Mass surveillance by the United States government has been a predominant reoccurring issue since classified government documents were leaked in May of 2013. These leaks lead to one of the most significant debates about an individuals daily life in decades; the constituents right to privacy. According to the fourth amendment of the United States Constitution, section 1, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated. The purpose of this amendment is to ensure the protection of the US people against unreasonable searches and seizures by the government without a proper warrant. Top secret leaked government surveillance programs contracted by the National Security Agency (NSA) and the Department of J ustice have revealed that the government has infected computers with malware, collected phone records, metadata, data, and content from American citizens computers and phones. The United States Federal government has gone too far in its surveillance techniques, and in doing so, have infringed upon the rights of United States citizens in the process. On J uly 5 th , 2013, The Guardian, a British newspaper, announced the leak of National Security Agency documents starting with the leak of the NSA collecting phone records of Verizon, a US corporation, customers in the United States. The PRISM program was then revealed the next day, regarding the server access to many of the top technology firms in the world. Finally, on J une 9 th , 2013, Edward Snowden revealed himself as the whistleblower to the world. According to The Guardian, Edward Snowden is a 29-year-old former technical assistant for the CIA and current employee of the defense contractor Booz Allen Hamiliton and has worked for multiple corporations of contracts such as Booz Allen and Dell. He worked with top secret clearance on multiple projects and later downloaded an estimated 1.7 million classified
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
documents (Pincus). The United States government charged him with the theft of government property and the violation of the US Espionage Act of 1917. Since J uly 2013 he has uncovered programs such as PRISM, QUANTUM, SECONDDATE, and even more not including files yet to be decrypted. Snowden is now labeled as a traitor by former Defense Secretary, Robert Gates, but also as a hero for others such as Apples co-founder, Steve Wozniak. Snowden was also nominated for the Nobel Peace Prize in J anuary 2014. The only thing that is known for certain is that he has uncovered the largest citizen breach of privacy known. Since computers became personalized, there have always been those who wish to invade peoples personal space in order to acquire what is on their desktop, PDA, tablet, or other devices. They are publicly known as hackers, but referred to as black hats or black hat hackers in online and specialized communities. What many do not understand is that there are three types of hackers; white hats, grey hats, and black hats. White hats are those you go to when you have a computer issue and he or she fixes it for you. Grey hats help you, but they can also lean towards the unethical side of computers. As earlier referred, black hats are those who use their knowledge to forward their own agenda using methods of fraud, hacking, and other criminal and subversive activities. These people use their specialties in ways to either invade peoples computers or help against those who wish to invade peoples privacy. The major question that this paper asks is which side is the United States government on? The National Security Agency developed a system called QUANTUM in the 2000s used many of the same methods that unethical hackers use to infiltrate peoples computers in order to cause harm. The NSA uses Domain Name System injection, also known as DNS injection, HTTP injections, and much more. QUANTUM is split into different sections including QUANTUMDEFENSE, QUANTUMSMACKDOWN, and QUANTUMHAND (Schneier).
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
These programs give access to a persons third-party database and enable them to hijack IRC and HTTP-based botnets. These programs are allegedly used on criminals, but can be used to collect information from anybody else in the United States as well. QUANTUMHAND is one of the more malicious programs in which the NSA disguises a website as a fake Facebook server. As someone tries to log onto the site, the NSA will then transmit harmful data packets that trick the targets computer into believing they are on the real Facebook website. From there, they can extract data from the computer. Another exploitation method used by the National Security Agency uses a man-in-the- middle attack, this program is codenamed SECONDDATE. SECONDDATE interferes with communications between a client and server and will then redirect initiated browser page loads in order to exploit the targets computer. This will cause a large security problem between all clients on the network. Matt Blaze, a University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale seems very disturbing, and, the thing that raises a red flag for me is the reference to network choke points. Thats the last place that we should be allowing intelligence agencies to compromise the infrastructure because that is by definition a mass surveillance technique. Blaze highlights the key idea around the controversy of how the National Security Agency has been eavesdropping on people within the United States. Dozens of programs were revealed since J uly of 2013, but the most significant and media covered program was Prism. This eavesdropping program collects data from fiber-optic cable networks that carry the worlds Internet and phone data. Companies such as Microsoft, Verizon, and Google participated in this program to certain degrees. Prism allowed the government to spy and receive live notifications when a target logs on or sends an e-mail, or may monitor a voice,
