Feeds

CIA defends unaccountable snooping

They've heard it all before

Designing a Defense for Mobile Applications

General Michael Hayden, President Bush's nominee for CIA director, has defended his secret programme of snooping on citizens' telephone calls without warrants.

Meanwhile, a judge has given privacy champs the Electronic Frontier Foundation permission to use key evidence at the June hearing, where it will challenge telco AT&T with allegations that it helped US code breaking agency the National Security Agency (NSA) snoop on phone calls and other communications.

During his tenure as NSA director, Hayden had secretly crafted the system by which citizen communications would be tapped without the oversight of a warrant. He said the activity is excusable because agents operated in a system of self regulation. They could be trusted not to abuse their power because they were trustworthy people, the circular argument went.

"Every targeting is documented," Hayden was quoted saying in a Reuters report. "No one has said there has been a targeting decision made that hasn't been well-founded."

The NSA has been embroiled in snooping controversy before, most notably over its control of the international communications snooping network, Echelon, which monitors private and industrial telephone, fax and internet communications from bases in the US, Canada, Australia, New Zealand and most famously, Britain's Menwith Hill.

A 2001 European Parliament investigation was unable to substantiate the many allegations that the NSA was using the network to commit industrial espionage for the benefit of US corporations.

But it said there was no doubt the communications of European firms and citizens were being routinely monitored. It recommended encryption as a means of protection against NSA snooping.

Aggressive surveillance

An intelligence leak in 2003 revealed that the NSA had been using "dirty tricks" and "aggressive surveillance" of United Nations diplomats in an effort to get them to endorse an invasion of Iraq.

Unless these snooping networks were brought under the control of a system of democratic oversight, Privacy International said in its 2002 report 'Privacy and Human Rights', they could be trained on individuals and groups without recourse, and there was "ample evidence" they had already been turned on peace and democracy campaigners.

Law enforcement and intelligence agencies were becoming seamless, it warned: "That may, in practice, negate current rules and regulations prohibiting domestic communications surveillance by national intelligence agencies."

The evidence that the Electronic Frontier Foundation will use to challenge AT&T's alleged part in this international system consists of a testimony and supporting documents provided by a former AT&T worker who allegedly stumbled across a secret monitoring room operated by the NSA at the telco's San Francisco office.

The NSA system defended by Hayden yesterday is alleged to operate in much the same way as the international Echelon network that has worried foreign governments for years, using keywords to scan the millions of emails, phone calls and faxes transmitted across the network every day. They are both also unaccountable. The only difference, according to Hayden, is that the NSA's snooping of US citizens' communications is for the sole purpose of weeding out al Qaeda plots and terrorists.

AT&T and two other US telcos, Bell South and Verizon, this week denied handing phone records over to the NSA.

The ThinkProgress blog reported yesterday that on 5 May President Bush signed a presidential memorandum authorising, by the order of his director of intelligence, companies "to conceal activities related to national security." ®

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.