10 Scariest NSA Secrets Exposed by Snowden; Why Natives Need to Know

Gale Courey Toensing

The scariest revelation to come out of  whistleblower Edward Snowden’s National Security Agency leaks is that everything you’ve ever known or suspected about government spying, including the use of sinister-sounding code-names, is true -- and then some.

In early June, The Guardian began publishing articles by journalist Glenn Greenwald about the United States government’s top-secret spying on US citizens through their phones and internet use. News of the mass surveillance programs set off an ongoing international storm of controversy over security and the ethics around the idea of the federal government acting like the government in George Orwell’s classic dystopian novel 1984, where “Big Brother is watching you.”

The menacing Big Brother poster from the 1956 film adaptation of '1984.'

Greenwald soon disclosed that it was Edward Snowden, a 29-year-old American computer specialist and former National Security Agency (NSA) contractor, who had downloaded a trove of top secret documents from NSA systems concerning several top-secret US and British government surveillance programs. The disclosure of Snowden’s identity was made at his request. "I have no intention of hiding who I am because I know I have done nothing wrong," he said.

Snowden had fled the U.S. in anticipation of Greenwald’s story breaking.   In early July, Indian Country Today Media Network’s Washington bureau chief Washington bureau chief Rob Capriccioso speculated about whether Snowden could find asylum with an American Indian tribe. The answer was no, because the U.S. government would almost definitely barge onto the “sovereign” Indian land to grab Snowden and lock him up -- federal prosecutors had charged Snowden with espionage in June.  Snowden has since found asylum in Russia, which refused to extradite him, straining the relationship between the two countries.   

But the issue of mass surveillance raises questions about the impact of government spying on Indians. While the totalitarian vision of Big Brother spying on our conversations and emails and stalking us through cyberspace is scary for everyone, are American Indians more vulnerable to being swept up in the frenzy of the hunt for terrorists? The government says the massive, indiscriminate sweeps of citizens’ phone calls, emails and other information are to help stop terrorist attacks before they happen, but consider how easily it linked Indians and terrorists recently. In 2011, the Obama administration casually used Geronimo, one of the most revered figures in American Indian history, as the codename for Osama bin Laden and the operation to assassinate him. That same year, government prosecutors compared the Seminoles to terrorists and cited Andrew Jackson’s genocidal wars against the Florida Indians as a precedent for the prosecution of Al Qaeda suspects.  During the 2012 presidential campaign, presidential hopeful Newt Gingrich also conjured up Jackson as a model for the way the U.S. should approach its “enemies” today. “Kill them!” he said.

Is there reason to fear that the government would use information it seizes from phone calls and the Internet to launch “counter-terrorist” actions against sacred land advocates  or indigenous activists involved in the struggle for land rights or protesting against devastating proposals like the  controversial Keystone XL pipeline or other extraction projects? According to Revenue Watch, American Indian lands include an estimated 30 percent of the nation’s coal reserves west of the Mississippi, as much as 50 percent of potential uranium reserves, and up to 20 percent of known natural gas and oil reserves. The lands also may contain rare earth minerals, increasingly sought after by powerful multinational corporations for use in manufacturing – especially the manufacturing of the electronic devices the government sweeps with its state-of-the-art mass surveillance tools. 

Should we be afraid, very, very afraid? Decide for yourself. Here are some of the key revelations from Snowden’s leaks:

1. Big Brother can force Big Companies to roll over.

The federal government forced Verizon and other giant telecommunication companies to spy on their customers. The NSA, on a request from the FBI, indiscriminately collected the telephone records of millions of US Verizon customers – regardless of whether they were suspected of wrongdoing -- under a top secret court order granted by the Foreign Intelligence Surveillance Court. The order allowed the collection of massive amounts of “metadata” or transactional information -- the numbers of both parties on a call, location data, unique identifiers, and the time and duration of all calls, but not the contents of the conversation.

2. Big Brother can forbid Big Companies from telling you they rolled over.

Verizon was not only forced to spy on its customers, but also expressly barred from disclosing either the FBI's request for its customers' records or the court order itself.

3. Constitutional right to privacy? You don't have one anymore.

President Obama assured the public that “Nobody is listening to your telephone calls,” and minimized the inconvenient truth that the government had violated the Constitutional protection of privacy in the Fourth Amendment . “[The collection of this data] help us prevent terrorist attacks and the modest encroachments on privacy. . . was worth us doing,” Obama said.

4. Remember when they said they weren't reading your e-mails? They were reading your e-mails.

But another Guardian report disclosed that the NSA was accessing the content of emails. The agency had obtained direct access to the systems of Google, Facebook, Apple and other US internet giants through a program called Prism, which grabbed both metadata and the content of  search history, file transfers, live chats and emails.

5. It seems you can't trust Big Brother OR the Big Companies.

The Prism program was documented in a 41-slide PowerPoint that claimed the program is run with the assistance of the companies, but “all those who responded to a Guardian request for comment. . . denied knowledge of any such program,” the report said. Google said in a statement: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data."  Whom to believe?

