Tag Archives: FISA

A new service

The AP news just gave me an idea, well an idea for all of us as I am making it public domain right now. You see, that dim witted bully might have ‘protection’, loads of lawyers and options. But a lot of us in all walks of life do not. So what if there was a service that could aid us? In this the article ‘Court rejects Trump’s efforts to keep records from 1/6 panel’ it is about “keeping records from”. You see in this digital world you CANNOT keep things from anyone, data will be gotten to, but what if that changes? 

Consider the image

Cloudcypher

We see three elements, the cloud where the goods are, the connector (your computer, phone or tablet) and the data on USB stick or micro SD card. Now we can get robbed, we can get hacked and places get intruded on, but all three? So you can keep details and information safe, especially when the three settings are different placed. And all three are required to get ALL the information. The stick or SD card has an encryption file that is created through the cloud, more importantly it has elements that YOU need to remember, passwords, a pass phrase in two locations. Now we are off to the races, There are vault solutions that have this, but it is always local and I for one believe in these settings, but it is not always a great idea. So what if someone offered the service, yet the cloud version can never be accessed without the other two. The other two CAN rebuild the file, yet that will take time and the original is up to you what you do with it. A service I call CloudCypher. A place where anyone can safe their important goods. Images, documents, solutions, IP and many other settings there are pretty much millions who have such elements. Consider a place in the clouds that can be accessed anywhere in the world if the other two are presented, a solution in three parts.

Now there are always options to sink this solution, there are always alternatives yet I did not find anywhere or any place that this was offered. Yet some have access and in a state and place where the US is pretty much bankrupt. It was Jockum Hildun, at the University of Helsinki, Finland who gave me the idea. He gave me “public authorities cannot readily move their operations to the cloud and use the services of US companies because sensitive personal data of Swedish citizens could be transferred to US law enforcement without Swedish judicial review”, I knew this already, but I never gave it much thought, yet the danger of the US nationalising IP and more in the next year gave me the idea to eep other things from them. In this the Commonwealth has options for new services, but they cater to the yanks a little too easy. Scandinavia is an option but so are the zero tax states. Confidential services can remain confidential if the cloud server is in a place the US cannot touch and if the solution is in three parts the US has no access (and neither does Russia or China for that matter). There are several nations that could cater to this, but that made me consider a truth we hear in the movie the Patriot (with Mel Gibson). Why would I change my life with one tyrant 8000 miles away when I optionally end up with 8000 tyrants a mile away. There is truth in that and the option is to have a solution where no one has access, only the owner does and no matter what happens without the owner there is no access and there is one weakness, if any of the key elements are lost, then so is the data, but that is with EVERY vault. 

I checked and no one offers this service, so for anyone with a cloud server system, this is your option to add to your services and for a few $$$’s you might get more long term clients, not the one that need your cloud solutions, but the future is always fluid, at this point they are with you and how you treat them will be the setting that keeps them with you, it is up to you.

Leave a comment

Filed under IT, Science

NSA linked to corporate dangers?

The Netherlands are facing a new issue, one that they had not bargained for. It is my personal view that the matter at hand seems to be getting misrepresented, so I need to do something about it.

First let us take a look at the reported facts.

On Saturday 21st September the Dutch NOS reported on TV and on their website on how the Dutch are opening their doors to the NSA (at http://nos.nl/artikel/553680-nederland-opent-deur-voor-nsa.html) The issue is that on business grounds the Amsterdam Internet Exchange is considering opening an office in the US, which would under the FISA all their servers open to investigation by the NSA. In that scenario all of the Dutch internet traffic can at that point be monitored by the NSA.

The first question that comes to mind is what the exact benefit is to open an American office. I wonder why that step is so essential. That reason might be very valid, I just do not know.

The danger is not ‘privacy‘ as such. So many people keep on blabbing on how their privacy is so much in danger. I think that remains to be grossly exaggerated. The additional issue raised by the NOS on their Saturday broadcast (which was not on their website) is a different matter. In there the mention was made by Nico van Eijk from the University of Amsterdam, where British executives from an online gambling site, something that is perfectly legal in England, is not legal in the US and when these executives were in the US on business for other ventures, they got themselves arrested. This info can be found at http://www.cato.org/blog/uk-gambling-ceo-arrested-us-airport. The important quote here is “the U.S. has exploited those treaties to effectively kidnap British citizens who broke no British laws, and extradite them to the U.S. for trial on charges of violating U.S. law“. There is of course another legal side to this. Did David Carruthers actually enable these transgressions of law? Connected to this is the Mark Emery case, which involved a Canadian ‘evangelist’ for medical Marijuana. Did either enable US business?

