Anzeige gegen unbekannt

Criminal complaint filed against unknown persons, charge filed against “X.” The first hoovered-data German citizen complaint against persons unknown has been filed in the town of Gießen. Meanwhile, the federal prosecutors’ offices in Karlsruhe [Bundesanwaltschaft] are investigating US and UK surveillance of German data. A federal prosecutor spokeswoman confirmed they’re looking into the programs Prism, Tempora and Boundless Informant, inter alia.

(ON ts eye geh   gay gen   OON beh con t.)


“Tear line,” used in encrypted NSA emails that contained information acquired by the NSA’s ~2001 to ~2011 bulk internet and telephony surveillance (technically possible but considered unethical in the 1990’s but then authorized by the Bush administration on 04 Oct 2001 as what became the “President’s Surveillance Program,” later “Stellar Wind”). The NSA’s Inspector General wrote in a draft 2009 report that at first the NSA merely responded to FBI and CIA questions by emailing answers that used PSP-obtained information but didn’t say where they’d learned it, and thus the program was “hidden in plain sight.” Later, the FBI and CIA wondered where this information was coming from, so the NSA used a so-called “tear line” to send bulk-surveillance info and “sanitized” info in the same email.

Why only the FBI and CIA are mentioned in this NSA report, over and over, is unclear to me because the US has more such agencies than that. The Office of the Director of National Intelligence’s website currently lists 17 “agencies and organizations,” for example, and those appear to be umbrella organizations as well. During the Bush administration attempts were made by powerful bureaucrats such as Donald Rumsfeld to move intelligence work away from the CIA to the Pentagon. What was created at Defense and how did it morph as the years passed? How was it outsourced beyond government into private contractor companies? And what about “public-private” combinations such as the industry-funded INSA (Intelligence and National Security Alliance), “one of the only business associations in Washington that include current government officials on their board of directors” according to Tim Shorrock in Spies for Hire: The Secret World of Intelligence Outsourcing (2008).

(Ob riss LIEN ee eh.)

Kontaktketten klarstellen

“Contact chaining analysis,” what the NSA did with the networks of relationships disclosed by the bulk Internet metadata it collected from ~2001 to ~2011, according to a draft of a 2009 report by the NSA’s inspector general.

In case you were wondering, the IG report defined contact chaining as

“the process of building a network graph that models the communication (e-mail, telephony, etc.) patterns of targeted entities (people, organizations, etc.) and their associates from the communications sent or received by the targets.”

“Additional chaining can be performed on the associates’ contacts to determine patterns in the way a network of targets may communicate. Additional degrees of separation from the initial target are referred to as ‘hops.’ For example a direct contact is one hop away from the target. A contact of the direct contact would be described as being 2 hops away from the target. The resulting contact-graph is subsequently analyzed for intelligence and to develop potential investigative leads.”

The inspector general’s report said internet metadata was one of four types of domestic and international data vacuumed up by the NSA between ~2001 and ~2011. With occasional stops and/or restarts of one or the other category due to technical problems or legal concerns on the part of e.g. the FISA court, the NSA acquired: internet metadata, telephone metadata, internet content and telephone content.

(Con TALKED kett en   KLAH shtell en.)

Blog at