The Burglary (92 page)

Read The Burglary Online

Authors: Betty Medsger

BOOK: The Burglary
9.13Mb size Format: txt, pdf, ePub

PEOPLE IN OTHER COUNTRIES
were enraged when they learned from reports on the NSA files that the agency had conducted blanket surveillance not only of some European countries but
at thirty-eight embassies and missions, describing them as “targets.” These efforts were aimed not only against countries that might be expected to be U.S. adversaries, but also against the embassies of U.S. allies—France, Italy, Greece, Japan, Mexico, Brazil, South Korea, and Turkey and European Union missions and home offices.

NSA surveillance of the EU has been extensive. It took place at the union's offices in Washington, at the United Nations, and also at its offices in Brussels. In order to hear and record discussions, NSA installed bugs in EU meeting rooms at its Washington office. Its computer network was infiltrated, giving the American intelligence agency access to emails and documents generated on EU computers. Antennas were installed to collect transmissions. The same methods were used at the Brussels headquarters of the EU and were directed from the nearby headquarters of NATO.

In collaboration with Britain's GCHQ, the NSA spied on international heads of state who attended
two London conferences. The spy agencies monitored the leaders and their staffs by, among other methods, setting up an ersatz Internet café for the participants. As the leaders used the café's computers, all communications executed from the computers were collected by the spies, thanks to interception software that had been installed on them by the NSA. In addition, at one of the London conferences, forty-five intelligence analysts intercepted the leaders' cell phone calls and tracked who they were calling.

Germans reacted with more outrage than any other people to the revelations that they were under NSA surveillance. According to one of the agency's files, 500 million German communication connections were monitored every month. “It is reminiscent of methods used by enemies during the Cold War,” said German justice minister
Sabine Leutheusser-Schnarrenberger when she learned about the NSA program.


The spying has reached dimensions that I didn't think were possible
for a democratic country,” said Elmar Bok, chairman of the Foreign Affairs Committee in the European Parliament. “The U.S., once the land of the free, is suffering from a security syndrome. They have completely lost all balance. George Orwell is nothing by comparison.”

German officials, including Chancellor
Angela Merkel, seemed to share Germans' concerns at first. But German officials
became defensive and then nearly mute on the matter after German journalists reported that the NSA surveillance of Germans was being conducted with full cooperation of the German government. High-level NSA officials and their German counterparts have been working together closely, including holding frequent joint meetings at their headquarters in both countries. Germany, in the midst of expanding its own domestic surveillance operations, has been relying on assistance from the NSA. So strong was German outrage that before it was known that intelligence collaboration took place at the highest levels of the two governments, some called for
a criminal inquiry of any German complicit in the NSA efforts.

All of this—learning about the NSA spying in Germany and about Germany's collaboration with the NSA—was a source of anger and deep disappointment for many Germans. Their reaction is shaped by several factors, including the importance many of them have placed on their country's very close post–World War II relationship with the United States and also by their deep-seated antipathy for government surveillance of citizens.

Germans have absorbed profound lessons from their recent history. Their intimate experience with living under
two totalitarian systems—the Nazi regime and the communist government of the former
East Germany—means, wrote one German commentator, “that the consequences of state monitoring are still in living memory.” Many Germans retain strong memories of the monstrous secret police, the much-hated
Stasi, who, along with their army of informers, penetrated every aspect of East Germans' lives. As a result of knowing from their experience that government surveillance of citizens can breed government control of citizens, Germans are nearly as possessed by the idea that massive government surveillance must never happen again as they are by their commitment that a
Holocaust must never happen again. Furthermore, they see a relationship between these two catastrophes in their tragic past—that some people become what they may not want to become but, rather, what they think their government wants them to become, when they live in fear that their leaders know everything about them.

AS NSA FILES KEPT EMERGING
, intelligence officials eventually admitted that collecting massive private information from Americans' communications has led to
minimal benefit regarding the discovery of terrorists' plans. Successive reports also have made it clear that the NSA, nevertheless, has made extraordinary efforts to drill deeper and deeper to gather the communications of Americans and citizens in other countries through both legal and extralegal means and by defeating the encryption methods people have been told guarantee the privacy of their records and personal communications.

One NSA document revealed the agency scoops up millions of personal
digital address books. According to NSA files reported by the
Washington Post,
the NSA collects address books at a daily rate of 444,743 from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unnamed other providers. Every day NSA collects approximately 500,000 “buddy lists” on live-chat services and from web-based email accounts. Intelligence officials confirmed that the NSA collects lists from personal address books and other personal digital lists of “millions or ten of millions” of Americans. Because this collection takes place in undersea lines and not on American soil, the NSA has concluded it does not need to seek legal authorization from the special court that must authorize surveillance of Americans by the NSA.

The agency has gone to great lengths, along with its British counterpart, the GCHQ, to ensure that it has access to personal communications throughout the world, even to those digitized records that Internet companies and companies that conduct business on the Internet guarantee are
protected by encryption and, therefore, are secure—bank transactions, purchases, and medical records. These revelations about the NSA defeating encryption were made by three news organizations, the
Guardian, The New York Times,
and ProPublica, the news website, all of which had access to the same NSA files released by Snowden.