A quote from the UK’s Daily Mail gave us “Investment bankers Goldman Sachs says that the clampdown by the American authorities could mean ‘that the US could cease to be a viable market for online gaming companies.’ That would be tantamount to destroying the earnings of the main firms since 70% of them originate from the United States.

The two sides here are that in the first degree these companies do rely on their American market. Knowing that the events were illegal, going to the place looking out for you was not really that bright was it? The second was that the statement came from Goldman Sachs. Bringers of the popular gambling option ‘soon, because of our bad judgement, you no longer own a house‘. Seems a little warped doesn’t it?

We could of course come to the notion that the NSA executive is riddled with spineless paperbacks, not a hardcover amongst them! But the reality is not that clear. In actuality, the game they could end up playing is a lot less appealing for those outside of the US.

For that part we need to take a look at the NSA website (certain parts of it) and to start we need to look at a document that came from the Defense Technical Information Center in Fort Belvoir Virginia. This document called “2009 National Intelligence, A Consumer’s Guide“, where at page 52 it states “The Act specifies that OIA shall be responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and foreign counter-intelligence information related to the operation and responsibilities of the Department of the Treasury.

Now add the information on the mission statement from the treasury as displayed by the white house. “Support the Department of the Treasury’s mission to promote economic prosperity and the financial security of the United States” this is only part of that mission statement, but by itself it is just as valid. The two now give them additional possibilities through the NSA.

That part is seen on the actual website of the NSA and specifically a department called the ‘Information Assurance Business Affairs Office‘ (at http://www.nsa.gov/ia/business_research/ia_bao/index.shtml), here we see the following parts:

1. The IA Business Affairs Office (BAO) is the focal point for IA partnerships with industry. It also provides guidance to vendors and the NSA workforce in establishing IA business relationships and cultivates partnerships with commercial industry through demonstrations and technical exchanges.

2. The benefits of working with the BAO are (two of them):

  • Increased product marketability
  • Assistance in the development of next generation solutions

These are only part of the mission. They do a lot more. So in the upcoming age where the world will revolve on big data and parsing information, US businesses might get the option to get access to Exabyte sized data, marketable, distributable and sell-able. The intelligence side of the US was never the problem. The corporate side, for which I have tried on several occasions to warn others about (like ‘the Google’ and ‘the Facebook’) will get access to information and innovation on a global scale.

When we consider the utter inability by the US government to get their own spending under control (not just them mind you). As they are now closer and closer on the edge of bankruptcy (17 trillion in national debt will do that to anyone), their own treasury will only need to receive just one mandate ‘to grow and assure the continuation of the United States and its economy‘, which is already part of the treasuries mission statement. In the age where the current president is so polarised against his opposition, where he is adamant that spending is the only option, he will not hesitate to speak these words (can’t really blame him, can I?). It is decently likely that this would give specifically assigned parts of corporate America the option to market Petabytes of data. Outside of the US, the industrial age would then collapse in a way you cannot even imagine. They could globally sell lists on scales no one can compete with. Consider the future to have one provider in data; the ripple effect in the industry would be devastating. However bad you think you have it is nothing compared to what happens if the thought I am having is a reality. Consider the data files people created. The issue I was confronted with yesterday is that someone saw a nice design on a 3d printer and he wanted to use it, but it was not his design. The help file contained the info I expected it to have. All files from that program were to be considered shareware/freeware and could be used and distributed freely. The software maker had done this to avoid liabilities. It made perfect sense. He made a program he wanted people to use, he did not charge anyone for it and to avoid people coming after him for being nice, he made it all freeware. But whoever designs in that program, those data files are freeware too. So anyone can use it. How many programs do you think are out there built on that principle? Now consider those artistic idea’s, traded freely and there is nothing you can do about it.

