SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
HUNTING GOVERNMENT BACK DOORS
JOSEPH MENN
Whistle-blower AT&T technician Mark Klein says his effort to reveal alleged
government surveillance of domestic Internet traffic was blocked not only by
U.S. intelligence officials but also by the top editors of the Los Angeles
Times.
In his first broadcast interview, as seen tonight on Nightline, Klein describes
how he stumbled across "secret NSA rooms" being installed at an AT&T
switching center in San Francisco and later heard of similar rooms in at least
six other cities, including Atlanta, San Diego, Los Angeles, Palo Alto, San
Jose and Seattle.
"You needed an ordinary key and the code to punch into a key pad on the
door, and the only person who had both of those things was the one guy
cleared by the NSA," Klein says of the "secret room" at the AT&T center in
San Francisco.
The NSA is the National Security Agency, the country's most secretive
intelligence agency, charged with intercepting communications overseas.
Klein says he collected 120 pages of technical documents left around the
San Francisco office showing how the NSA was installing "splitters" that
would allow it to copy both domestic and international Internet traffic
moving through AT&T connections with 16 other trunk lines.
"It's gobs and gobs of information going across the Internet," Klein says.
President Bush has acknowledged he authorized the NSA to intercept the
communications of people with known links to terrorist organizations "into or
out of the United States," but that "we're not trolling through the personal
lives of millions of innocent Americans."
Intelligence experts say the NSA has the means to filter out
suspect communications with sophisticated machines that
spot key words, names, addresses or patterns.
Eventually, Klein says he decided to take his documents to
the Los Angeles Times, to blow the whistle on what he calls
"an illegal and Orwellian project."
But after working for two months with LA Times reporter
Joe Menn, Klein says he was told the story had been killed
at the request of then-Director of National Intelligence John
Negroponte and then-director of the NSA Gen. Michael
Hayden.
The Los Angeles Times' decision was made by the paper's
editor at the time, Dean Baquet, now the Washington
bureau chief of The New York Times.
Baquet confirmed to ABCNews.com he talked with
Negroponte and Hayden but says "government pressure
played no role in my decision not to run the story."
Baquet says he and managing editor Doug Frantz decided
"we did not have a story, that we could not figure out what
was going on" based on Klein's highly technical documents.
The reporter, Menn, declined to comment, but Baquet says
he knows "Joe disagreed and was very disappointed."
Klein says he then took his AT&T documents to The New York
Times, which published its exclusive account last April.
As the new Washington bureau chief of The New York Times,
Baquet now oversees the reporters who have broken most of the
major stories involving the government surveillance program,
often over objections from the government.
After The New York Times story appeared, Klein filed an
affidavit in a lawsuit against AT&T brought by a civil liberties
group, Electronic Frontier Foundation.
The NSA says it will not confirm or deny the existence or the
purpose of the "secret rooms," but in a filing in the court case
against AT&T, Negroponte formally invoked the "state secrets
privilege," claiming the lawsuit and the information from Klein
and others could "cause exceptionally grave damage to the
national security of the United States."
Klein says what he knows won't help terrorists.
"The only people that are being kept in the dark is the American
people who are being misled and not realizing, not being told
that their private information, that their liberties are being
destroyed and tramped on," he said.
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn

Mais conteúdo relacionado

Destaque

When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...Shakacon
 
Anti-Reversing: A Cake Full of Onions by Richard Wartell
Anti-Reversing: A Cake Full of Onions by Richard WartellAnti-Reversing: A Cake Full of Onions by Richard Wartell
Anti-Reversing: A Cake Full of Onions by Richard WartellShakacon
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerShakacon
 
Swift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzSwift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzShakacon
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresShakacon
 
Let's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick WardleLet's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick WardleShakacon
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamShakacon
 
Making a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem DinaburgMaking a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem DinaburgShakacon
 

Destaque (9)

When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
 
Anti-Reversing: A Cake Full of Onions by Richard Wartell
Anti-Reversing: A Cake Full of Onions by Richard WartellAnti-Reversing: A Cake Full of Onions by Richard Wartell
Anti-Reversing: A Cake Full of Onions by Richard Wartell
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
 
