The Criminal N.S.A.

Moderators: Elvis, DrVolin, Jeff

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Aug 23, 2013 10:31 am


An Open Letter to My Former NSA Colleagues

Mathematicians, why are you not speaking out?

By Charles Seife|Posted Thursday, Aug. 22, 2013, at 11:08 AM
130821_SCI_MathematicianColleaguesNSA
Image
Charles Seife's NSA ID card

Photo courtesy of Charles Seife

Most people don't know the history of Von Neumann Hall, the nearly windowless building hidden behind the engineering quadrangle at Princeton. I found out my junior year, when, as a bright-eyed young math major, I was recruited to work at the National Security Agency.

Von Neumann Hall was the former site of the Institute for Defense Analyses, a math-heavy research organization that did work for an agency that, at that time, dared not speak its name. The close ties between Princeton and the NSA went back decades, I discovered, and some of the professors I had been learning from were part of a secret brotherhood of number jocks who worked on really tough math problems for the sake of national security. I was proud to join the fraternity—one that was far bigger than I had ever imagined. According to NSA expert James Bamford, the agency is the single largest employer of mathematicians on the planet. It's a good bet that any high-quality math department of a reasonable size has a faculty member who's done work for the NSA.

I worked for the NSA in 1992 and 1993 under the auspices of the Director's Summer Program, which snaffles up hot young undergraduate math majors around the country each year. After clearing a security check—which included not just a polygraph exam but also a couple of FBI agents snooping around campus to see what mischief I had been up to—I wound up at Fort Meade, Md., for indoctrination.
Advertisement

It was more than 20 years ago that I received my first security briefing, and a lot of what I learned is now outdated. Back then, few had heard of what was nicknamed "No Such Agency," and the government wanted to keep it that way. We were taught not to breathe a word about the NSA; if anyone asked, we worked for the Department of Defense. That's even what it said on my resume and one of my NSA-issued ID cards. Now there's little point to such pretense. The agency has been outed and is a regular fixture of Page 1 headlines. In 1992, I was taught that the code words we stamped on all our classified documents were a closely guarded secret, that it was a crime to reveal them to outsiders. But a quick Google search shows that government websites are chock-full of papers clearly marked with words and phrases that were at one time for the eyes of only those few with the need to know.

Another thing they used to say at those briefings was that the might of the NSA would never be used against U.S. citizens. Back when I signed up, the agency made it crystal clear to us that we were empowered to protect our nation against only foreign enemies, not domestic ones. To do otherwise was against the NSA charter. More importantly, I got the strong sense that it was against the culture of the place. After working there for two summers, I genuinely believed that my colleagues would be horrified if they thought our work was being used to snoop on fellow Americans. Has that changed, too?

The mathematicians and cryptanalysts I met were from all over the country and had very different backgrounds, but we all seemed to be drawn to the agency for the same two reasons. First, we all knew that the math was sexy. This might sound bizarre to a non-mathematician, but certain mathematical problems just exude a certain something—a feeling of importance, of gravity, along with a sense that the solution is not far outside of your grasp. It's big, and it can be yours if you just think a little bit harder. When I signed up, I knew that the NSA was doing interesting math, but I had no idea what I was in for. Within a week of arriving at the NSA, I was presented with an amazing smorgasbord of the most alluring mathematics problems I had ever seen, any of which could possibly yield to a smart undergraduate. I hadn't seen anything like it—and I never will again.

The other thing that drew us—or so I thought—was an idealistic vision that we were doing something to help our country. I knew enough about history to have shed the notion that it was ungentlemanly to read your enemy's mail. And once I was on the inside, I saw plenty of ways that the agency was having an effect on national security. Even as a rookie, I felt I had a chance to make a difference in some small way. Some of the veteran mathematicians whom we met had clearly had a palpable effect on the security of the United States, legends almost completely unknown outside of our own club.

This isn't to say that the idealism was naive. Anyone who's spent any time on the other side of the intelligence game knows how high the stakes can be. We all understand that real human beings can die because of a seemingly minor breach of secrets we've been entrusted with. We also realize that intelligence gathering sometimes means using underhanded tactics to try to protect the nation. But we all knew that those tactics were constrained by law, even if that law isn't always black and white. The agency insisted, over and over, that the weapons we were building—and weapons they are, even if they're weapons of information—would never be turned on our own people, but would only be used upon our enemies.

What do we do now that we have to face the fact that the Agency broke its word?

