Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Privacy Facebook Google Security

First Confirmed Prism Surveillance Target Was Democracy Activist (fortune.com) 110

A new report by Television New Zealand in collaboration with The Intercept, based on leaks of former U.S. National Security Agency worker Edward Snowden has for the first time named a target of the NSA's controversial Prism program. The target was a middle-aged civil servant and pro-democracy activist named Tony Fullman. Fullman, who is originally from Fiji but has lived in New Zealand for decades, is an advocate for democracy in Fiji and a critic of Fijian prime minister Frank Bainimarama, who took power in a 2006 coup. From a Fortune report: According to The Intercept, the NSA in 2012 monitored Fullman's communications through the Prism program and passed on information to the New Zealand intelligence services. Around the same time, the New Zealand authorities raided Fullman's home and revoked his passport. The New Zealand intelligence services were not themselves allowed to spy on Fullman, who was a New Zealand citizen. However, as Snowden has repeatedly described, the agencies of many Anglophone countries spy on each other's behalf, in order to bypass their national legal restrictions. Fullman suggested in the article that people in the group may well have said violent things about Bainimarama, but this was just venting, not a plot. According to the report, they never suspected someone was listening into their communications. The NSA was said to be helping by analyzing Fullman's Facebook and Gmail activities. The 190 pages of intercepted documentation seen by The Intercept apparently didn't reveal evidence of a plot.
This discussion has been archived. No new comments can be posted.

First Confirmed Prism Surveillance Target Was Democracy Activist

Comments Filter:
  • Encryption (Score:5, Insightful)

    by HumanWiki ( 4493803 ) on Monday August 15, 2016 @10:02AM (#52704129)

    And this is exactly why the general public needs encryption and why various TLA outfits and buddies like to use the "think of the children" garbage to denounce it.

    • by Anonymous Coward

      The issue with that logic is that if government agencies can get around laws restricting them from spying on you without consequence then what makes you think the average person can rely on easily available encryption to protect them?

      • Re:Encryption (Score:5, Informative)

        by Maritz ( 1829006 ) on Monday August 15, 2016 @10:52AM (#52704477)
        Getting around math is not like getting around a law. That's the short answer to that point.
        • by XXongo ( 3986865 ) on Monday August 15, 2016 @11:35AM (#52704763) Homepage

          if government agencies can get around laws restricting them from spying on you without consequence then what makes you think the average person can rely on easily available encryption to protect them?

          Getting around math is not like getting around a law. That's the short answer to that point.

          Unless people are mathematicians themselves, they are unable to personally verify the effectiveness of an encryption algorithm. When you use an encryption algorithm, you have to trust it works without a secret decryption algorithm.

          • by Anonymous Coward

            This "everybody can code" momentum needs to be diverted to a self-defense atmosphere. Even if your cipher is a piece of crap that can be cracked with basic cryptoanalysis techniques, it would be an interesting turn for endless homebrew encryption and subterfuge networks to begin quagmiring these ineffective surveillance networks even further.

            • it would be an interesting turn for endless homebrew encryption and subterfuge networks to begin quagmiring these ineffective surveillance networks even further.

              Zl rapelcgvba vf orggre guna lbhe rapelcgvba!

        • Getting around math is not like getting around a law. That's the short answer to that point.

          When security is breached, it's almost never the mathematics that was broken.

      • by Anonymous Coward

        Encryption is of no use if you are targeted. Encryption is only viable against blanket disregard of the peoples (plural) right to their property, their conversations and their communications. It will not help an individual target. Brute force will break any encryption.

        • Re:Encryption (Score:4, Informative)

          by Dunbal ( 464142 ) * on Monday August 15, 2016 @11:42AM (#52704809)

          Brute force will break any encryption.

          Not true [wikipedia.org]. Some encryption simply cannot be broken. However it is a major pain to set up, and you have to trust the parties on either end completely to not copy the pad and to destroy the pad once it has been used. Failing that, however, it cannot be broken.

          • by Anonymous Coward

            Brute force against YOU will break ANY encryption. I think after the second broken finger (they'll break the first one to make you understand that they're not messing about) you will come to understand their "reasons".

