a month earlier, Binney had met with CIA Director Mike Pompeo at the behest of President Trump.[22]

Binney has said he voted for Trump in the 2016 presidential election, calling Hillary Clinton a "war monger".[17]
Memo Incident on Alex Jone's Infowars

On January 23rd, 2018, Binney was a guest on the Infowars news program[25]. During the show, host Alex Jones announced that Binney had provided Jones with the so-called Nunes memo[26], a classified memo (since released to the public) by Rep. Devin Nunes which at the time was the subject of a "ReleaseTheMemo" campaign. Accord to USA Today citation of the Hamilton68 Dashboard, a 'tracking dashboard' for 'Russian interference,' maintained by Alliance for Securing Democracy, housed at the German Marhsall Fund, led by Laura Rosenburger, former foreign policy adviser for Hillary for America, it was Russian linked Twitter accounts. [27][28][29]

However, the memo provided by Binney and featured on the Infowars broadcast was not the Nunes memo; it was a public document from the website of the Office of Director of National Intelligence that has been available online since at least May 2017.[30] ...

Regarding some of the Wiki article above, unless this portion is old and cautiously written, there may possibly have been some 'adjusting' in deceptively suggestive phrasing; in example the manner of referring to his 'claims' and 'theories' in context with this: "...Binney is known for making the unsubstantiated claim that the NSA collects and stores information about every U.S. communication. ..."

whereas this has been substantiated by other whistle-blowers and by agency actions.

Quoted below, a portion of a humongous and absolute must-read article is preserved here for any on limited devices who might be unable to otherwise access this essential example of outstanding journalism describing any dictator's wet-dream already achieved and running long since. Every embarrassing fart anyone emits in 'privacy' on the planet is not only enshrined for posterity but may be noted as suspicious-sounding - apparently apart from terrorists, who can be as obvious as they like without triggering alarm.

And the already massive US spy system is intent upon 'competing' with the rest of the world in not only a self-created arms/nuke race but an eye and ear race as well, and in the same obsessive, expensive (at US spied-upon and increasingly censored taxpayer cost) and paranoid manner - while telling the world that they cannot produce evidence of a 'hack' claimed in order to initiate the extermination of planetary life.

This is possibly the most important and educational collection of information that everyone needs to understand in order to avoid being sucked into believing even one expedient word of accusation against any potentially desired target. Enough people understanding the situation and what the aim is might still save our lives and chance for democracy.

From 2012:

https://www.wired.com/2012/03/ff_nsadatacenter/

James Bamford Security Date of Publication: 03.15.12.
03.15.12
Time of Publication: 7:24 pm.

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

... The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.” ...

... And then there was this anomaly: Although this was supposedly the official ground-breaking for the nation’s largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official who’d originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the country’s human and electronic spies. ...

... Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the center’s own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tag—about $40 million a year, according to one estimate.

Given the facility’s scale and the fact that a terabyte of data can now be stored on a flash drive the size of a man’s pinky, the potential amount of information that could be housed in Bluffdale is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this “expanding array of theater airborne and other sensor networks,” as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)

It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”
The NSA’S SPY NETWORK

Once it’s operational, the Utah Data Center will become, in effect, the NSA’s cloud. The center will be fed data collected by the agency’s eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US. All that data will then be accessible to the NSA’s code breakers, data-miners, China analysts, counterterrorism specialists, and others working at its Fort Meade headquarters and around the world. Here’s how the data center appears to fit into the NSA’s global puzzle.—J.B. ...

... 10 NSA headquarters, Fort Meade, Maryland

Analysts here will access material stored at Bluffdale to prepare reports and recommendations that are sent to policymakers. To handle the increased data load, the NSA is also building an $896 million supercomputer center here.

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network. A tall man with strands of black hair across the front of his scalp and dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent nearly four decades breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into the NSA’s bulging databases. As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications.

He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says. “That’s not just San Francisco; they have them in the middle of the country and also on the East Coast.”

The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations, satellite receivers in locations that include Roaring Creek and Salt Creek. Tucked away on a back road in rural Catawissa, Pennsylvania, Roaring Creek’s three 105-foot dishes handle much of the country’s communications to and from Europe and the Middle East. And on an isolated stretch of land in remote Arbuckle, California, three similar dishes at the company’s Salt Creek station service the Pacific Rim and Asia.

The former NSA official held his thumb and forefinger close together: “We are that far from a turnkey totalitarian state.”

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there. According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.

The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.

The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.

According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.

Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.

In secret listening rooms nationwide, NSA software examines every email, phone call, and tweet as they zip by.

But there is, of course, reason for anyone to be distressed about the practice. Once the door is open for the government to spy on US citizens, there are often great temptations to abuse that power for political purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and ordered the NSA to spy on antiwar protesters. Those and other abuses prompted Congress to enact prohibitions in the mid-1970s against domestic spying.