We now know that every Verizon customer in the United States has had his telephony records turned over to the very agency that supposedly has no jurisdiction over calls originating and ending in the United States. On Wednesday more evidence emerged that the agency collected tens of thousands of “wholly domestic” emails. We know that the agency has extensive capabilities to snoop on U.S. citizens and regularly does so accidentally. And we have credible allegations that the agency sometimes uses that information quite on purpose. If the agency's tools truly are used only against the enemy, it seems that ordinary citizens are now being counted among them.

None of the research I did for the NSA turned out to be particularly important. I'm fairly certain that my work is gathering dust in some classified government warehouse somewhere. I worked for the agency for only a very short time, and that was a long time ago. Yet I feel compelled to speak out to say that I'm horrified. If this is really what the agency stands for, I am sorry to have helped in whatever small way that I did.

I can only guess how much more horrified the ex-NSAers I know—you, my former colleagues, my friends, my professors, and my mentors—must be. Unlike me, you have spent much of your working lives helping the NSA build its power, only to see your years of work used in a way it was never supposed to be used. You could speak out now in a way that violates neither your secrecy agreement nor your honor. It's hard to believe that the professors I know at universities around the country would remain silent as the NSA abuses their trust and misuses their work.

Or would you?
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Aug 23, 2013 11:17 am

Review of US surveillance programs to be led by panel of intelligence insiders
List of apparent panel members prompts criticism among privacy advocates after Obama promised 'independent' review

Paul Lewis in Washington
theguardian.com, Thursday 22 August 2013 15.56 EDT

President Barack Obama announced the creation of an 'independent' panel during a speech earlier this month. Photograph: Win Mcnamee/Getty
The review of US surveillance programs which Barack Obama promised would be conducted by an "independent" and "outside" panel of experts looks set to consist of four Washington insiders with close ties to the security establishment.

The president announced the creation of the group of experts two weeks ago, in an attempt to stem the rising tide of anger over National Security Agency surveillance techniques disclosed by the whistleblower Edward Snowden.

Obama trumpeted what he said would be a "high-level group of outside experts" tasked with assessing all of the government's "intelligence and communication technologies".

However a report by ABC News, which has not been denied by the administration, said the panel would consist of Michael Morell, a recent acting head of the CIA, and three former White House advisers.

The list of apparent panel members prompted criticism among privacy and civil liberty advocates, who said the review would lack credibility and was unlikely to end the controversy over US surveillance capabilities.

When Obama announced the review earlier this month, he said it would "step back and review our capabilities – particularly our surveillance technologies". The panel would also be asked to ensure there is "absolutely no abuse" government spying programs, Obama added, in order to ensure "the trust of the people".

The review was one of four concrete proposals laid out by the president, including working with Congress to draft new legislation, to reassure the public about NSA surveillance tactics and bring about reforms.

In addition to Morell, who was deputy director of the CIA until just three months ago, the panel is believed to consist of former White House officials Richard Clarke, Cass Sunstein and Peter Swire.

None responded to requests for comment, however sources close to Sunstein and Swire said they understood them to have been selected. A formal White House announcement is expected soon.

Sunstein, a Harvard law school professor who has been described as an intellectual inspiration for Obama, only left his job as White House's "regulatory czar" last year.

Sunstein is a particularly controversial appointment. In a paper in 2008, he appeared to propose the US government employing covert agents to "cognitively infiltrate" online groups and activist websites that advocate theories that are considered false and conspiratorial.

He has also proposed reformulating the first amendment, arguing that in some instances it goes too far in protecting damaging forms of speech.

He is married to Samantha Power, the former White House adviser whom Obama recently appointed as US ambassador to the United Nations.

Richard Clarke, the fourth member of the panel, is a well-known and sometimes outspoken figure in the intelligence establishment who served as a senior White House adviser to the last three presidents.

He now runs a private security company, Good Harbor Security Risk Management, headquartered in Washington.

"This group is very closely related to the White House already," said Mark Rumold, a staff attorney at the Electronic Frontier Foundation. "When we go down this road of having executive branch insiders continually placed in charge of reviewing the executive branch, it is more of a fox guarding the henhouse situation."

He pointed out that the new panel is the second executive body given responsibility for monitoring domestic surveillance operations.

The other oversight committee is the secretive Privacy & Civil Liberties Board (PCLOB), which was asked by the president to review surveillance capabilities in June, shortly after Snowden, a former NSA contractor, made his disclosures.

The EFF has been calling for the creation of a far more wide-ranging congressional inquiry, along the lines of the bipartisan Church Committee, which in 1975 investigated the FBI, CIA and NSA in the wake of the Watergate scandal.

