Skip to main content

Is the NSA Aiding and Abetting Cyber Criminals?

Prior to June 2013 various intelligence analysts had surmised that the National Security Agency had, under the auspices of the President's Surveillance Program, gained worldwide entry into personal, government and corporate electronic systems. NSA documents, illicitly obtained by Edward Snowden and published by reputable newspapers, confirmed these suspicions.

U.S. investigative panels determined shortly after the Snowden exposures that the NSA's sweeping surveillance programs should be terminated because the agency's actions violate constitutional protections and have no demonstrable value. The findings by the PCLOB and the president's task team concerning NSA's cryptanalysis capabilities are under executive, congressional and judicial review. In response to these judgments, President Obama is proposing a revision of the bulk data collection methodology. Privacy matters but there are other NSA endeavors that deserve scrutiny.

In the past few months approximately two hundred million American consumers have learned that cyber criminals in 2013 had stolen their PII, and credit/debit card records. The unidentified perpetrators surreptitiously obtained access to Target, Neiman Marcus, Adobe, Michaels  [suspected], Sally Beauty  and White Lodging payment transactions data. Both Target and Michaels have experienced prior invasions.

Most of the 2013 e-commerce breaches were discovered and publicized by Brian Krebs. Mr. Krebs' latest revelation concerns the California DMV attack. If Mr. Krebs is able to detect fraudulent activity, the NSA should be able to do likewise. Government computer networks have had NSA installed defense systems since 2008.

US merchants and banks have not pursued advanced consumer protection technology because of costs. As it stands, Americans have no personal or financial security.

Documents supplied by Edward Snowden reveal that Congress appropriated $10.8 billion for NSA black operation pursuits in 2013, and included something extra for the agency to search for potential whistleblowers. Overall the 16-member intelligence consortium received $52.6 billion in the defense bill.

In the Snowden cache of government papers are details explaining the Bull Run Project . This top secret NSA initiative was conceived and implemented to defeat all encryption guards including Tor.

It is distressing that this U.S. designed stealth technology is employed by thieves to loot bank accounts and establish false identities. The penetrators are either imitating NSA back-door entry practices or are purchasing these products from the NSA catalogue.

Should Americans trust the status quo and those who govern? That question should be answered by Senator Dianne Feinstein, chairwoman of the Select Committee on Intelligence and defender of spy agencies' operations. Ms. Feinstein told Congress on March 11, 2014 that the CIA had illegally entered her staff's computers and extracted research regarding government-sponsored torture practices.

EMAIL TO A FRIEND X
Your Email has been sent.
You must add at least one tag to this diary before publishing it.

Add keywords that describe this diary. Separate multiple keywords with commas.
Tagging tips - Search For Tags - Browse For Tags

?

More Tagging tips:

A tag is a way to search for this diary. If someone is searching for "Barack Obama," is this a diary they'd be trying to find?

Use a person's full name, without any title. Senator Obama may become President Obama, and Michelle Obama might run for office.

If your diary covers an election or elected official, use election tags, which are generally the state abbreviation followed by the office. CA-01 is the first district House seat. CA-Sen covers both senate races. NY-GOV covers the New York governor's race.

Tags do not compound: that is, "education reform" is a completely different tag from "education". A tag like "reform" alone is probably not meaningful.

Consider if one or more of these tags fits your diary: Civil Rights, Community, Congress, Culture, Economy, Education, Elections, Energy, Environment, Health Care, International, Labor, Law, Media, Meta, National Security, Science, Transportation, or White House. If your diary is specific to a state, consider adding the state (California, Texas, etc). Keep in mind, though, that there are many wonderful and important diaries that don't fit in any of these tags. Don't worry if yours doesn't.

You can add a private note to this diary when hotlisting it:
Are you sure you want to remove this diary from your hotlist?
Are you sure you want to remove your recommendation? You can only recommend a diary once, so you will not be able to re-recommend it afterwards.
Rescue this diary, and add a note:
Are you sure you want to remove this diary from Rescue?
Choose where to republish this diary. The diary will be added to the queue for that group. Publish it from the queue to make it appear.

You must be a member of a group to use this feature.

Add a quick update to your diary without changing the diary itself:
Are you sure you want to remove this diary?
(The diary will be removed from the site and returned to your drafts for further editing.)
(The diary will be removed.)
Are you sure you want to save these changes to the published diary?

Comment Preferences

  •  The NSA Has Ruined Internet Security (0+ / 0-)

    1: Arm-twist Internet architecture designers to incorporate backdoors.

    2: Store the backdoor keys in sooper sekrit NSA files where nobody could possibly get at them without permission.

    2(a): ...Oops -- apparently somebody can get at them without permission... but it was only that one time....

    2(a)(1): ...well, one time that we know about. There's really no telling how many other people did the same thing and kept the purloined files to themselves (and their employers/patrons/customers) rather than whistle-blowing them all over the place.

    3: Profit! (if you're a cybercriminal, enemy agent, or one of those other people referenced in bullet point 2(a)(1) above)

    On the Internet, nobody knows if you're a dog... but everybody knows if you're a jackass.

    by stevemb on Thu Mar 27, 2014 at 06:45:53 AM PDT

  •  How come the NSA can't find the Tief's!?!? (0+ / 0-)

    Not that I want them doing crime investigation, but ....

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site