whistle-blower outs NSA spy-room
Whistle-Blower Outs NSA Spy Room By Ryan Singel 11:15 AM Apr, 07, 2006 AT&T provided National Security Agency eavesdroppers with full access to its customers' phone calls, and shunted its customers' internet traffic to data-mining equipment installed in a secret room in its San Francisco switching center, according to a former AT&T worker cooperating in the Electronic Frontier Foundation's lawsuit against the company. Mark Klein, a retired AT&T communications technician, submitted an affidavit in support of the EFF's lawsuit this week. That class action lawsuit, filed in federal court in San Francisco last January, alleges that AT&T violated federal and state laws by surreptitiously allowing the government to monitor phone and internet communications of AT&T customers without warrants. On Wednesday, the EFF asked the court to issue an injunction prohibiting AT&T from continuing the alleged wiretapping, and filed a number of documents under seal, including three AT&T documents that purportedly explain how the wiretapping system works. According to a statement released by Klein's attorney, an NSA agent showed up at the San Francisco switching center in 2002 to interview a management-level technician for a special job. In January 2003, Klein observed a new room being built adjacent to the room housing AT&T's #4ESS switching equipment, which is responsible for routing long distance and international calls. "I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was not allowed in the room." Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego. "While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein wrote. The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers, according to Klein's statement. The secret room also included data-mining equipment called a Narus STA 6400, "known to be used particularly by government intelligence agencies because of its ability to sift through large amounts of data looking for preprogrammed targets," according to Klein's statement. Narus, whose website touts AT&T as a client, sells software to help internet service providers and telecoms monitor and manage their networks, look for intrusions, and wiretap phone calls as mandated by federal law. Klein said he came forward because he does not believe that the Bush administration is being truthful about the extent of its extrajudicial monitoring of Americans' communications. "Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA's spying program is really limited to foreign communications or is otherwise consistent with the NSA's charter or with FISA," Klein's wrote. "And unlike the controversy over targeted wiretaps of individuals' phone calls, this potential spying appears to be applied wholesale to all sorts of internet communications of countless citizens." After asking for a preview copy of the documents last week, the government did not object to the EFF filing the paper under seal, although the EFF asked the court Wednesday to make the documents public. One of the documents is titled "Study Group 3, LGX/Splitter Wiring, San Francisco," and is dated 2002. The others are allegedly a design document instructing technicians how to wire up the taps, and a document that describes the equipment installed in the secret room. In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "could be used to 'hack' into the AT&T network, compromising its integrity." According to court rules, AT&T has until Thursday to file a motion to keep the documents sealed. The government could also step in to the case and request that the documents not be made public, or even that the entire lawsuit be barred under the seldom-used State Secrets Privilege. AT&T spokesman Walt Sharp declined to comment on the allegations, citing a company policy of not commenting on litigation or matters of national security, but did say that "AT&T follows all laws following requests for assistance from government authorities." -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
At 10:11 AM +0200 4/8/06, Eugen Leitl wrote:
Whistle-Blower Outs NSA Spy Room
Source? URL? Cheers, RAH -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
On 2006-04-08T05:48:32-0400, R. A. Hettinga wrote:
At 10:11 AM +0200 4/8/06, Eugen Leitl wrote:
Whistle-Blower Outs NSA Spy Room
Source?
URL?
http://www.wired.com/news/technology/0,70619-0.html Ryan Singel's blog: http://www.secondaryscreening.net/ -- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants.
That single little Wired article told me more about NSA's network than I've heard or read anywhere else. It should be proudly pointed out that we Cypherpunks correctly reverse-engineered most of these details some months ago. For me the main conclusion is: "They can't get everything." Not even a very powerful Variola's Suitcase could do the job. They have to do some statistical pre-sort of traffic and then route the more likely calls/etc...into NSA's own Fiber network, where backend equipment does several more layers of pre-sort to determine urgency and then perhaps store the rest. I'd still bet that we'll see the NSA "fall back" upon the fact that humans don't actually read most of the traffic they scoop up. They probably only open up high-risk domestic communications, but by then merely knowing they have something (and knowing its source and destination) is going to be 90% as good as actually having a human read it. So this legal avenue is unlikely to put anyone meaningful in jail. OTOH, it shows that the parastic NSA network is possibly far more vulnerable than most people imagine. -TD
From: Justin <justin-cypherpunks@soze.net> To: cypherpunks@jfet.org Subject: Re: whistle-blower outs NSA spy-room Date: Sat, 8 Apr 2006 10:53:29 +0000
On 2006-04-08T05:48:32-0400, R. A. Hettinga wrote:
At 10:11 AM +0200 4/8/06, Eugen Leitl wrote:
Whistle-Blower Outs NSA Spy Room
Source?
URL?
http://www.wired.com/news/technology/0,70619-0.html
Ryan Singel's blog: http://www.secondaryscreening.net/
-- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants.
participants (4)
-
Eugen Leitl
-
Justin
-
R. A. Hettinga
-
Tyler Durden