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
text or voice chat as it happens (NSA Prism Slides). The program collects two types of data; metadata and content. The difference between both is that Metadata is only the byproducts of communication between parties, such as the time of the call and who is involved along with geo- location data and browser cookies. The Constitutionality of Prism is covered by the FISA Amendments Act (section 702) and the Patriot Act (section 215). The acts themselves are under fire for being unconstitutional by many activist groups such as American Civil Liberties Union and the Electronic Frontier Foundations and Color of Change as well (Khalek). Unfortunately, the acts allow the National Security Agency to college data from major technological companies. These laws are highly criticized, especially due to the point J ohn Oliver brought up on The Daily Show on J une 10 th , 2013, saying Mr. President, no one is saying you broke any laws, were just saying its a little bit weird you didnt have to (Mesamore). With laws already infringing the fourth amendment, it is hard to protect against rights that have already been taken from you. The reach of the National Security Agency has grown considerably in recent years. It begs the question, how can you protect yourself against government snooping? One answer is to start browsing anonymous on the web. This can be done by using the anonymous browser capabilities of Mozilla Firefox, Google Chrome, Microsofts Internet Explorer, or other browsers. Unfortunately, they are no true ways of being anonymous on the Internet. The most popular answer to the problem is to use a browser called Tor. The browser connects users to the normal web that you can access on any other browser, but also the deep web, home to many highly illegal and criminal activities. Although it is used for those purposes, it is also a brilliant way to stay anonymous from the government and independent hackers. Tor routes your traffic through its own network and relays it through different stop points before arriving to the website you chose. This prevents your ISP and other who are observing your Local Area Network from
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
seeing the website you view and stops the website itself from collect the IP address that are routed through the website when visited. According to Edward Snowden, the NSA has developed a way to exploit the Tor browser bundle, and goes on to say, The trick the NSA uses identifies Tor users on the Internet and then executes an attack against their Firefox web browser (Schneier). The National Security Agency then uses small fingerprints that detect HTTP requests from the known encrypted Tor network and the NSA analyzes it in order to see what the person does on the Internet. This forces those who rely on being anonymous to also acquire a Virtual Private Network to become invisible on the Internet, which costs money. The United States government is slowly taking away the constituents right to privacy through criminal hacking activities endorsed by the government and the President himself. Although there are many who are against the idea of the United States agencies invading aspects of our daily life, there are some who endorse it. The main argument for the agreement with the policy is that it allegedly keeps the country safe from attack. Representative of New York, Peter King, said on the topic The President should stop apologizing, stop being defensive. The reality is the NSA has saved thousands of lives not just in the United States but in France, Germany and throughout Europe (Viswanatha). The surveillance programs instituted by the National Security Agency have allegedly revolutionized the way the government can find and dismantle terrorist operations. The main question posed regarding surveillance and terrorist is if you should sacrifice your constitutionally given rights in order to potentially keep you safe. This question can be related to a brilliant movie directed by J ames McTeigue, V for Vendetta. The government sacrifices the peoples rights by creating a central media outputting propaganda, fixed religion, curfews, and additional policies to ensure safety. This situation is much like
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
Germany in World War II, where the rights of J ewish citizens were slowly taken away until they could not do anything about it. The problem in the United States has been discovered early on in the modern technological innovation era and can be fixed. Whether these surveillance techniques save lives or not is not the issue, the issue is whether or not it infringes on the United States Constitution that was instituted in order to preserve the rights of the people governed. Every day you hear the left and the right talk about what is good for the citizens of the United States. One thing that many representatives and senators on both sides agree on is that the Federal governments surveillance programs need to be rebuilt. Ones rights cannot be substituted for the sake of possible safety. Without the guaranteed constitutional liberties derived from the Constitution, the United States is no better than those countries we oppose because of their lack of fundamental rights. The forfeiture of liberty in this day in age is getting even more alarming due to increase in technological innovation and because of this, the government needs to set proper and fundamental guidelines in order to provide the assurance that they are safe from the prying eyes of their government. Once the citizens start to lose their fundamental rights, it is near impossible to get them back.
