Soltani is an independent security researcher and consultant.
a sketch shows where the "Public Internet" meets the internal "Google Cloud"
where user data resides.
Two engineers with close ties to Google exploded in profanity
when they saw the drawing.
The National Security Agency (NSA) has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.
By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md.
In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records - including "metadata," which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.
From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.
The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.
The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.
In a statement, the NSA said it is,
In a statement, Google’s chief legal officer, David Drummond, said the company has,
A Yahoo spokeswoman said,
Under PRISM, the NSA gathers huge volumes of online communications records by legally compelling U.S. technology companies, including Yahoo and Google, to turn over any data that match court-approved search terms.
That program, which was first disclosed by The Washington Post and the Guardian newspaper in Britain, is authorized under Section 702 of the FISA Amendments Act and overseen by the ForeignIntelligence Surveillance Court (FISC).
Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to "full take," "bulk access" and "high volume" operations on Yahoo and Google networks.
Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.
Outside U.S. territory, statutory restrictions on surveillance seldom apply and the FISC has no jurisdiction.
Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333, which defines the basic powers and responsibilities of the intelligence agencies.
John Schindler, a former NSA chief analyst and frequent defender who teaches at the Naval War College, said it is obvious why the agency would prefer to avoid restrictions where it can.
In a statement, the Office of the Director of National Intelligence denied that it was using executive authority to "get around the limitations" imposed by FISA.
The operation to infiltrate data links exploits a fundamental weakness in systems architecture. To guard against data loss and system slowdowns, Google and Yahoo maintain fortress-like data centers across four continents and connect them with thousands of miles of fiber-optic cable.
Data move seamlessly around these globe-spanning "cloud" networks, which represent billions of dollars of investment.
For the data centers to operate effectively, they synchronize large volumes of information about account holders. Yahoo’s internal network, for example, sometimes transmits entire e-mail archives - years of messages and attachments - from one data center to another.
Tapping the Google and Yahoo clouds allows the NSA to intercept communications in real time and to take "a retrospective look at target activity," according to one internal NSA document.
To obtain free access to data- center traffic, the NSA had to circumvent gold-standard security measures.
Google and Yahoo also pay for premium data
links, designed to be faster, more reliable and more secure. In recent
years, both of them are said to have bought
They had reason to think, insiders said, that their private, internal networks were safe from prying eyes.
In an NSA presentation slide on "Google Cloud Exploitation," however, a sketch shows where the "Public Internet" meets the internal "Google Cloud" where their data reside. In hand-printed letters, the drawing notes that encryption is "added and removed here!"
The artist adds a smiley face, a cheeky celebration of victory over Google security.
Two engineers with close ties to Google exploded in profanity when they saw the drawing.
PowerPoint slides about the Google cloud, for example, show that the NSA tries to filter out all data from the company’s "Web crawler," which indexes Internet pages.
According to the briefing documents, prepared by participants in the MUSCULAR project, collection from inside Yahoo and Google has produced important intelligence leads against hostile foreign governments that are specified in the documents.
Last month, long before The Post approached Google to discuss the penetration of its cloud, Eric Grosse, vice president for security engineering, said the company is rushing to encrypt the links between its data centers.
Yahoo has not announced plans to encrypt its data-center links.
Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previously unknown scale from U.S. citizens and residents.
Those operations have gone undebated in public or in Congress because their existence was classified.
The Google and Yahoo operations call attention to an asymmetry in U.S. surveillance law.
Although Congress has lifted some restrictions on NSA domestic surveillance on grounds that purely foreign communications sometimes pass over U.S. switches and cables, it has not added restrictions overseas, where American communications or data stores now cross over foreign switches.
It is not clear how much data from Americans is collected and how much of that is retained.
One weekly report on MUSCULAR says the British operators of the site allow the NSA to contribute 100,000 "selectors," or search terms. That is more than twice the number in use in the PRISM program, but even 100,000 cannot easily account for the millions of records that are said to be sent to Fort Meade each day.
In 2011, when the FISC learned that the NSA was using similar methods to collect and analyze data streams - on a much smaller scale - from cables on U.S. territory, Judge John D. Bates ruled that the program was illegal under FISA and inconsistent with the requirements of the Fourth Amendment.