[Infowarrior] - OpEd: NSA's cyber overkill

Richard Forno rforno at infowarrior.org
Tue Jul 14 11:54:50 UTC 2009


NSA's cyber overkill
A project to safeguard governmental computers, run by the NSA, is too  
big a threat to Americans' privacy.
By Jesselyn Radack
July 14, 2009
http://www.latimes.com/news/printedition/opinion/la-oe-radack14-2009jul14,0,6845797.story


Cyber security is a real issue, as evidenced by the virus behind July  
4 cyber attacks that hobbled government and business websites in the  
United States and South Korea. It originated from Internet provider  
addresses in 16 countries and targeted, among others, the White House  
and the New York Stock Exchange.

Unfortunately, the Obama administration has chosen to combat it in a  
move that runs counter to its pledge to be transparent. The  
administration reportedly is proceeding with a Bush-era plan to use  
the National Security Agency to screen government computer traffic on  
private-sector networks. AT&T is slated to be the likely test site.  
This classified pilot program, dubbed "Einstein 3," is developed but  
not yet rolled out. It takes two offenders from President Bush's  
contentious secret surveillance program and puts them in charge of  
scrutinizing all Internet traffic going to or from federal government  
agencies.

Despite its name, the Einstein 3 program is more genie than genius --  
an omnipotent force (run by the NSA via AT&T's "secret rooms") that  
does the government's bidding -- spying. The last time around, this  
sort of scheme was known as the "special access" program -- "special"  
being code for "unconstitutional."

Einstein 3 purportedly is meant to protect government networks from  
hackers. But cyber-security experts -- such as Babak Pasdar, who blew  
the whistle on a mysterious "Quantico Circuit" while working for a  
major service provider -- agree that Einstein 3 offers no intrinsic  
security value. The program is implemented where servers exchange  
traffic between one another -- in the heart of a network system rather  
than at the perimeter, which interfaces with the outside world. This  
is similar to a home security system that only monitors the central  
interior of a house, rather than keeping an eye on the actual doors  
(and the purpose of hackers may simply be to enter).

Furthermore, Einstein 3 focuses on collecting, processing and  
analyzing all person-to-person communications content rather than  
looking for hacker and malicious software attack patterns directed at  
government sites and installations -- which should raise eyebrows.

The prospect of NSA involvement in secret surveillance should set off  
alarm bells. The intelligence community lost any benefit of the doubt  
the last time it collected and read Americans' domestic e-mail  
messages without court warrants. Einstein 3 is based primarily on  
covert technologies developed by the NSA for the purposes of  
wiretapping.

The telecom companies also have lost their privacy cred. In a tacit  
admission that the proposed new program is problematic and possibly  
illegal, AT&T has sought written assurances from the administration  
that it will not be legally liable for participating in the program.  
The company was sued over its role in aiding Bush's electronic  
eavesdropping on Americans and, along with other telecoms, received  
retroactive immunity from Congress.

Earlier incarnations of the Einstein program observe predetermined  
signatures (specific patterns of network traffic), but Einstein 3  
would look at the content of e-mails and other messages sent over  
government systems.

Moreover, while Einstein 1 and Einstein 2 passively observe  
information, Einstein 3 technology plans to use "active sensors." This  
is a tactic used by malware developers and is a popular feature of  
spyware that clogs up the Internet, slows down PCs and tips off  
hackers by emitting signals.

And most disturbingly, according to the Department of Homeland  
Security's 2008 "Privacy Impact Assessment," while earlier iterations  
of Einstein implemented signatures based on malicious computer codes,  
Einstein 3 could include signatures based on personally identifiable  
information. The privacy implications are great. Any citizen logging  
on to a ".gov" website would trigger this.

The IRS and other governmental agencies collect sensitive personal  
information for legitimate and limited purposes. However, strict  
confidentiality rules apply to that information. Although the  
Department of Homeland Security, which is managing the program,  
insists that the "main focus is to identify malicious code," we've  
heard such empty reassurances before.

Media reports indicate that government officials recently acknowledged  
during closed meetings of the House and Senate Intelligence and  
Judiciary committees that Americans' e-mails that were improperly  
gathered or read during Bush's warrantless wiretapping program -- even  
under the relaxed 2008 intelligence surveillance law -- were not just  
an "incidental byproduct." According to a former NSA analyst and two  
intelligence analysts interviewed by the New York Times, the e-mails  
could number in the millions.

Further, a government review of the Bush wiretapping program, released  
Friday, questioned the effectiveness of the surveillance efforts.

President Obama's federalization of many private systems and his  
adoption of the Bush administration's spying tactics are on a  
collision course that would expose many Americans' private data and  
communications to government scrutiny. I suspect that the public would  
be appalled that a taxpayer's financial information or a patient's  
medical records would be available to, much less perused by, the NSA.  
There are far less invasive network defenses that can secure  
government computing environments, such as upgrading good old- 
fashioned firewalls and filtering routers.

Obama came into office vested with vast new surveillance powers, which  
he voted for as a senator. Atty. Gen. Eric H. Holder Jr., while  
strenuously avoiding the word "illegal," called the original Bush  
snooping "unwise." But instead of trying to put the genie back in the  
bottle, Obama is considering expanding its power.

This is antithetical to basic civil liberties and privacy protections  
that are the core of a democratic society. Perhaps we can draw a  
lesson from the real Einstein, who ultimately regretted his role in  
urging the development of dangerous technology -- the atomic bomb --  
and spent the rest of his life advocating against it.

Jesselyn Radack is the homeland security director of the Government  
Accountability Project in Washington.


More information about the Infowarrior mailing list