6/7/13 Actionable Intelligence


U.S., British intelligence mining data from U.S. Internet companies in broad secret program
“They quite literally can watch your ideas form as you type,” the officer said. Firsthand experience with these systems, and horror at their capabilities, is what drove the career intelligence officer to provide PowerPoint PRISM slides and supporting materials to The Washington Post...
6/7/13 12:30:14 pm, Barton Gellman, http://www.washingtonpost.com/investigations/us-intelligence-mining-data...
...London’s Guardian newspaper reported Friday that GCHQ, Britain’s equivalent of the National Security Agency, has also been secretly gathering intelligence from the same internet companies through an operation set up by the NSA...An April 2013 internal presentation of 41 briefing slides on PRISM intended for senior analysts in NSA’s Signals Intelligence Directorate, described the tool as the most prolific contributor to the President’s Daily Brief, which last year cited PRISM data in 1,477 items. According to slides and other supporting materials obtained by The Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports...a remarkable figure in an agency that measures annual intake in the trillions of communications... all the more striking because NSA, whose lawful mission is foreign intelligence, reaches deep into the machinery of US companies that host hundreds of millions of US--held accounts on US soil...
Government officials and the PRISM document itself made clear that NSA regards the identities of its private partners as PRISM’s most sensitive secret, fearing the companies would withdraw if exposed. “98% of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing author wrote in his speaker’s notes....
Reporter Barton Gellman talks about the source who revealed this top-secret information and his belief that his whistleblowing is worth whatever consequences are ahead.
NSA leak: Source believes exposure, consequences inevitable
VIDEO http://www.washingtonpost.com/video/thefold/nsa-leak-source-believes-exp...


Top Secret Document Discloses Depth Of US Government Surveillance
NSA Taps In To User Data of Facebook, Google and Others
6/6/13 By Glenn Greenwald and Ewen MacAskill http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data 
The PRISM document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.The PRISM program allows the NSA, the world's largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.With PRISM, NSA can reach directly into the servers of the participating companies and obtain stored communications as well as perform real-time collection on targeted users.
Disclosure of the top secret PRISM program follows a Wednesday leak to the Guardian of a top-secret court order compelling telecom provider Verizon to turn over the telephone records of all US customers. Unlike the collection of call records, PRISM surveillance can include content of communications, not just metadata...Companies are legally obliged to comply with requests for users' communications under US law, but Prism gives intelligence services direct access to companies' servers. The NSA document notes that the operations have "assistance of communications providers in the US"....defenders of the FISA statute argued a significant check on abuse would be NSA's inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But PRISM renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies' servers.
A chart prepared by the NSA, contained in the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, credit card, social networking details, video and voice chat, videos, photos, voice-over-IP chats, file transfers and more....The document shows the FBI acts as an intermediary between other agencies and tech companies, and stresses its reliance on the participation of US internet firms, claiming "access is 100% dependent on ISP provisioning"....
ACLU's Jameel Jaffer said "NSA is part of the military...being granted unprecedented access to civilian communications...unprecedented militarisation of the communications infrastructure...

NSA Reportedly Mines Servers of U.S. Internet Firms For Data
6/6/13 by Bill Chappell http://www.npr.org/blogs/thetwo-way/2013/06/06/189321612/nsa-reportedly-...
The newly disclosed highly classified' U.S. NSA program, PRISM, is described in a government Powerpoint presentation whose 41 slides bear the "Top Secret" label....Another slide identifies PRISM by its full name, PRISM/US-984XN....None of the companies who allegedly provide data commented on PRISM. The Guardian reported that those responding to a "request for comment on Thursday denied any knowledge of any such program." Government officials also refused comment according to The Post.
A chart in the slideshow reportedly identifies high-profile companies that provide data for PRISM, with the dates they began giving U.S. agencies the information. Twitter is not on the list, which includes most of the biggest players in web communications, search, and social media:
Microsoft - 2007
Yahoo - 2008
Google - 2009
Facebook - 2009
PalTalk - 2009
YouTube - 2010
Skype - 2011
AOL - 2011
Apple - 2012

6/6 Update 8:35 p.m. ET. Companies Deny providing NSA direct access to their servers

6/6 Update 10:30 p.m. ET. Director of National Intelligence James Clapper called Leaks 'Reprehensible' His statement said in part "The unauthorized disclosure of information about this important legal program is reprehensible and risks important protections for the security of Americans."