            • Re: Encryption (Score:4, Interesting)

              by Dunbal ( 464142 ) * on Monday August 15, 2016 @02:09PM (#52705957)
              If the pad is destroyed there is no way you can reproduce it - especially not from memory. As for "brute force" torture is not perfect. If it was, authority would keep using it despite all the "moral" issues. Torture is useless when you create a person who fabricates anything to get you to stop. They will confess to everything, and admit everything, which is absolutely useless because you're left with the doubts of your suspicions being confirmed because they're true, or because the person made it up. Back in the old days when you were going to hang the person anyway it didn't really matter. Nowadays there is still at least a sliver of law and due process left and you have the embarrassing task of having to account for the dead body.
              • One time pads are very easy to break. Much more difficult to verify though. :)

              • Torture is useless when you create a person who fabricates anything to get you to stop. They will confess to everything, and admit everything, which is absolutely useless because you're left with the doubts of your suspicions being confirmed because they're true, or because the person made it up.

                That is true, and it's often shortened to "torture doesn't work". But that's not entirely true either. There are (unfortunately) specific circumstances when torture works. In situations where you can easily and quickly verify the information you get from the subject, but not get it any other way, and you have the torture subject "on-line", i.e. can "turn up the heat" if the information is incorrect, torture works only too well.

                These situations aren't that common if you're a state trying to root out dissiden

            • by Anonymous Coward
              Except that I cannot trust that you'll stop breaking my fingers even after I give up my password, because you cannot be sure that I gave you the real password. It doesn't matter that I personally do not use hidden volumes, simply the fact that they do exist, and that some people do use them, means that you can never trust that what the I gave up, was everything that I know.
          • Most encryption algorithms can't be broken. Most implementations of encryption algorithms can be broken with sufficient effort. Almost any implementation of an encryption algorithm is vulnerable when running on a compromised OS. It doesn't matter how good your encryption is if the OS can steal the keys.
    • Encryption will not keep the NSA out of your communication channel for long, nor will it help against other intelligence agencies. It's their job to infiltrate any communications channel they have been assigned to infiltrate. At most, encryption will annoy them. What you need is better privacy laws, better separation of power and better control of intelligence agencies. The problem is social/political, not technical.
      • Re:Encryption (Score:5, Interesting)

        by HumanWiki ( 4493803 ) on Monday August 15, 2016 @10:51AM (#52704469)

        That's incorrect. There is always, going back many thousands of years, a struggle between the "smarter mouse and better mouse trap". That's how it is.

        Do you honestly think that some laws on paper will stop TLA agencies from doing things they shouldn't? They already violate laws and "get around" them.. H*ll, that's called out right in the summary.

    • How is encryption really going to stop the TLAs from scanning what you post on FaceBook?

    • And this is exactly why the general public needs encryption and why various TLA outfits and buddies like to use the "think of the children" garbage to denounce it.

      Rubbish. If you've nothing to hide... you aren't a protestor... you keep your head down... do what the government tells you... aren't unlucky enough to get caught in a wide sweeping dragnet... then you have no need for encryption or privacy!

      • And this is exactly why the general public needs encryption and why various TLA outfits and buddies like to use the "think of the children" garbage to denounce it.

        Rubbish. If you've nothing to hide... you aren't a protestor... you keep your head down... do what the government tells you... aren't unlucky enough to get caught in a wide sweeping dragnet... then you have no need for encryption or privacy!

        In that case, please turn over your Nobel-prize winning idea to anyone who asks for it. And turn over your entire customer list to your competition. And give me your SSN (or state ID.) And give me the code to your million-dollar app.

  • Politics as usual (Score:5, Informative)

    by Anonymous Coward on Monday August 15, 2016 @10:12AM (#52704175)

    You might wonder why a pro-democracy country is spying on a pro-democracy campaigner. It's not because of any 'terrorist' BS, that's just the excuse. They monitored him, so that when they negotiate with Fiji in future, they can offer him up as a bargaining chip.

    From the article: "Fullman reckons the timing of the raids was connected with the New Zealand foreign minister’s visit to Fiji for trade talks, just days later."

    And this is why NSA and GCHQ spying on their own countrymen's communications is a bad thing (it is NOT harmless). Because the data they capture is used in political deals against the rights of the target and against the interests of the country as a whole.

    New Zealand would have pulled his passport to secure a trade deal if necessary, so that they could tout a trade deal as a political win. All hidden from legal and democratic observation by the veil of 'security'.

    • Many "Pro-Democracy" people have an agenda that is outside the mainstream, however blame the fact that their crazy ideas are not in play, is because the system isn't allowing the "Silent Majority" to vote for it.