Swift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzSwift Reversing by Ryan Stortz
Swift Reversing by Ryan Stortz
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
 
Let's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick WardleLet's Play Doctor....by Patrick Wardle
Let's Play Doctor....by Patrick Wardle
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 
Making a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem DinaburgMaking a Scalable Automated Hacking System by Artem Dinaburg
Making a Scalable Automated Hacking System by Artem Dinaburg
 

Semelhante a Hunting Government Back Doors by Joseph Menn

Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Paula Pepe
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationstrupassion
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body countsRepentSinner
 
Obama suspicious death lists... body counts
Obama suspicious death lists... body countsObama suspicious death lists... body counts
Obama suspicious death lists... body countsRepentSinner
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body countsRepentSinner
 
Obama suspicious death lists... body counts
Obama suspicious death lists... body countsObama suspicious death lists... body counts
Obama suspicious death lists... body countsRepentSinner
 
Criteria Ratings PointsThreadContent18 to 16 pts
Criteria Ratings PointsThreadContent18 to 16 ptsCriteria Ratings PointsThreadContent18 to 16 pts
Criteria Ratings PointsThreadContent18 to 16 ptsCruzIbarra161
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 
Who lied to whom s. hersh
Who lied to whom   s. hershWho lied to whom   s. hersh
Who lied to whom s. hershRabeeh Saâdawi
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Afghanistan decries CIA 'violations'
Afghanistan decries CIA 'violations'Afghanistan decries CIA 'violations'
Afghanistan decries CIA 'violations'nervousyesterda41
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaks
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaker
 
House rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryHouse rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryWorld Truth
 
The FBI hand behind Russia-gate
The FBI hand behind Russia-gateThe FBI hand behind Russia-gate
The FBI hand behind Russia-gateChris Helweg
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Foreign agency reportedly spied on US law firm with NSA's knowledge
Foreign agency reportedly spied on US law firm with NSA's knowledgeForeign agency reportedly spied on US law firm with NSA's knowledge
Foreign agency reportedly spied on US law firm with NSA's knowledgeadaptableinform11
 

Semelhante a Hunting Government Back Doors by Joseph Menn (20)

Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body counts
 
Obama suspicious death lists... body counts
Obama suspicious death lists... body countsObama suspicious death lists... body counts
Obama suspicious death lists... body counts
 
Peña y televisa - The guardian (inglés)
Peña y televisa - The guardian (inglés)Peña y televisa - The guardian (inglés)
Peña y televisa - The guardian (inglés)
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body counts
 
Jour3552 reading2
Jour3552 reading2Jour3552 reading2
Jour3552 reading2
 
Obama suspicious death lists... body counts
Obama suspicious death lists... body countsObama suspicious death lists... body counts
Obama suspicious death lists... body counts
 
Criteria Ratings PointsThreadContent18 to 16 pts
Criteria Ratings PointsThreadContent18 to 16 ptsCriteria Ratings PointsThreadContent18 to 16 pts
Criteria Ratings PointsThreadContent18 to 16 pts
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
Who lied to whom s. hersh
Who lied to whom   s. hershWho lied to whom   s. hersh
Who lied to whom s. hersh
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Afghanistan decries CIA 'violations'
Afghanistan decries CIA 'violations'Afghanistan decries CIA 'violations'
Afghanistan decries CIA 'violations'
 
Prism
PrismPrism
Prism
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
House rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcryHouse rejects nsa spying restrictions after white house outcry
House rejects nsa spying restrictions after white house outcry
 
The FBI hand behind Russia-gate
The FBI hand behind Russia-gateThe FBI hand behind Russia-gate
The FBI hand behind Russia-gate
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Foreign agency reportedly spied on US law firm with NSA's knowledge
Foreign agency reportedly spied on US law firm with NSA's knowledgeForeign agency reportedly spied on US law firm with NSA's knowledge
Foreign agency reportedly spied on US law firm with NSA's knowledge
 