That was part of the fear I had and as almost EVERYONE gave away their rights on social media, who profits? It seems to me, not the creator!

But then those in social media opted for that, however those on corporate networks and business internet connections did not opt for such futures. The question is, how protected are they from misuse of their data?

So how long until it is no longer about finding terrorists?

 

Leave a comment

Filed under Finance, IT, Law, Media, Politics

FISA? Gezundheit!

 

In a column for ‘all things D‘ (democratic I guess), Arik Hesseldahl wrote an article called ‘Microsoft and Google Will Sue U.S. Government Over FISA Order Data‘. A decent article! I did not completely agree with it, but the man wrote a decent story of his view and he was not playing the ‘spin’ game. I can respect that, even if I do not agree. The same could be said for Bill O’Reilly. I do not always agree with him either, but his clear and clear outspoken views are valuable to hear. So, in the case of Hesseldahl I responded.

The response (from another reader), which was “Your analogy is accurate, but your point is misguided. The government was afforded specific rights by the people via FISA laws. Not only were those rights abused, but activities outside the scope afforded them were taken, and are therefore illegal.” was interesting to read. There was more than that, but basically I was the misguided one.

Fair enough!

So let’s take a legal look at this Foreign Intelligence Surveillance Act (FISA), especially the amendments which are extended until July 2015. It is the work of Edward Liu, who is currently the Legislative Attorney at the Congressional Research Service.

The initial find where this all starts can be found on page 4 of that work “National security letters, which are analogous to administrative subpoenas and are authorized by five federal statutes, require businesses to produce specified records to federal officials in national security investigations.

I will ignore the footnotes, as they will just delay. The important one for this quote refers to “Legal Background and Recent Amendments, by Charles Doyle“. The person not agreeing with me relied on the quote “but activities outside the scope afforded them were taken“. Was it? Let us not forget, this is about Foreign Intelligence. Google, Facebook, MSN are global organisations. Collecting and servicing billions (with 330 million US citizens, we can clearly state that there is a massive amount of foreign involvement).

The next part is how this is about transgressions on US citizens. Is it really? These Americans, mostly innocent people, include a fair amount which are playing fake identities, often trying to impress women showing the sexiest outfits. This is not wrong, illegal or questionable (actually, that might be a case), yet many of those profiles are linked to people not being those people at all. Some are criminals collecting identity details, some are simple scammers and possibly 1 out of roughly 734 will really be that woman, 1/734 is not that good an odd. The alphabet groups do not really care about these parties, but when we consider that some of these tactics are employed by the very terrorists and the supporters they are trying to find it becomes a new ball game.

Page 5 of that document gives us the next little snack “During the examination of the events leading up to the attacks, it was reported that investigations regarding Moussaoui’s involvement were hampered by limitations in FISA authorities.“, so accepting that, then finding these dangers require a little more than they are now getting.

That gem is presented on page 9 of the aforementioned document.

In United States v. Petti, the U.S. Court of Appeals for the Ninth Circuit was presented with a challenge to a roving wiretap under Title III alleging that roving wiretaps do not satisfy the particularity requirement of the Fourth Amendment. The court initially noted that the test for determining the sufficiency of the warrant description is whether the place to be searched is described with sufficient particularity to enable the executing officer to locate and identify the premises with reasonable effort, and whether there is any reasonable probability that another premise might be mistakenly searched.
Applying this test, the Ninth Circuit held that roving wiretaps under Title III satisfied the particularity clause of the Fourth Amendment. The court in this case relied upon the fact that targets of roving wiretaps had to be identified and that they were only available where the target’s actions indicated an intent to thwart electronic surveillance.

The latter part was also a footnote link to United States v. Bianco, 998 F.2d 1112, 1124 (2nd Cir. 1993) (similarly holding that a provision authorizing roving bugs under Title III was constitutional)

So why are Americans so set upon claiming illegality?

My initial response was about people bragging on Facebook the 243.1 ‘stupid’ things they do to every Tom, Dick and Harry and then nag about the fact that the government takes a look. It was never about them, but about finding those attacking America. It seems to me that many of these people are way too eager to complain when they are asked to help keep their nation safe.

From my point of view all Americans should hand their on-line ‘data’ to the NSA.