      There is also a risk to governments in a more Democratic system, as the general mass can be volatile to the fads of the time. Which is why the United States has a Democratic Republic design, vs a straight Democracy. It slows the system down as to prevent crazy ideas of the time to ruen a long term

    • You might wonder why a pro-democracy country is spying on a pro-democracy campaigner.

      Perhaps they have different definitions of democracy? There's also a lot of people who FUCKIN' LOVE DEMOCRACY until their side loses.

      One would need to examine the guy's actual politics before clutching pearls about targeting a "pro-democracy" activist as described by The Guardian.

      • One would need to examine the guy's actual politics before clutching pearls about targeting a "pro-democracy" activist as described by The Guardian.

        If one is not too lazy to google, one discovers that Fiji was under a military goverment (rather than a democratically elected one) in 2012. Fullman is implicated in a number of rather unsavory acts, but it's difficult to determine if he really was associated with violence in support of restoring democratic governance or if that's just the dictatorship trying to

  • by fuzzyfuzzyfungus ( 1223518 ) on Monday August 15, 2016 @10:14AM (#52704187) Journal
    I'm sure there's a perfectly reasonable explanation for how helping protect Fiji's military government from possible plots connects with the goal of protecting the US from terrorism, right?

    Was the NSA trying to protect the TSA from dehydration by ensuring that American air travelers would continue to have that Fiji bottled water to confiscate?
    • by swb ( 14022 )

      I'm surprised that the New Zealand government would even *care* about a Fijian expat's rants about Frank "Bananarama" Bainimarama or his banana republic dictatorship. Hell, it was Australia that sent special forces in to quell the natives after the 2000 coup. What exactly is New Zealand interested in? It can't be lucrative trade given Fiji's tiny economy, and it's not like a tidal wave of refugees is going to cross 1,000 miles of open ocean.

      Fiji is a typical colonial shit show, with non-indigenous Indian

  • by Anonymous Coward

    It's illegal for most countries to spy on their own citizens, but it's not illegal to share spy data with allies and have them give you the information on your own citizens that your own laws preclude?
    This is a violation of the spirit if not the letter of the law. Acquiring such information from allies should be just as illegal as spying on your country's own citizens, full stop.

  • by ls671 ( 1122017 ) on Monday August 15, 2016 @10:23AM (#52704281) Homepage

    Scratch my back and I'll scratch yours:

    You scratch my back and I'll scratch yours.
    Fig. You do a favor for me and I'll do a favor for you.; If you do something for me that I cannot do for myself, I will do something for you that you cannot do for yourself. I'll grab the box on the top shelf if you will creep under the table and pick up my pen. You scratch my back, and I'll scratch yours.

    http://idioms.thefreedictionar... [thefreedictionary.com]

    • by AmiMoJo ( 196126 )

      New Zealand is part of FIVEEYES. If they are anything like the UK, their signals intelligence security services are basically a subsidiary of the NSA.

      More interesting is if this was sanctioned in New Zealand, and if so who signed off on it and if they will be investigated now.

  • Oh, yeah, you can trust us, we'll never abuse this surveillance power.

    If they have the capability, they're gonna use it. Most likely to stalk their ex-girlfriends and harass those that buck they system. It's just human nature.

  • by Anonymous Coward

    He didn't do nothing wrong, so he hads nothing to hide.

  • Cheaters... (Score:2, Insightful)

    by Anonymous Coward

    ...in our own government.

    However, as Snowden has repeatedly described, the agencies of many Anglophone countries spy on each other's behalf, in order to bypass their national legal restrictions

    I am not surprised, but I am very, very disappointed. We have let the terrorists win because we have let them cow us into abandoning any sense of justice and liberty for some bullshit illusion of security. I now fear my own government far more than I fear "teh terrorists". That, or in a more cynical view, the

  • Eww. Next they'll want to introduce freedom and justice for all. Note the slippery slope, people!

    Glad they nipped it in the bud.

  • Gaggablaghblagh... Aga blah blah... AGA BLAHG BLAH!
  • The US gubmint - keeping the world safe for democracy! Or not...

  • "The New Zealand intelligence services were not themselves allowed to spy on Fullman, who was a New Zealand citizen"

    When this stuff started coming out, the prime minister of New Zealand rammed through legislation making it retroactively legal for the intelligence services to spy on citizens - mainly because they were caught redhanded directly doing so without even bothering to go through the PRISM facade.

    (Disclosure: I'm from NZ but haven't lived there for nearly 20 years as I was becoming more and more unh

There are two ways to write error-free programs; only the third one works.

Working...