Rumold said that committee was only created after a panel set-up by President Gerald Ford – similar in makeup to the one Obama appears to have chosen –was deemed to be insufficiently independent.

The review will provide an interim report in 60 days and issue a final report by the end of this year. Both reports will address how NSA surveillance programs impact security, privacy and foreign policy.

Of the three White House officials expected to be on Obama's panel, only one – Peter Swire – is considered by some civil liberty experts to be an appropriate choice.

A recently appointed professor at Georgia Institute of Technology, Swire has is a privacy expert, and fellow at two liberal think tanks: the Center for American Progress and the Center for Democracy & Technology.

Leslie Harris, president of the CD&T, described Swire's appointment as a "home run" for privacy groups.

"He understand the inside ways in which you can make things happen in government and the range of potential options for enhancing privacy," she said.

Harris said she also backed the appointments of Cass Sunstein and Richard Clarke, who she believed were sufficiently independent figures who had the experience to know how to navigate the upper echelons of government.

But she added: "They're not outsiders. That is a fair criticism. Certainly it gave me pause that they all had a prior involvement in the government."

"It doesn't look too independent, does it?" said Democratic congresswoman Zoe Lofgren. "It doesn't give the appearance of independence that was anticipated. Individuals who are not so closely associated with the administration would have been better."

Lofgren, who said she has had several conversations with voters who are concerned about NSA surveillance since returning to her California district during recess, said the makeup of the panel might backfire.

"The president, I would guess, intended to put the whole surveillance issue to rest with the establishment with an outsider review panel. Well, I don't think this will be perceived as the kind of independent group as most people had expected," she said.

"The apparent goal of sorting through the issues, and getting a credible report out there that was reassuring, will not be achieved. And therefore, he [Obama] is going to have to do something else."

Michelle Richardson, a legislative counsel at the American Civil Liberties Union, said that all four reported panel members, with the possible exception of Swire, were "folks are deeply enmeshed in the intelligence community".

She said she had expected the panel to consist of more independent figures, including known critics of the administration whose "livelihoods depend on the surveillance superstructure".

"Inside baseball has gotten us to routine spying on everyday Americans," she said. "Inside baseball has gotten us to routine spying on everyday Americans," she said. "It has been building up for decades. And the folks on the inside have a lot of skin in the game – these are their pet projects. It is so hard, once you have the authority, to give it up."
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Aug 23, 2013 12:55 pm

NSA paid millions to cover Prism compliance costs for tech companies

• Top-secret files show first evidence of financial relationship
• Prism companies include Google and Yahoo, says NSA
• Costs were incurred after 2011 Fisa court ruling

Ewen MacAskill in New York
theguardian.com, Friday 23 August 2013 10.34 EDT
Image
The material provides the first evidence of a financial relationship between the tech companies and the NSA.

The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program after a court ruled that some of the agency's activities were unconstitutional, according to top-secret material passed to the Guardian.

The technology companies, which the NSA says includes Google, Yahoo, Microsoft and Facebook, incurred the costs to meet new certification demands in the wake of the ruling from the Foreign Intelligence Surveillance (Fisa) court.

The October 2011 judgment, which was declassified on Wednesday by the Obama administration, found that the NSA's inability to separate purely domestic communications from foreign traffic violated the fourth amendment.

While the ruling did not concern the Prism program directly, documents passed to the Guardian by whistleblower Edward Snowden describe the problems the decision created for the agency and the efforts required to bring operations into compliance. The material provides the first evidence of a financial relationship between the tech companies and the NSA.

The intelligence agency requires the Fisa court to sign annual "certifications" that provide the legal framework for surveillance operations. But in the wake of the court judgment these were only being renewed on a temporary basis while the agency worked on a solution to the processes that had been ruled illegal.

An NSA newsletter entry, marked top secret and dated December 2012, discloses the huge costs this entailed. "Last year's problems resulted in multiple extensions to the certifications' expiration dates which cost millions of dollars for Prism providers to implement each successive extension – costs covered by Special Source Operations," it says.
Fisa 1 An NSA newsletter entry dated December 2012 disclosing the costs of new certification demands. Photograph: guardian.co.uk

Image
Special Source Operations, described by Snowden as the "crown jewel" of the NSA, handles all surveillance programs, such as Prism, that rely on "corporate partnerships" with telecoms and internet providers to access communications data.

The disclosure that taxpayers' money was used to cover the companies' compliance costs raises new questions over the relationship between Silicon Valley and the NSA. Since the existence of the program was first revealed by the Guardian and the Washington Post on June 6, the companies have repeatedly denied all knowledge of it and insisted they only hand over user data in response to specific legal requests from the authorities.