Why?

Well, consider the field of predictive analytics. If we are to flag a terrorist, then we need to know the data that makes for non-terrorists too. Whether this profile data concerns a horny student, an adulterous husband/wife, a fence not the one in the garden), a carjacker, a geek or an average parent. If the system has ALL the facts, the more we know, the more pronounced an identifying flag becomes. If predictive analytics is about finding the odd one out, then basing the search on grey people alone will not do, or at least will result in many flags that need more checks. So if we accept that this is about the need to analyse current and historical facts to make predictions about future or otherwise unknown events, then we must have all the data. If we know what a US Apple Pie eating and cuppa Joe drinking person does, then we can see many more elements. This all reflects on our acts on-line and off-line. They will give us a line that raises flags. Flags based upon things we do and even more flags on things we are not doing. That results in a picture!

Now wonder, why are you against helping your nation?

Is this about your privacy? If so, then why are you on Facebook/Google+? These places are to share with friends and THEIR friends (so often your data is shown too many more then you anticipated/expected. In addition, many seem to incorrectly use Facebook a lot more often then they think, which in turn means that your birthday party invitation went to 17 million connected people (it happened in the US, the Netherlands and a few other places, and it happened more than once).

And those so called ‘criminals’ claiming privacy? Well the previous case actually left those in power as Amendment 4 transgressions were about “intent to thwart electronic surveillance.” we are not talking about the level the ordinary criminal goes through. This is avoidance on levels that require highly advanced router hacking skills. Can it be used by both? Yes it can, but let us not forget that the court judge could throw some of these facts out in court at a moment’s notice, giving the alleged bank robber a free out of jail card on the spot. The NSA (and peers) know this and they have ZERO interest in these types. They care about the next attack that will come at some point. They just want to figure out when, where and by whom!

If you are still worried about all this, then consider the amendment as discussed on page 14. “a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to a [foreign intelligence, international terrorism, or espionage investigation.]” So in case of those ‘excited’ students fearing privacy, when was the last time you tried to C-4 her lingerie drawer so that your date arrived without panties? If not, then why worry? (Apart from the small fact that you should not be having access to C-4 to begin with).

So, I disagreed with the assessment made on my response, which remains fair enough. I believe that intelligent people on both sides of the isle can come to wisdom. Whether you stand next to the NSA council, or you side with a civil-libertarian. The origin of UCLA proves the need for civil liberties in no lesser degree. I personally believe that the wisdom is somewhere in the middle. The only part that I never agree with are those blindly hiding behind the quote from Benjamin Franklin “They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” The quote is wise, but based on another age where there were clear nations, clear missions and where life did not revolve around greed. Because considering the events from the past few years we see more and more correlation with terrorism enabled through desired greed than anything else, for the greedy will only remain loyal to the currency they worship, a simplistic life without true values.

 

Leave a comment

Filed under Law, Media, Military

The Data Intelligence bill

GCHQ_StampBThe events that occurred in Woolwich have sparked more than just one debate. The new debate is involving the additional powers that Home Secretary May wants to hand to the intelligence branch. It involves a data bill that was vetoed by the Deputy Prime Minister Nick Clegg. He stated that it was too much of an invasion of privacy.

Is he correct?

Initially I would side with that part. Yet, you cannot have it both ways. There is a plain and simple need to keep England’s citizens safe from radicalised attacks. The issue of Home grown terrorism had been an issue going back to Sir Jonathan Evans reign of MI-5. He was more than just a little concerned with outside influences on the British way of life. This now falls firmly on the shoulders of both Andrew Parker, who is well aware of the issues as well as the needed response and Sir Iain Robert Lobban of GCHQ. As this is Signal intelligence and as such it falls in his lap as the data would be needed for MI-5, MI-6 and some parts of local law enforcements.