6. Big Brother is collecting an obscene amount of data.

The Guardian reported on the use of the sinister-sounding “Boundless Informant” ,  a powerful data-mining tool developed by the NSA to collect, record and analyze where its intelligence comes from, “raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications,” the report said.  Another document showed the agency collected almost three billion pieces of intelligence from US computer networks over a 30-day period ending in March. Who can resist wondering if their emails were among the pieces?

7. A surprising number of people can access and analyze this obscene amount of data.

In July the Guardian reported on another sinister-sounding NSA program – XKeyscore—that allows analysts with no authorization to search through vast databases containing emails, online chats and the browsing histories of millions of individuals. NSA training materials described XKeyscore is its  "widest-reaching" system for developing intelligence from the internet.

8. Your secure and encrypted e-mail is neither.

Another set of documents revealed that Microsoft collaborated closely with US intelligence services to allow users' communications to be intercepted, the Guardian reported. The documents show that Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new outlook.com portal. The NSA already had pre-encryption stage access to email on Outlook.com, including Hotmail. Microsoft worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide, and with the FBI's Data Intercept Unit to "understand" potential issues of a feature in Outlook.com that allows users to create email aliases.

9. Now that Microsoft owns Skype, your Skype calls are fair game.

In July last year, nine months after Microsoft bought Skype, the NSA boasted that it had “tripled the amount of Skype video calls being collected through Prism,” The Guardian reported.

10. It's a team sport, and you're outmatched.

The report also revealed that material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a "team sport."

If that isn’t enough to scare anyone, consider the impact of the government’s secret surveillance programs on a free press -- the foundation of a free society. On August 18, British security agents detained Greenwald’s partner, David Miranda, for nine hours at London Airport under the British Terrorism Act of 2000 . Officials confiscated Miranda’s mobile phone, laptop, camera, memory sticks, DVDs and games consoles. “This is a profound attack on press freedoms and the news gathering process," Greenwald said. Miranda’s detention and the seizure of large amounts of his possessions, included research data he had collected, “is clearly intended to send a message of intimidation to those of us who have been reporting on the NSA and [its British equivalent]. The actions of the UK pose a serious threat to journalists everywhere.”

They also make it clear “that it would be highly unadvisable for Greenwald (or any other journalist) to regard any electronic means of communication as safe,” Alan Rusbridger wrote in a Guardian report dated August 19.  “The Guardian's work on the Snowden story has involved many individuals taking a huge number of flights in order to have face-to-face meetings. Not good for the environment, but increasingly the only way to operate. Soon we will be back to pen and paper.”

You need to be logged in in order to post comments
Please use the log in option at the bottom of this page



chahta ohoyo's picture
chahta ohoyo
Submitted by chahta ohoyo on
soooooo....what else is new....govt's have spied on their citizens since the beginnings of 'republics'...technology just makes it that much easier...just sit in a chair, at a desk, in front of a computer screen and spy, spy, spy...and, dont EVER type anything anywhere on any webpage you aint willin' for the whole world and beyond to know about...aiahninchi ohoyo

texasouthwind's picture
Submitted by texasouthwind on

Mark Franco
Mark Franco
Submitted by Mark Franco on
When I was the Headman of my tribe here in California, we held a war dance, declared war on the US and its agencies of mass destruction of tribal rights, sacred places and culture. We declared that the actions of the BIA and BOR and others constituted "cultural genocide" against a sovereign people. We continued to press this message in presentations made in south, central, and North America. I wanted the government to listen in. I was not afraid of them then and I am still not. Not one of the agencies cared that we were telling the truth on their inaction's and overt racist activities against native peoples everywhere. So now, they have the Wiki leaks and Snowden telling people to beware of "big brother". I say, do not be afraid of your own voice folks, keep telling the truth and never roll over and forget the generations before and those to come. We owe our culture and our grandparents that much.

mrizabarte's picture
Submitted by mrizabarte on
Echelon is the data stream sifter used 20 years ago to listen to 2 mil data streams for words like "bomb" or "kill" etc. Later, Carnivore was added as the database "sifter" to mine personal information from bank cards, auto club, medical and other electronic "foot prints' assembled into a profile of an individuals life. Got arrested in Las Vegas?, it goes on your permanent record and stays there forever. As a requirement for licensing of computer programs (End License User Agreement--ELUA) the software manufactures must provide the backdoor code to to the US government. I have had local, federal and military surveillance even though I am just protecting my land and people from nuclear threats and hazards caused by the US testing of weapons of mass destruction on my property in violation of international treaty, the Treaty of Ruby Valley. Without a context for understanding these type of intrusions and how the "victim' may perceive the intrusion, you may think they are crazy. Be wise in all your actions.

DawsonAss's picture
Submitted by DawsonAss on
De best ting we can do iz giv dem azzholez watt day b wantin,,jezz end every phon call, email, text, blog,on an on with all day favaret words, AIRPORT, BOMB, GUNS,AL KAYDA,,and eny ya can think of an dont foget ta tell eny shmuck who is readin yo word wiff out yo promission ta fug off,,and n diss way we will prove that we should b watched an listined too,,0x0x!?

Anonymous's picture
Submitted by Anonymous on
i knew all this along time ago in my internal conciousness i know alot not pbhsicic its just a way of knowing