SERVICESECTOR4@Yahoogroups.com
(NATION LIFE Service Sector)



Andy Greenberg
Andy Greenberg, Forbes Staff
Covering the worlds of data security, privacy and hacker culture. 
6/25/2013 @ 12:40PM 

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far

As tense as Snowden's spy thriller may be, it doesn't compare to the story revealed in the content of his leaks. Credit: Scott Troyer
A leaker as fascinating as Edward Snowden is his own worst enemy. The world has become so caught up in the suspense and intrigue of the Snowden Affair–practically a ready-made Robert Ludlum title–that it seems to have almost forgotten the massive National Security Agency surveillance controversy that he’s risked his future to bring to light.
On Tuesday morning, Russian president Vladimir Putinconfirmed that the 29-year-old whistleblower is now in Moscow’s airport after disappearing from his temporary refuge in Hong Kong Sunday. His supposed flight from Russia to Cuba, in another spy novel twist,seems to have been a ruse. And WikiLeaks’ Julian Assange, who has taken Snowden under his wing and helped to arrange his escape from America’s long legal arm, has confirmed that the former Booz Allen Hamilton employee is seeking asylum in Ecuador.
So now is as good a time as any to take an intermission from the drama and recall the real story: the biggest global privacy scandal of the decade. Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–butspecifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data includes “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the programshowing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Postdocuments that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
Related on Forbes:

The NSA’s Slideshow Explaining Its PRISM Surveillance Program

1 of 4
PRISM Slide 1

PRISM Slide 1

41 slides from a NSA data-collecting program were leaked to the Guardian and the Washington Post. The program, called PRISM, shows the extent of the agency's reach into the communications of American citizens.