Ashkan Soltani
Outdated Ethics Rules Stymie the FTC's Efforts to Keep Up with Big Tech
The Federal Trade Commission (FTC)'s longstanding conflict-of-interest rules may unnecessarily impede its ability to attract, retain and deploy the technical expertise that it badly needs to keep up with Big Tech. To change this, the FTC needs to narrow
In NSA-intercepted data, those not targeted far outnumber the foreigners who are
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from US digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to US citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to US citizens or US residents. The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages -- and collateral harm to privacy on a scale that the Obama Administration has not been willing to address. Among the most valuable contents -- which The Post will not describe in detail, to avoid interfering with ongoing operations -- are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into US computer networks.
Companies e-mail sensitive data to law enforcement
There’s a lack of rules governing the secure handling of law enforcement orders for data, industry experts say. Documents posted on Twitter by the Syrian Electronic Army, a collective of hackers and online activists supporting Syrian President Bashar al-Assad, included correspondence between Microsoft’s government compliance team and various law enforcement agencies around the world.
The documents contained criminal subpoenas, e-mail addresses of targets and “access keys,” presumably passwords, to the user packages Microsoft makes available to law enforcement. Other documents suggest the hackers also were able to access the account information Microsoft provides to law enforcement agencies, which includes the target’s name, location, Internet Protocol or computer address used by the target to sign-up for an e-mail account or to log-in to his e-mail account.
NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.
A senior manager for the program compares it to a time machine -- one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. On Jan 17, President Barack Obama called for significant changes to the way NSA collects and uses telephone records of US citizens.
The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.