Profile of Keith „Emperor“ Alexander, NSA-Masterchief of your Data

Wired hat eine spannende Story über Keith Alexander, Chef der NSA – „We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets“ –, der seinen Laden in den letzten acht Jahren zu einem Cyberwar-Monster hochgejazzed hat, von dem die Snowden-Leaks nur die spitze des Eisbergs sein dürften: NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar.

Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.

Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”

Derweil hat Ed Snowden mit der South China Morning Post geredet, die das Interview in einer Serie von Posts veröffentlichen: US government has been hacking Hong Kong and China for years, Whistleblower Edward Snowden talks to South China Morning Post, Whistle-blower Edward Snowden tells SCMP: 'Let Hong Kong people decide my fate', Washington is bullying Hong Kong to extradite me, says Edward Snowden.

Und falls jemand Lust auf Next Level Verschwörungstheorien hat: Steve Kinney schreibt auf der Website des Centre for Global Research in Kanada die meines Erachtens ziemlich realistische These auf, dass die NSA bereits Wochen vor den Leaks Wind von Snowdens Absichten bekommen hat und ihn mit falschen Informationen versorgte, die PRISM-Leaks also nur ein Honeypot sind, um die tatsächlich Ausmaße der Schnüffelei der NSA zu verschleiern. Und die Argumente klingen erschreckend logisch:

1. Die Logos der Tech-Firmen sind in den PRISM-Dokumenten auffällig prominent in Szene gesetzt, 2. Snowden hat während seiner Arbeit mit seinen Kollegen über Datenmissbrauch geredet und wäre daher sicher auf einer roten Liste der NSA, 3. Keith Alexander hat nach bekanntwerden der Leaks viel zu schnell reagiert und die Dokumente als authentisch klassifiziert.

In the wake of the Wikileaks scandals, the U.S. intelligence community has answered “Who shall watch the watchmen?” by introducing active surveillance and detailed profiling of their own analysts and contractors, looking for potential whistleblowers. By his own account, Snowden often discussed perceived Agency wrongdoing with his co-workers, which suggests that he should have been profiled and flagged as a potential leaker by the NSA’s internal surveillance process.

The logos of major U.S. IT and communication service providers are splashed across the top of PRISM power point slides like sponsor patches on a NASCAR driver’s jacket. Vendor logos often do appear next to product illustrations in DoD briefing documents, and are sometimes used to indicate a vendor’s position in process or procurement flow charts. But the “ad banner” format present in the leaked PRISM slides is very unusual and apparently unique to the PRISM document.

It is against long standing Agency policy to comment directly on any classified matter, and its Directors have consistently refused to confirm or deny any Agency activity when questioned by the press. But when the UK Guardian broke the story of the PRISM leak, the Director of National Intelligence promptly confirmed the document as authentic, calling the leak “reprehensible”. […] This very unusual confirmation raises more questions about the PRISM document than it answers.

NSA Deception Operation? Questions Surround Leaked PRISM Document’s Authenticity