Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
UK MPs have been told that, not only is the legal regime governing GCHQ likely to be incompatible with the European Convention on Human Rights, many of the agency’s activities are illegal even by current domestic standards.
Jemima Stratford QC and Tim Johnston were asked to prepare the opinion for the All Party Parliamentary Group (APPG) on Drones. While APPGs have no formal powers within the UK political system some – like the APPG on Extraordinary Rendition – have done important investigatory work in areas where formal oversight has been lacking.
While legislative proposals based on this opinion have already been tabled, its primary importance is likely to be its foreshadowing of issues the European Court of Human Rights (ECtHR) could adjudicate on this year in the case Big Brother Watch v United Kingdom. In the past, the Strasbourg court has played a decisive role in forcing changes to UK surveillance practices and it has never before been asked to consider the legality of mass surveillance.
This slide from a 2012 presentation shows the distribution of NSA collection points worldwide, including 80+ Special Collection Services (SCS) points based at embassies and consulates; 50,000 gained by Computer Network Exploitation (CNE) malware attacks and 20 “major accesses” from undersea cables: see the NRC Handelsblad article NSA infected 50,000 computer networks with malicious software, 23 November 2013.
This presentation gives an overview of the NSA’s programmes targeting the fibre optic cables that carry much of the world’s internet traffic. One slide gives a breakdown of which data sources form the basis of Presidential daily briefings. Another shows that the access point used to collect Yahoo and Google cloud data (MUSCULAR) is operated by GCHQ on UK territory. Slides detailing RAMPART cable accesses were published by the Intercept on 18 June 2014: see the Washington Post article How we know the NSA had access to internal Google and Yahoo cloud data, 4 November 2013.