By U AC

 

EDWARD Snowden hoo-ha might have ended ten years ago, but illegal spy­ing by the US carries on, both on its partners and anyone it wants to control, via warrantless surveil­lance rights to indiscriminately monitor communications of all internet users around the world.

 

Snowden popularized the term ‘metadata’ and started a heated debate about mass sur­veillance. He had succeeded beyond imagination. But who is there to defend our democracy and rights in this digital age?

 

The intelligence agencies (CIA, NSA, FBI - acronyms stat­ed at end of article) dismissed such claims at that time, arguing that their programmes are consti­tutional, and subject to rigorous congressional and judicial over­sight, yet critical to meet their overriding aim of protecting the public from terrorist attacks. As usual, they regurgitate the age-old slogan: if you have nothing to hide, you have nothing to be scared of!

 

The whole world was shaken at that time. Its allies were rightly upset, its so-called enemies were proven right about what they had suspected all along, people were livid due to lack of some social responsibility, US internet compa­nies claimed they were forced into cooperation and NGOs warned that surveillance was going be­yond the intention of lawmakers.

 

Cell phones, laptops, Face­book, Instagram, X, Skype, and chat rooms: all allow the NSA to build what it calls ‘a pattern of life’, a detailed profile of a target and anyone associated with them. And the number of people caught up in this dragnet can be huge. You have to recall the Bourne Identity, Supremacy and Ultima­tum trilogy of movies, to visualize the level of spying and black ops going on.

 

Ten years ago, faced with this growing public and political con­cern over the quantities of data it is collecting, the NSA said it col­lected only a tiny proportion of the world’s internet traffic, equivalent to a “dime on a basketball court”. But in reality, that is still a huge amount of data. It says it needs all this data to help prevent another terrorist attack like 9/11. To find the needle in the haystack, they argue, they need access to the whole haystack. Yet, the US Con­gress did not find any substantial evidence of NSA actions stopping terrorist attacks. NSA claimed 54 terror attacks being stopped, but was fact-checked to be only 4.

 

That was ten years ago. The chances were you were already sharing a lot more personal in­formation than you thought, even back then.

 

Spying Continued

Now Five Eyes countries jointly conduct cyber espionage operations eavesdropping, tap­ping and collecting metadata upon other countries from Russia to China to Germany and France. Instead of toning down its indis­criminate monitoring and illegal spying operations, the Five Eyes have up their ante by introducing programmes such as False Flag operations, misleading tracea­bility attribution and implanted backdoors in the internet prod­ucts US companies sold to other countries.

 

US longstanding strategy of ‘forward defence’ and carrying out ‘hunt forward’ operations requires that it continues to stealthily spy on other countries by hook or by crook. At the same time, since Snowden’s time, due to investigations by US lawmak­ers, the tactics have gone un­derground, trying to cover up its attacks, erasing fingerprints of cy­ber espionage and attempting to obscure various identifiable fea­tures of its assaults. The worst of all was inputting code ‘strings’ in other languages to mislead cyber­security experts and frame other countries for cybersurveillance.

 

According to China’s CVERC, Volt Typhoon was one such pro­gramme, deployed by the Five Eyes recently. China’s Global Times also highlighted a stealth tool kit codenamed ‘Marble’ used in such operations. The report claimed Marble can use over 100 algorithms to replace readable content in source code files with unrecognizable content and has the ability to insert interfering strings.

 

False Flag operations are a major component of Influence Op­erations by the Five Eyes coun­tries. Influence operations include two aspects: (dis) Information op­erations and Technical disruption operations. Its 4D principles of deny, disrupt, degrade, and de­ceive are in full observation in its cyber spying activities.

 

Five Eyes’ illicit spying activ­ities are helped by the fact that much of the world’s communica­tions traffic passes through the US or its close ally the UK – what the agencies refer to as “home-field advantage”, because of the fact that it can control the world’s most internet choke points such as Atlantic submarine fibre optic cable and Pacific submarine fibre optic cable. The UK is connected to 57 countries by fibre optic ca­bles whereas the US is connected to 63. NSA works closely with the FBI and British NCSC to carry out protocol analysis and data theft of the full amount of data trans­mitted by fibre optic cables, to achieve wholesale monitoring of internet users around the world.

 

The NSA has its own cable-in­tercept programs tapping traffic flowing into and across the US. These are collectively known as the Upstream collection. NSA runs these surveillance pro­grammes through “partnerships” with major US telecom and inter­net companies. The Upstream project function is to retain all the original communication data of submarine fibre optic cables in­tercepted by monitoring stations in a massive data ‘reservoir’. The second project of NSA is Prism, whose main function is to classify the original data from the Up­stream collection accordingly and to analyze its content. It is also a “downstream” programme – which collects the data from Google, Facebook, Apple, Yahoo and other US internet giants.

 

The above snooping would be sufficient provided if the data that they wanted actually trav­elled through the above subma­rine pipelines. What if the data they wanted to spy on stayed just within Russia or China? To solve this problem NSA conducts CNE for specific targets located in such blind spots and the Office of TAO follows up with the dirty work. To be specific, using advanced US technology and products, in coop­eration with US internet, software and equipment suppliers, TAO would intercept and disassemble US products purchased by the entities in these blind spot ter­ritories, implant backdoors and repackage them before shipping them to their destination. These products once in use, would trans­mit back the required top-secret content back to NSA headquar­ters.

 

The division inside the NSA that deals with collection pro­grammes that focus on private companies is Special Source Op­erations, described by Snowden as the “crown jewels” of the NSA, under the heading of ‘Corporate Partner Access’. It has already set out its mission: “Leverage unique key corporate partnerships to gain access to high-capacity inter­national fibre optic cables, switch­es and/or routes throughout the world.” The names of many of the NSA’s “corporate partners” are so sensitive that they are classified as “ECI” — Exceptionally Con­trolled Information.

 

The future

Public opinion is polarized over surveillance, but polls over recent years showed a consistent increase in concern over privacy. Meanwhile, the unlawful activities by the Five Eyes continued, invad­ing the privacy of many, not under its sovereignty as well as stealing the confidential top-secret infor­mation of other countries.

 

With the new peace-advo­cating President in place this year, hopefully, these anti-peace activities will discontinue soon. Optimistically, the $400 million assistance via Burma Act to antig­overnment forces could be halted too, thereby stopping $20,000+ a month funding to each of the ille­gal fake news agencies in Chiang Mai, that did more to bring the country down than help any fellow citizens prosper.

 

ACRONYMS:

NSA: National Security Agency

CIA: Central Intelligence Agency

FBI: Federal Bureau of Investi­gation

Metadata: Data providing infor­mation about other aspects of that data, e.g., information about the time and location of a phone call or email, as opposed to the contents of those conversations or messages.

 

Five Eyes countries: US, Canada, UK, Australia, and New Zealand,

False Flag operation: an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party.

 

Traceability attribution: tracing and attributing security-relevant actions (i.e., subject-object inter­actions) to the entity on whose behalf the action is being taken.

 

Implanted backdoor: a typically covert method of bypassing nor­mal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment.

 

CVERC: China Virus Emergency Response Centre

String: a data type used in pro­gramming, that is used to repre­sent text rather than numbers.

 

NCSC: National Cyber Security Centre

Protocol analysis: tools to identify and create categories of proposi­tions and semantic organization of text segments.

 

CNE: Computer Network Ex­ploitation

TAO: Tailed Access Operation