Engineering:Optic Nerve (GCHQ)

From HandWiki
Revision as of 20:03, 4 February 2024 by TextAI2 (talk | contribs) (update)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Optic Nerve is a mass surveillance programme run by the British signals intelligence agency Government Communications Headquarters (GCHQ), with help from the US National Security Agency, that surreptitiously collects private webcam still images from users while they are using a Yahoo! webcam application. As an example of the scale, in one 6-month period, the programme is reported to have collected images from 1.8 million Yahoo! user accounts globally. The programme was first reported on in the media in February 2014, from documents leaked by the former National Security Agency contractor Edward Snowden, but dates back to a prototype started in 2008, and was still active in at least 2012.[1][2] The leaked documents describe the users under surveillance as "unselected", meaning that data was collected indiscriminately in bulk from users regardless of whether they were an intelligence target or not. The vast majority of affected users would have been completely innocent of any crime or suspicion of a crime. Optic Nerve as described in the documents collected one still image every 5 minutes per user, attempting to comply with human rights legislation.[1] The images were collected in a searchable database, and used for experiments in facial recognition, to monitor known targets, and to discover new targets. The choice of Yahoo! for surveillance was taken because "Yahoo webcam is known to be used by GCHQ targets". Unlike the US NSA, the UK GCHQ is not required by law to minimise the collection from domestic citizens, so UK citizens could have been targeted on the same level as non-UK citizens.[1][2]

The story was broken by The Guardian in February 2014, and is based on leaked documents dating to between 2008 and 2012. Yahoo! expressed outrage at the programme,[3] when approached by The Guardian, and subsequently called it "a whole new level of violation of our users' privacy."[1] A GCHQ spokesperson stated "It is a long-standing policy that we do not comment on intelligence matters".[2][4]

Though there were some limits to which photos security analysts were allowed to see, with bulk searches limited to metadata, security analysts were allowed to see "webcam images associated with similar Yahoo identifiers to your known target".[1][2]

Technical details

Optic Nerve worked by collecting the information from GCHQ's large network of Internet cable taps, feeding into systems provided by the United States' National Security Agency. NSA research was used to build the tool to isolate the webcam traffic.[1]

Given that both Yahoo! Messenger chats and webcam streams are sent unencrypted, it would have been relatively easy (though not trivial) to intercept the webcam traffic.[5] Following the Snowden leaks, Yahoo! planned to give all users the option to encrypt all communications with Yahoo!'s servers by April, 2014.[6]

Sexually explicit images

Between 3% and 11% of the images captured by the webcams were sexually explicit in nature [1] and deemed "undesirable nudity".[7]

Unfortunately … it would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person. Also, the fact that the Yahoo! software allows more than one person to view a webcam stream without necessarily sending a reciprocal stream means that it appears sometimes to be used for broadcasting pornography.[1]

Other webcam traffic targets

The documents mentioned interest in monitoring the video from the Xbox 360 and Xbox One's Kinect camera,[1] something which Microsoft has reported it was oblivious to.[8]

Reactions

This is a truly shocking revelation that underscores the importance of the debate on privacy now taking place and the reforms being considered. In a world in which there is no technological barrier to pervasive surveillance, the scope of the government’s surveillance activities must be decided by the public, not secretive spy agencies interpreting secret legal authorities.
—The American Civil Liberties Union[5]

See also

References

  1. 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Ackerman, Spencer; Ball, James (27 February 2014). "Yahoo webcam images from millions of users intercepted by GCHQ". The Guardian. https://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo. Retrieved 28 February 2014. 
  2. 2.0 2.1 2.2 2.3 Perlroth, Nicole (27 February 2014). "British Spies Said to Intercept Yahoo Webcam Images". New York Times. https://www.nytimes.com/2014/02/28/technology/british-spies-said-to-have-intercepted-yahoo-webcam-images.html?hpw&rref=technology&_r=1. Retrieved 28 February 2014. 
  3. Nicks, Denver (27 February 2014). "Report: U.K. Spy Agency Stored Millions of Webcam Images". Time. http://world.time.com/2014/02/27/nsa-leaks-edward-snowden-gchq-yahoo-webcam-spying/. Retrieved 28 February 2014. 
  4. Fioretti, Julia (27 February 2014). "British spy agency collected images of Yahoo! webcam chats: Guardian". Reuters. https://www.reuters.com/article/us-usa-security-britain-idUSBREA1Q1XX20140227. Retrieved 28 February 2014. 
  5. 5.0 5.1 Jack Clark (27 February 2014). "UK spies on MILLIONS of Yahoo! webcams, ogles sex vids - report". The Register. https://www.theregister.co.uk/2014/02/27/gchq_optic_nerve/. 
  6. "Our Commitment to Protecting Your Information". Yahoo!. http://yahoo.tumblr.com/post/67373852814/our-commitment-to-protecting-your-information. 
  7. Johnston, Ian (27 February 2014). "British agents spied on Yahoo users' 'intimate' webcam images, Snowden files reveal". The Independent. https://www.independent.co.uk/life-style/gadgets-and-tech/yahoo-webcam-users-intimate-images-intercepted-by-gchq-spy-programme-snowden-files-reveal-9158140.html. Retrieved 28 February 2014. 
  8. "GCHQ identified Kinect as possible snooping tool; Microsoft denies all knowledge". The Market for Computer and Video Games. 28 February 2014. http://www.mcvuk.com/news/read/gchq-identified-kinect-as-possible-snooping-tool/0128871. Retrieved 1 March 2014.