I would think that part of this bill will start with Lord Carlile. His involvement in this goes back to the Terrorism Act of 2000. Current issues are ‘tainted’ by two reports and as such they both are important. First there is the National council of Civil Liberties that drafted a response to the definition of terrorism, which seems to have been the work of Gareth Crossman and Jago Russel. You should take a look at it (source: http://www.liberty-human-rights.org.uk/pdfs/policy06/response-to-carlile-review-of-terrorism-definition.pdf). It is an interesting work, and important to read is how they see this all. Part of the weakness is the approach on page 3 where they state: “It is vital that the definition of ‘terrorism’ is drawn as tightly as possible“. It is a decent stance to have, yet in the light of fear against home grown/lone wolf terrorism it is actually counterproductive. Terrorism is a shifty acre of quicksand and the strict approach is not only going to fail, it will get the people involved stopping this drowned. Not a good thing me thinks!

I feel uncertain to the point 6 they make on page 5. Yes, they do state that it is outside of the scope of the document, and as such they only raise the comments made that Terrorism should be dealt with under Criminal law. Here is where I might be the dissenting voice. The law should cover all, I do believe in that, however, what part of law? We are dealing with a group that does not seem to be categorised as such. These people are not transgressing in a way where we approach a normal person, or even the average person. Whilst we approach these transgressors in one way or another, even when if possible their defence starts going into the Mental Health act we will see a case where the court is drawn into years of litigation and dealing with a case that as such should be seen as a non-combatant involved in hostile military actions against civilians with no allegiance to any nation and as such it becomes a mess where each case locks down the justice system more and more. Consider the American situation (Foreign Intelligence Surveillance act). This comes from a special report by their Justice department stated in June 2005.

This allowed the use of FISA information in a criminal case provided that the ‘primary purpose’ of the FISA surveillance or search was to collect foreign intelligence information rather than to conduct a criminal investigation or prosecution. The seminal court decision applying this standard to information collected in intelligence cases was issued in 1980. See United States v. Truong Dinh Hung, 629 F.2d 908 (4th Cir. 1980). In this case, the Fourth Circuit Court of Appeals ruled the government did not have to obtain a criminal warrant when ‘the object of the search or the surveillance is a foreign power, its agents or collaborators,’ and ‘the surveillance is conducted primarily for foreign intelligence purposes.’ Id. at 915. However, the court ruled that the government’s primary purpose in conducting an intelligence investigation could be called into question when prosecutors had begun to assemble a prosecution and had led or taken on a central role in the investigation.

This shows that the narrowness of the scope would be the obstacle we should be trying to prevent. The issue is NOT our privacy at that point; it is all about them having access to go after the right people. This requires them to blanket us with collection of data. Even though the data is all collected, it will turn out that 99.9% might never be accessed. Having it is however essential for their success of stopping terrorist attacks. So when the Sky News UK reporter Stephen Douglas mentioned “are they playing politics with fear” then he is in my humble opinion incorrect. This data bill has been needed for a long time. It can even be safely speculated that MI-5 could have intervened with the Kenyan involved in the Woolwich murder at an earlier stage as more flags would have been raised. Their interview with him would have led to other questions, confirmations of danger. That seems to not have happened at this stage.

So from the civil liberty document we move to document cm7058 from June 2007 which holds “The Government Reply to the Report by Lord Carlile of Berriew Q.C. Independent Reviewer of Terrorism Legislation The Definition of Terrorism“. (Source: http://www.official-documents.gov.uk/document/cm70/7058/7058.pdf). My issue is with point 5 on page 5. Idiosyncratic terrorism imitators should generally be dealt with under non-terrorism criminal law. This is the point that shows the need of the data bill. Especially when we consider Lone wolf or Home grown terrorists there will be the issue whether the person was a mental health wannabe, or a more intelligent individual being allowed a second go at harming groups of people, after civil rights protected him the first time.

So even if we want to give strength to both Nick Clegg and the National council of Civil Liberties. They are there speaking out to protect your rights. Yet, in that process, they are giving strength and freedom to terrorist attacks like the one in Woolwich (not intentionally). This issue is like a seesaw. These two viewpoints are utterly opposing and as we give power to one, we remove it from the other. The interesting part is that the information we surrender will not harm us unless we support terrorism. Should that not convince you then please remember that you have already given away your privacy to most market research and financial institution data centres. They only want your money, or in a product driven way bank you. The intelligence community wants to keep you safe. In my mind, there is no debate. The data bill is likely to come and should be there, if only to prevent a second Woolwich.

Leave a comment

Filed under Law, Media, Politics