Wired Goes Public With AT&T Documents on Spying

Posted by Pile (6442 views) Add this story to MyYahoo Add this article to del.icio.us Submit article to Reddit Add story to Furl Add story to StumbleUpon [E-Mail link]


Here's a snippet of the information AT&T and the US Government are desperately trying to supress:

In 2003 AT&T built "secret rooms" hidden deep in the bowels of its central offices in various cities, housing computer gear for a government spy operation which taps into the company's popular WorldNet service and the entire internet. These installations enable the government to look at every individual message on the internet and analyze exactly what people are doing. Documents showing the hardwire installation in San Francisco suggest that there are similar locations being installed in numerous other cities.

The cat's out of the bag. Wired has made a pre-emptive move for "freedom" by publicly releasing the documents showing details on wiretapping and more.

From Wired:



A file detailing aspects of AT&T's alleged participation in the National Security Agency's warrantless domestic wiretap operation is sitting in a San Francisco courthouse. But the public cannot see it because, at AT&T's insistence, it remains under seal in court records.

The judge in the case has so far denied requests from the Electronic Frontier Foundation, or EFF, and several news organizations to unseal the documents and make them public.

AT&T claims information in the file is proprietary and that it would suffer severe harm if it were released.

Based on what we've seen, Wired News disagrees. In addition, we believe the public's right to know the full facts in this case outweighs AT&T's claims to secrecy.

As a result, we are publishing the complete text of a set of documents from the EFF's primary witness in the case, former AT&T employee and whistle-blower Mark Klein -- information obtained by investigative reporter Ryan Singel through an anonymous source close to the litigation. The documents, available on Wired News as of Monday, consist of 30 pages, with an affidavit attributed to Klein, eight pages of AT&T documents marked "proprietary," and several pages of news clippings and other public information related to government-surveillance issues.

The AT&T documents appear to be excerpted from material that was later filed in the lawsuit under seal. But we can't be entirely sure, because the protective order prevents us from comparing the two sets of documents.

This week, we are joining in efforts to bring this evidence to light in its entirety.

We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press and Bloomberg.

Before publishing these documents we showed them to independent security experts, who agreed they pose no danger to AT&T. For example, they do not reveal sensitive information that hackers might use to attack the company's systems.

The court's gag order is very specific in barring only the EFF, its representatives and its technical experts from discussing and disseminating this information. The court explicitly rejected AT&T's motion to include Klein in the gag order and declined AT&T's request to force the EFF to return the documents.

>Wired Article
Court Documents (pdf)

 

 

Comments

 
Name: (change name for anonymous posting)
Title:
Comments:
   

1 Article displayed.

Pursuant to Section 230 of Title 47 of the United States Code (47 USC § 230), BSAlert is a user-contributed editorial web site and does not endorse any specific content, but merely acts as a "sounding board" for the online community. Any and all quoted material is referenced pursuant to "Fair Use" (17 U.S.C. § 107). Like any information resource, use your own judgement and seek out the facts and research and make informed choices.

Powered by Percleus (c) 2005-2047 - Content Management System

[Percleus 0.9.5] (c) 2005, PCS