SILENCE IS DEADLY: the purpose of datamining is for actionable information
"Massive Surveillance State":
VIDEO Glenn Greenwald Exposes Covert NSA Program ....

Google, CIA Invest in 'Future' of Web Monitoring
7/30/10 abcnews.go.com/ Technology/ google-cia-invest-future-web-monitoring/ story?id=11282830 -
The CIA investment arm In-Q-Tel (IQT) and Google back Recorded Future Co. that monitors the web in real time and says it uses that information to predict the future. Recorded Future strips from web pages the people, places and activities they mention, examines when and where these events happened ("spatial and temporal analysis") and the tone of the document ("sentiment analysis"). Then applies some artificial-intelligence algorithms to tease out connections between the players. Recorded Future maintains an index with more than 100 million events, hosted on Amazon.com servers. The analysis, however, is on the living web...."We can assemble actual real-time dossiers on people." ....
Long before Google reportedly enlisted the National Security Agency to secure its networks, Google sold equipment to the secret signals-intelligence group. In-Q-Tel backed the mapping firm Keyhole, which was bought by Google in 2004 — and then became the backbone for Google Earth....US spy agencies, through In-Q-Tel, have invested in a number of firms to help them better find information. Visible Technologies crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, YouTube, Twitter and Amazon. Attensity applies the rules of grammar to the so-called "unstructured text" of the web to make it more digestible by government databases. Keyhole (now Google Earth) is a staple of the targeting cells in military-intelligence units....

Google has lots to do with intelligence
3/30/08 by Verne Kopytoff, http://www.sfgate.com/business/article/Google-has-lots-to-do-with-intell...
Google was contracted by the government to provide servers to support Intellipedia. Google also provides the software to search Intellipedia, which ranks results based on user created tags....Many of the government contracts are for Google search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth....Spy agencies are using the Google equipment as the backbone of Intellipedia network helping agents share intelligence..."Each analyst, for lack of a better term, had a shoe box with their knowledge," said Sean Dennehy, chief of Intellipedia development for CIA. "They maintained it in a shared drive or a Word document, but we're encouraging them to move those platforms so everyone can benefit."

Analyzing Intelligence: Origins, Obstacles, and Innovations, published in 2008 by experts in the field of intelligence analysis, cited Intellipedia as evidence of the changing nature of analysis

Intellipedia uses the same open source software technology as Wikipedia. However, unlike Wikipedia, only individuals with proper security clearance can read, edit, and write articles.
Intellipedia encompasses three different wikis: JWICS, Top Secret network; SIPRNet, used by the State Department and Department of Defense on a more day-to-day basis; and Intelink-U, a sensitive unclassified network originally part of Open Source Intelligence (OSINT)...Intellipedia's strength comes from its ability to share information and pool experts’ analysis on issues different agencies and individuals face, in real time. On average, Intellipedia experiences around 5,000 edits a day as intelligence posts questions, answers, and suggestions to pressing intelligence issues. Out of the three wikis the top secret, JWICS is the most active with over 400,000 pages and 57,000 user accounts.

partners already, Google greenlighted US cyberwar
Report: Google, NSA talk defense partnership
2/3/10 http://news.cnet.com/8301-1009_3-10447279-83.html
Google is finalizing an agreement with the National Security Agency (NSA) to help the search giant ward off cyberattacks, according to the Washington Post..to analyze a cyberattack on Google the company said originated in China...White House Director of National Intelligence Dennis Blair said the attacks on Google were a "wake-up call" that the U.S. is severely under threat of greater cyberattacks. Cyberspace cannot be protected, he said, without a "collaborative effort that incorporates the U.S. private sector and our international partners."Blair detailed a list of adversaries on the cyberwar front, including nations, terrorist networks, and organized crime groups, who all have the knowledge and means to attack U.S. networks to disrupt operations and steal sensitive information....