Before he gave up and left the NSA, Binney tried to persuade officials to create a more targeted system that could be authorized by a court. At the time, the agency had 72 hours to obtain a legal warrant, and Binney devised a method to computerize the system. “I had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.” But such a system would have required close coordination with the courts, and NSA officials weren’t interested in that, Binney says. Instead they continued to haul in data on a grand scale. Asked how many communications—”transactions,” in NSA’s lingo—the agency has intercepted since 9/11, Binney estimates the number at “between 15 and 20 trillion, the aggregate over 11 years.”

When Barack Obama took office, Binney hoped the new administration might be open to reforming the program to address his constitutional concerns. He and another former senior NSA analyst, J. Kirk Wiebe, tried to bring the idea of an automated warrant-approval system to the attention of the Department of Justice’s inspector general. They were given the brush-off. “They said, oh, OK, we can’t comment,” Binney says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

There is still one technology preventing untrammeled government access to private digital data: strong encryption. ...

,,,James Bamford (washwriter@gmail.com) is the author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.

Dear gawd, wish I could afford that book - the above does not include a lot of the information or even all of the worst which builds from there onward.

And this needs to be read, if at all possible, in entirety to grasp, so far as any normal can, the bizarre pathology represented by this, although this ought to be enough to trigger a good, constructive understanding and disgusted, determined anger to find some pacific means of ending the lunacy and replacing the corrupt and lunatic mess with a strong democratic government, legitimately of, by and for the people - not against them. It's very evident who's considered the enemy to be spied on and micro-managed here - non-psychopathic citizens who just want a decent life and future in a free world and country without being predated upon or paying through the nose to enable predation upon others.

https://seesharppress.wordpress.com/tag/veteran-intelligence-professiona...

Posts Tagged ‘Veteran Intelligence Professionals for Sanity’
Russian “hacking” of the presidential election
Posted: December 14, 2016 in Livin' in the USA, Politics

...VIPS was formed in 2003 to counter the Bush Administration’s disinformation campaign about Iraq, and that those members of their steering committee I’m familiar with, via their work, Mike Gravel and Ray McGovern, are left-leaning, anti-war activists. (warisacrime.org has an archive of all of the VIPS previous memorandums.) ...

... But why would CIA insiders leak the Russian hacking assertions to the press, when they have no hard evidence? Two things come to mind: 1) they’re Clinton partisans; or 2) they’re so alarmed by Trump’s gross incompetence and erratic, volatile nature — the huge and obvious danger that he represents to all of us — that they’re doing their best to kneecap him before he takes office. ...

...Here’s the VIPS’ memorandum, in its entirety.

Veteran Intelligence Professionals for Sanity

The fact that apparently only these two things came to mind indicates that more people need to be far more aware.

Apart from all else, TPTB, et al, routinely accuse others of what they do themselves, and the portion above is plenty to indicate that umpteen different constant listeners would be able to provide the requisite proof of any hacking related to any government or individual in the world, if they had it. And if they weren't apparently too busy focusing on the private lives of citizens and, perhaps especially, pacific dissidents wanting their democracy back, to ever even pay attention to info they may have in their possession to stop any actual domestic terrorism that occurs. As with Bush-2, on what turns out was probably the 50th-odd warning about the 9/11 attack:

'http://reverbpress.com/politics/flashback-6-times-bush-ignored-9-11-warn...

Flashback: 6 Times Bush Ignored 9-11 Warnings

October 19, 2015

... On August 6th, 2001 President Bush received the infamous briefing titled “Bin Laden Determined to Strike in U.S.” that we’ve all heard about. “Clandestine, foreign government, and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US,” that briefing warned. President Bush’s response to the CIA officer briefing him? “All right. You’ve covered your ass, now.” ...

I'd read about the Utah NSA building years back, of course, and was searching for info on it when I came across this but had never seen this impressive Wired article before, with its wealth of mind-boggling information laid out regarding the depth and intensity of this disease.

And we need to spread this around, while we can; the window is closing on our fingertips as we type.

up
0 users have voted.

Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.

A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.

Pluto's Republic's picture

@Ellen North

...that can protect us. As always, you give 150 percent of yourself to the comments that you make here, Ellen. Even to the buried treasures.

Pay heed to the word "protect." We are becoming an America where blurting the truth can harm you and your family. Watch for the signs:

• En mass, journalists will flip to the dark side. They will not lose readership; they will gain.

• A key whistleblower will be assassinated or arrested and disappeared. You fellow citizens will cheer.

• Someone tangentially Left will go on trial. It will be publicized and every decision along the way will be unspeakably unjust. The injustice will be celebrated with joy by friends and neighbors.

These examples come from patterns in the past. Allow these warnings to demoralize you. Assume a low profile. Find another innocent interest online (like pets, crafts, or cooking) to occupy your time. Follow it sincerely and participate enthusiastically and do not look back. Stay safe, drop unsafe friends, and survive.

You will know when it's time.

up
0 users have voted.