AMITIAE - Monday 10 June 2013
Cassandra - PRISM and the Mac User (1): Background
By Graham K. Rogers
That there has been surveillance was no surprise to me. In the 1990s, when contributing to the Bangkok Post, Database, I wrote a series of three articles on Echelon: a spy system set up by the authorities of Australia, Canada, New Zealand the UK and the USA that monitored telephone (voice, fax, data): mainly wire-based transmissions.
At that time it was clear that, although the UK and US were theoretically barred from monitoring any signals from their own citizens, if the UK (for example) trapped a juicy item of information about someone from the USA, that would be passed on. It would be naive to assume that other Echelon countries did not join that data-sharing party; and other countries outside Echelon may also have shared similar data.
The problems with spooks is that they live and operate in a closed environment. Their jobs revolve around security, terrorists, criminals, lying and deception; although as with the deployment of Stuxnet, "our" methods are acceptable, theirs are not.
Any closed organisation develops its own protective view of the world. When I was a UK policeman in the 1970s, canteen conversation (work-related, social and political) would not match ideas of the world outside; and when I was a student in the 1980s, with the Falklands War, the Miners' Strike and rising unemployment, the debates on campus would not match the views expressed in (say) The Daily Express or The Sun.
The job of the NSA is security of the USA. Within the Agency (and other related agencies) there will be ideas and theories about how that protection may best be done (actively and otherwise). It is perhaps no coincidence that the governments of the UK, Canada, Australia and New Zealand, as well as the USA, have all at some time in recent years been pushing for legislation that will allow law enforcement agencies greater access to internet traffic. In the UK, this has been dubbed, "The Snooper's Charter" and there is staunch opposition to it.
The current (Tory) government opposed the idea when it was first put forward by the previous Labour government, but once in power, their advisers (who had earlier advised Labour) must have provided irresistible arguments and the Home Secretary (Interior Minister), Teresa May, crumbled. After another public outcry, the Liberal-Democrat coalition partners of the Tories flexed their muscles for once and the Bill was apparently dead. But not for long. Governments and their bureaucrats really want this control.
In the meantime, the chorus from the Echelon group has continued in the background, with one or other of the member countries (supported by noises from the USA) wringing their hands and wailing about protection from terrorism, pornography and international organised crime (a new one added to the list).
Obama, despite his promises at the time of his election, and the increased strength he should have in his second term, has disappointed many by his failures here, listening to his advisers, but not listening to himself. The sticky hands of his Attorney General, Eric Holder, are particularly evident in a number of the (perhaps illegal) programs.
As part of the information released about the program called PRISM, it appears a number of high profile companies are implicated in the sharing of data with the NSA. There have been careful denials: one or two strong ones as well. Along the way the NSA stated that the companies were not allowed to even mention if they had or had not been asked.
It is interesting therefore to look at the companies that are alleged to be providing the NSA with information (Oliver Wainright): Microsoft, Yahoo!, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple (last on the list and added October 2012, a year after Steve Jobs died). The slides are not very good and I would criticise any student that produced anything like this, which detracts from their value.
Significantly absent from that list is Adobe, which seems odd considering the number of PDFs that government agencies produce each day and the amount of Adobe software in use at the NSA.
Graham K. Rogers teaches at the Faculty of Engineering, Mahidol University in Thailand where he is also Assistant Dean. He wrote in the Bangkok Post, Database supplement on IT subjects. For the last seven years of Database he wrote a column on Apple and Macs.
For further information, e-mail to