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
Work-Cited Gallagher, Ryan, and Glenn Greenwald. "How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept."The Intercept. N.p., 12 Mar. 2014. Web. 16 Mar. 2014. <https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions- computers-malware/>. Khalek, Rania. "Activists of Color Lead Charge Against Surveillance, NSA."Truthout. N.p., n.d. Web. 23 May 2014. <http://www.truth-out.org/news/item/19695-activists-of-color-at- forefront-of-anti-nsa-movement>. Mesamore, W.E.. "The Humble Libertarian: J ohn Oliver: Mr. President, No One Is Saying You Broke Any Laws, We're J ust Saying It's a Little Bit Weird You Didn't Have To (Video)." The Humble Libertarian: John Oliver: Mr. President, No One Is Saying You Broke Any Laws, We're Just Saying It's a Little Bit Weird You Didn't Have To (Video). N.p., n.d. Web. 23 May 2014. <http://www.humblelibertarian.com/2013/06/john-oliver- mr-president-no-one-is.html>. Pincus, Walter. "Snowden still holding keys to the kingdom." Washington Post. The Washington Post, 19 Dec. 2013. Web. 23 May 2014. <http://www.washingtonpost.com/world/national-security/snowden-still-holding-keys-to- the-kingdom/2013/12/18/b91d29a2-6761-11e3-8b5b-a77187b716a3_story.html>. Schneier, Bruce . "Schneier on Security."Blog. N.p., 9 Oct. 2013. Web. 17 Mar. 2014. <https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html>. Weaver, Nicholas. "A Close Look at the NSAs Most Powerful Internet Attack Tool." Wired.com. Conde Nast Digital, 14 Mar. 2011. Web. 15 Mar. 2014. <http://www.wired.com/opinion/2014/03/q
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
Viswanatha, Aruna, and Anna Yukhananov. "Two Republican congressmen defend U.S. spying abroad." Reuters. Thomson Reuters, 27 Oct. 2013. Web. 23 May 2014. <http://www.reuters.com/article/2013/10/27/us-usa-security- idUSBRE99Q07E20131027>.
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
Bibliography Bibliography Gallagher, Ryan, and Glenn Greenwald. "How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept."The Intercept. N.p., 12 Mar. 2014. Web. 16 Mar. 2014. <https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect- millions-computers-malware/>. "How the NSA's Domestic Spying Program Works." Electronic Frontier Foundation. N.p., n.d. Web. 23 May 2014. <https://www.eff.org/nsa-spying/how-it-works>. "NSA Secrets." Washington Post. The Washington Post, 20 Dec. 2013. Web. 20 May 2014. <http://www.washingtonpost.com/nsa-secrets/>. Khalek, Rania. "Activists of Color Lead Charge Against Surveillance, NSA."Truthout. N.p., n.d. Web. 23 May 2014. <http://www.truth-out.org/news/item/19695-activists-of-color-at- forefront-of-anti-nsa-movement>. Mesamore, W.E.. "The Humble Libertarian: J ohn Oliver: Mr. President, No One Is Saying You Broke Any Laws, We're J ust Saying It's a Little Bit Weird You Didn't Have To (Video)." The Humble Libertarian: John Oliver: Mr. President, No One Is Saying You Broke Any Laws, We're Just Saying It's a Little Bit Weird You Didn't Have To (Video). N.p., n.d. Web. 23 May 2014. <http://www.humblelibertarian.com/2013/06/john-oliver- mr-president-no-one-is.html>. Pincus, Walter. "Snowden still holding keys to the kingdom." Washington Post. The Washington Post, 19 Dec. 2013. Web. 23 May 2014. <http://www.washingtonpost.com/world/national-security/snowden-still-holding-keys-to- the-kingdom/2013/12/18/b91d29a2-6761-11e3-8b5b-a77187b716a3_story.html>.
O R I G I N A L I T Y
H A C K F O R U M S Originality 2014
Schneier, Bruce . "Schneier on Security."Blog. N.p., 9 Oct. 2013. Web. 17 Mar. 2014. <https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html>. "Surveillance of Citizens by Government." - News. N.p., n.d. Web. 23 May 2014. < http://topics.nytimes.com/top/reference/timestopics/subjects/s/surveillance_of_citizens_b y_government/index.html>. Weaver, Nicholas. "A Close Look at the NSAs Most Powerful Internet Attack Tool." Wired.com. Conde Nast Digital, 14 Mar. 2011. Web. 15 Mar. 2014. <http://www.wired.com/opinion/2014/03/q Viswanatha, Aruna, and Anna Yukhananov. "Two Republican congressmen defend U.S. spying abroad." Reuters. Thomson Reuters, 27 Oct. 2013. Web. 23 May 2014. <http://www.reuters.com/article/2013/10/27/us-usa-security- idUSBRE99Q07E20131027>.