Mais de Shakacon

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assemblyShakacon
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can youShakacon
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back togetherShakacon
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEShakacon
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Shakacon
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerShakacon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeShakacon
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker InfrastructureShakacon
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...Shakacon
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelShakacon
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest NetworkShakacon
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherShakacon
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving MalwareShakacon
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]Shakacon
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnellingShakacon
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco GrassiShakacon
 
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs BacsayShakacon
 
Richard wartell malware is hard. let's go shopping!!
Richard wartell   malware is hard.  let's go shopping!!Richard wartell   malware is hard.  let's go shopping!!
Richard wartell malware is hard. let's go shopping!!Shakacon
 

Mais de Shakacon (20)

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
 
Macdoored
MacdooredMacdoored
Macdoored
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
Shamoon
ShamoonShamoon
Shamoon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
 
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
0Day Hunting A.K.A. The Story of a Proper CPE Test by Balazs Bacsay
 
Richard wartell malware is hard. let's go shopping!!
Richard wartell   malware is hard.  let's go shopping!!Richard wartell   malware is hard.  let's go shopping!!
Richard wartell malware is hard. let's go shopping!!
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Hunting Government Back Doors by Joseph Menn

  • 1. HUNTING GOVERNMENT BACK DOORS JOSEPH MENN
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Whistle-blower AT&T technician Mark Klein says his effort to reveal alleged government surveillance of domestic Internet traffic was blocked not only by U.S. intelligence officials but also by the top editors of the Los Angeles Times. In his first broadcast interview, as seen tonight on Nightline, Klein describes how he stumbled across "secret NSA rooms" being installed at an AT&T switching center in San Francisco and later heard of similar rooms in at least six other cities, including Atlanta, San Diego, Los Angeles, Palo Alto, San Jose and Seattle. "You needed an ordinary key and the code to punch into a key pad on the door, and the only person who had both of those things was the one guy cleared by the NSA," Klein says of the "secret room" at the AT&T center in San Francisco. The NSA is the National Security Agency, the country's most secretive intelligence agency, charged with intercepting communications overseas. Klein says he collected 120 pages of technical documents left around the San Francisco office showing how the NSA was installing "splitters" that would allow it to copy both domestic and international Internet traffic moving through AT&T connections with 16 other trunk lines. "It's gobs and gobs of information going across the Internet," Klein says. President Bush has acknowledged he authorized the NSA to intercept the communications of people with known links to terrorist organizations "into or out of the United States," but that "we're not trolling through the personal lives of millions of innocent Americans." Intelligence experts say the NSA has the means to filter out suspect communications with sophisticated machines that spot key words, names, addresses or patterns. Eventually, Klein says he decided to take his documents to the Los Angeles Times, to blow the whistle on what he calls "an illegal and Orwellian project." But after working for two months with LA Times reporter Joe Menn, Klein says he was told the story had been killed at the request of then-Director of National Intelligence John Negroponte and then-director of the NSA Gen. Michael Hayden. The Los Angeles Times' decision was made by the paper's editor at the time, Dean Baquet, now the Washington bureau chief of The New York Times. Baquet confirmed to ABCNews.com he talked with Negroponte and Hayden but says "government pressure played no role in my decision not to run the story." Baquet says he and managing editor Doug Frantz decided "we did not have a story, that we could not figure out what was going on" based on Klein's highly technical documents. The reporter, Menn, declined to comment, but Baquet says he knows "Joe disagreed and was very disappointed." Klein says he then took his AT&T documents to The New York Times, which published its exclusive account last April. As the new Washington bureau chief of The New York Times, Baquet now oversees the reporters who have broken most of the major stories involving the government surveillance program, often over objections from the government. After The New York Times story appeared, Klein filed an affidavit in a lawsuit against AT&T brought by a civil liberties group, Electronic Frontier Foundation. The NSA says it will not confirm or deny the existence or the purpose of the "secret rooms," but in a filing in the court case against AT&T, Negroponte formally invoked the "state secrets privilege," claiming the lawsuit and the information from Klein and others could "cause exceptionally grave damage to the national security of the United States." Klein says what he knows won't help terrorists. "The only people that are being kept in the dark is the American people who are being misled and not realizing, not being told that their private information, that their liberties are being destroyed and tramped on," he said.