'information assurance' for the state via transparent state-sponsored media propaganda
Google to enlist NSA to ward off attacks
2/4/10 By Ellen Nakashima, http://articles.washingtonpost.com/2010-02-04/news/36786801_1_google-att...
...An agreement would mark the first time Google entered a formal information-sharing relationship with the NSA, sources said. In 2008, the firm stated it had not cooperated with the NSA in its Terrorist Surveillance Program. Sources familiar with the initiative said the focus is not figuring out who was behind the recent cyberattacks -- doing so is a nearly impossible task after the fact -- but building what technicians call "information assurance" for Google networks....Over the past decade, other Silicon Valley companies have quietly turned to the NSA for guidance in protecting their networks...Sources said NSA is reaching out to other government agencies that play key roles in the U.S. effort to defend cyberspace and might be able to help in the Google investigation, including the FBI and the Department of Homeland Security...Despite such precedent, Matthew Aid, an expert on NSA, said Google's global reach makes it unique...

DOJ Asks Court To Keep Secret Any Partnership Between Google, NSA
3/9/12 http://legaltimes.typepad.com/blt/2012/03/doj-asks-court-to-keep-secret-...
The Justice Department is defending the state's refusal to discuss—or even acknowledge the existence of—any cooperative research and development agreement between Google and the National Security Agency.

Executive Order -- Assignment of National Security and Emergency Preparedness Communications Functions
Presidential Policy Directive (PPD) for developing a long-term strategic communications policies, programs, and capabilities NS/EP (NS/EP)
7/6/12 http://www.whitehouse.gov/the-press-office/2012/07/06/executive-order-as...

Executive Order Grants Authority to Seize Private Communications Facilities
Electronic Privacy Information Center http://epic.org/2012/07/executive-order-grants-authori.html
The White House has released a new Executive Order seeking to ensure the continuity of government communications during a national emergency. The Executive Order grants new powers to the Department of Homeland Security , including the ability to collect certain public communications information. Under the Executive Order the White House has also granted the Department the authority to seize private facilities when necessary, effectively shutting down or limiting civilian communications. In 2011, Congress considered similar provisions in cybersecurity legislation, which would have allowed the government to disconnect communications traffic in times of national security. Following public protest, congress abandoned the proposal. For more information, see EPIC: Cybersecurity Privacy Practical Implications .

U.S. Army Training in Urban Operations
1/4/13 U.S. Army http://publicintelligence.net/usamps-epw-ci-policy-operations/

“Civil Disturbance Operations"
Leaked 2006 US Army Military Police training manual outlines how military assets will be used on U.S. soil during in the event of riots, civil unrest or a declaration of martial law... “breaking up unauthorized gatherings and patrolling the disturbance area to prevent the commission of lawless acts ...during operations to restore order, military forces may present a show of force, establish roadblocks, break up crowds, employ crowd control agents, patrol, serve as security forces or reserves, and perform other operations as required.”...
U.S. Army FM 3-19.40 Internment/Resettlement Operations outlines how internees would be “re-educated” into developing an “appreciation of U.S. policies” while detained in prison camps inside the United States....Page 20 rules regarding the use of “deadly force” confronting “dissidents” ...“Warning shot will not be fired.”

"oppose surveillance, our final solution for 'terrorist suspects' is the "disposition matrix"
as leaks overshadow Obama's plans to make China admit cyber-espionage
US Spy Chief Calls Leaks "Reprehensible"
James Clapper, Director of National Intelligence, defends programs crucial to US anti-terror activities, warns their exposure threatens national security...

National News Alert
Obama defends NSA Internet, phone surveillance programs
6/7/13 http://www.washingtonpost.com/blogs/post-politics/wp/2013/06/07/obama-no...
President Obama defended National Security Agency programs that gather data from U.S. phone and Internet companies, saying reports have been "hyped"... “Nobody is listening to your telephone calls” The Washington Post reported Friday that the National Security Agency and FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs...

US 'paper of record' salivates its masters' voice attacking Greenwald
Blogger, With Focus on Surveillance, Is at Center of a Debate
After writing intensely, even obsessively, for years about government surveillance and the prosecution of journalists, Glenn Greenwald has suddenly put himself directly at the intersection of those two issues, and perhaps in the cross hairs of federal prosecutors....

solid proof - details to come -only anti-american 'terrorists' oppose imperialist security
NSA Tracking Helped Stop Terrorist Attack in US
House Intelligence Committee Chair Mike Rogers said NSA tracking Verizon telephone records helped thwart a "significant domestic terrorist attack within the last few years."
Rogers declined to share more information on the nature of the attack