noworldsystem.com


’Einstein’ Program: The All-seeing eye of internet activity

’Einstein’ Program: The All-seeing eye of internet activity

Wayne Madsen
Online Journal
September 19, 2008

WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion dollar project called the “Einstein” program.

Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.

In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government’s computer and network security.

Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data.

In fact, WMR has learned that most of the classified technology being used for Einstein was developed for the NSA in conducting signals intelligence (SIGINT) operations on email networks in Russia. Code-named PINWHEEL, the NSA email surveillance system targets Russian government, military, diplomatic, and commercial email traffic and burrows into the text portions of the email to search for particular words and phrases of interest to NSA eavesdroppers. According to NSA documents obtained by WMR, there is an NSA system code-named ”PINWALE.”

The DNI and NSA also plan to move Einstein into the private sector by claiming the nation’s critical infrastructure, by nature, overlaps into the commercial sector. There are classified plans, already budgeted in so-called “black” projects, to extend Einstein surveillance into the dot (.) com, dot (.) edu, dot (.) int, and dot (.) org, as well as other Internet domains. Homeland Security Secretary Michael Chertoff has budgeted $5.4 billion for Einstein in his department’s FY2009 information technology budget. However, this amount does not take into account the “black” budgets for Einstein proliferation throughout the U.S. telecommunications network contained in the budgets for NSA and DNI.

In anticipation of the regulatory problems inherent in domestic email surveillance by the NSA, the Bush administration has ensured that the Federal Communications Commission (FCC) and industry associations have been stacked with pro-surveillance loyalists to ensure that Einstein is widely accepted and implemented.

 



Plan to Allow Government Access of Any E-mail or Web Search

US drafting plan to allow government access to any email or Web search

Raw Story
January 14, 2008

Fbiiraqisbein_mn

National Intelligence Director Mike McConnell is drawing up plans for cyberspace spying that would make the current debate on warrantless wiretaps look like a “walk in the park,” according to an interview published in the New Yorker‘s print edition today.

Debate on the Foreign Intelligence Surveillance Act “will be a walk in the park compared to this,” McConnell said. “this is going to be a goat rope on the Hill. My prediction is that we’re going to screw around with this until something horrendous happens.”

The article, which profiles the 65-year-old former admiral appointed by President George W. Bush in January 2007 to oversee all of America’s intelligence agencies, was not published on the New Yorker‘s Web site.

McConnell is developing a Cyber-Security Policy, still in the draft stage, which will closely police Internet activity.

“Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer or Web search,” author Lawrence Wright pens.

“Google has records that could help in a cyber-investigation, he said,” Wright adds. “Giorgio warned me, ‘We have a saying in this business: ‘Privacy and security are a zero-sum game.'”

A zero-sum game is one in which gains by one side come at the expense of the other. In other words — McConnell’s aide believes greater security can only come at privacy’s expense.

McConnell has been an advocate for computer-network defense, which has previously not been the province of any intelligence agency.

According to a 2007 conversation in the Oval Office, McConnell told President Bush, “If the 9/11 perpetrators had focused on a single US bank through cyber-attack and it had been successful, it would have an order of magnitude greater impact on the US economy.”

Bush turned to Treasury Secretary Henry Paulson, asking him if it was true; Paulson said that it was. Bush then asked to McConnell to come up with a network security strategy.

“One proposal of McConnell’s Cyber-Security Policy, which is still in the draft stage, is to reduce the access points between government computers and the Internet from two thousand to fifty,” Wright notes. “He claimed that cyber-theft account for as much as a hundred billion dollars in annual losses to the American economy. ‘The real problem is the perpetrator who doesn’t care about stealing—he just wants to destroy.'”

The infrastructure to tap into Americans’ email and web search history may already be in place.

In November, a former technician at AT&T alleged that the telecom forwarded virtually all of its Internet traffic into a “secret room” to facilitate government spying.

Whistleblower Mark Klein said that a copy of all Internet traffic passing over AT&T lines was copied into a locked room at the company’s San Francisco office — to which only employees with National Security Agency clearance had access — via a cable splitting device.

“My job was to connect circuits into the splitter device which was hard-wired to the secret room,” Klein. said “And effectively, the splitter copied the entire data stream of those Internet cables into the secret room — and we’re talking about phone conversations, email web browsing, everything that goes across the Internet.”

“As a technician, I had the engineering wiring documents, which told me how the splitter was wired to the secret room,” Klein continued. “And so I know that whatever went across those cables was copied and the entire data stream was copied.”

According to Klein, that information included Internet activity about Americans.

“We’re talking about domestic traffic as well as international traffic,” Klein said. Previous Bush administration claims that only international communications were being intercepted aren’t accurate, he added.

“I know the physical equipment, and I know that statement is not true,” he added. “It involves millions of communications, a lot of it domestic communications that they’re copying wholesale.”