NSA's successful attack on encryption is the result of a ten-year campaign by the NSA and GCHQ to defeat all encryption methods. The attitude of the two intelligence agencies toward their citizens is evident in the name each agency gave its decryption program. They named them after major civil war battles in their respective countries—Bullrun at NSA and Edgehill at GCHQ. Contempt also is evident in how the NSA referred in a
file to the customers whose systems it violates as a result of defeating encryption: “adversaries.”

From the files, it is unclear the degree to which communication companies cooperate with the NSA on opening access to information users have been told would be inaccessible. But given the methods the NSA has used to obtain access, the cooperation of the companies, or even whether any given company knows NSA has access, may be a moot point.

NSA has used covert means within the communication industry to open gates to citizens' encrypted personal data. Through “covert partnerships,” the American and British agencies inserted secret vulnerabilities, known as backdoors or trapdoors, into commercial encryption software. NSA also has used supercomputers to break encryption with what the agency calls “brute force.” A key approach to destroying encryption has been the use of covert action “to ensure NSA control over setting of international encryption standards.” An NSA file revealed that the agency works covertly “to get its own version of a draft security standard issued by the U.S. National Institute of Standards and Technology approved for worldwide use. An NSA file trumpets the fact that “eventually, NSA became the sole editor” of international encryption standards. Agency success in damaging, if not destroying, encryption also has been aided, according to one NSA file by “identifying, recruiting and running covert agents in the global telecommunications industry.” In one NSA file, the agency celebrated its success at “defeating network security and privacy.”

By these actions, some security experts say, the NSA is attacking the Internet itself and the privacy of all users. Bruce Schneider, an encryption specialist and fellow at Harvard's Berkman Center for Internet and Society, told the
Post,
“By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the Internet.”

THAT FIRST FILE
from the Media FBI office that captured public attention in 1971, a directive to agents who spied on antiwar activists, stated that they should “
enhance the paranoia … get the point across there is an FBI agent behind every mailbox.”
Paranoia—or the reality it portends—exists today throughout the world. It has been enhanced primarily by two fears—fear that there will be more terrorist attacks, and fear of governments' use of increasingly invasive electronic surveillance of their own citizens and the citizens of allied countries. Now people anywhere may wonder if there is
intelligence-gathering equipment behind every email, every phone call, every Skype conversation, every Facebook message, every chat room conversation, every Internet search, every stored document—looking at or listening to every form of personal communication accessible through modern technology.

28
Questions

J
.
EDGAR HOOVER BECAME
director of the FBI the same way he continued being director of the bureau for forty-eight years—by not being asked questions.

Questions were not asked before he was appointed despite the fact that danger signs already were present. There was evidence then that he was willing to use government power to trample rights and damage people. There was evidence of his use of deception to build and maintain his power. There were signs he already was building the other FBI—the secret FBI the Media burglars exposed for the first time almost fifty years later.

When Harlan Fiske Stone, the eminent former dean of Columbia University Law School and future chief justice of the U.S. Supreme Court, appointed
J. Edgar Hoover director of the Bureau of Investigation in 1924, he guaranteed that the bureau was likely to become precisely the opposite of what he, the new attorney general, thought it should be.

It was surprising that Stone chose Hoover.
His appointment as head of the bureau, which had been founded in 1908 and would be renamed the Federal Bureau of Investigation in 1935, seemed to counter what the new president, Calvin Coolidge, had asked Stone to do when he appointed him attorney general in April 1924: clean out the corrupt and disgraceful Department of Justice and Bureau of Investigation and restore honor to both.

Stone had publicly stated during a Senate investigation in 1920 that the Palmer Raids—mass arrests in 1919 of 10,000 people that are still regarded as one of the worst violations of civil liberties in the nation's history—were an “intolerable injustice” that resulted in “cruelty to individuals.” Hoover,
the man Stone selected to run the bureau, had, as head of the Justice Department's Radical Division, planned the raids, named for the attorney general who authorized them,
A. Mitchell Palmer.
Hoover also was deeply involved in their ugly aftermath—the cruel prison conditions, the denial of due process, and the push for detainees to be deported.

The raids—lauded at first but soon regarded as a national shame—involved mass roundups of people by the bureau and local police in several cities without search warrants. People were pulled out of their beds as they slept, grabbed in dance halls and meeting places, and thrown into prisons, where they were kept in filthy conditions, denied lawyers or access to family members, and in some cities tortured. Intended by Hoover as a way to rid the country of thousands of immigrants he regarded as radicals, the raids did not fulfill his purpose. Most of the people swept up were citizens and therefore not subject to being deported. In the end, 556 were deported.
When Palmer was questioned two years later at a Senate hearing on the raids, at one point the disgraced attorney general, unable to answer a particular question, deferred “to Mr. Hoover, who was in charge in this matter.”

Other books

The Shell Scott Sampler by Richard S. Prather
Hot Flash by Kathy Carmichael
Lucinda by Paige Mallory
Stab in the Dark by Louis Trimble
Dangerous Deception by Anthea Fraser
Look at You Now by Liz Pryor