An earlier newsletter, which is undated, states that the Prism providers were all given new certifications within days of the Fisa court ruling. "All Prism providers, except Yahoo and Google, were successfully transitioned to the new certifications. We expect Yahoo and Google to complete transitioning by Friday 6 October."
Fisa 2 An earlier undated newsletter after the Fisa court ruling on certifications. Photograph: guardian.co.uk
Image
The Guardian invited the companies to respond to the new material and asked each one specific questions about the scale of the costs they incurred, the form of the reimbursement and whether they had received any other payments from the NSA in relation to the Prism program.

A Yahoo spokesperson said: "Federal law requires the US government to reimburse providers for costs incurred to respond to compulsory legal process imposed by the government. We have requested reimbursement consistent with this law."

Asked about the reimbursement of costs relating to compliance with Fisa court certifications, Facebook responded by saying it had "never received any compensation in connection with responding to a government data request".

Google did not answer any of the specific questions put to it, and provided only a general statement denying it had joined Prism or any other surveillance program. It added: "We await the US government's response to our petition to publish more national security request data, which will show that our compliance with American national security laws falls far short of the wild claims still being made in the press today."

Microsoft declined to give a response on the record.

The responses further expose the gap between how the NSA describes the operation of its Prism collection program and what the companies themselves say.

Prism operates under section 702 of the Fisa Amendments Act, which authorises the NSA to target without a warrant the communications of foreign nationals believed to be not on US soil.

But Snowden's revelations have shown that US emails and calls are collected in large quantities in the course of these 702 operations, either deliberately because the individual has been in contact with a foreign intelligence target or inadvertently because the NSA is unable to separate out purely domestic communications.

Last week, the Washington Post revealed documents from Snowden that showed the NSA breached privacy rules thousands of times a year, in the face of repeated assurances from Barack Obama and other senior intelligence figures that there was no evidence of unauthorised surveillance of Americans.

The newly declassified court ruling, by then chief Fisa judge John Bates, also revealed serious issues with how the NSA handled the US communications it was sweeping up under its foreign intelligence authorisations.

The judgment revealed that the NSA was collecting up to 56,000 wholly US internet communications per year in the three years until the court intervened. Bates also rebuked the agency for misrepresenting the true scope of a major collection program for the third time in three years.

The NSA newsletters say the agency's response to the ruling was to work on a "conservative solution in which higher-risk collection would be sequestered". At the same time, one entry states, the NSA's general counsel was considering filing an appeal.

The Guardian informed the White House, the NSA and the office of the director of national intelligence that it planned to publish the documents and asked whether the spy agency routinely covered all the costs of the Prism providers and what the annual cost was to the US.

The NSA declined to comment beyond requesting the redaction of the name of an individual staffer in one of the documents.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Aug 23, 2013 1:01 pm

THE SILENT POWER OF THE N.S.A.
By David Burnham
Published: March 27, 1983

David Burnham is a reporter in The Times's Washington bureau. This article is adapted from Mr. Burnham's book ''The Rise of the Computer State,'' to be published by Random House in May.

A Federal Court of Appeals recently ruled that the largest and most secretive intelligence agency of the United States, the National Security Agency, may lawfully intercept the overseas communications of Americans even if it has no reason to believe they are engaged in illegal activities. The ruling, which also allows summaries of these conversations to be sent to the Federal Bureau of Investigation, significantly broadens the already generous authority of the N.S.A. to keep track of American citizens.

The decision by the United States Court of Appeals for the Sixth Circuit involves the Government surveillance of Abdeen Jabara, a Michigan-born lawyer who for many years has represented Arab-American citizens and alien residents, and reverses a 1979 ruling that the N.S.A.'s acquisition of Jabara's overseas messages violated his Fourth Amendment right to be free of ''unreasonable searches and seizures.'' Even while refusing the plaintiff's request for reconsideration, the Court curiously acknowledged the far-reaching nature of the case, recognizing that the N.S.A.'s interception of overseas telecommunications and their dissemination to ''other Federal agencies has great potential for abuse.'' The Court, however, held that the problem was ''a policy matter that lies in the domain of the executive or legislative branch of our Government.''

The N.S.A. is much more than a massive computerized funnel that collects, channels and sorts information for the President and such organizations as the Central Intelligence Agency and F.B.I. The National Security Agency, an arm of the Defense Department but under the direct command of the Director of Central Intelligence, is an electronic spying operation, and its leverage is based on a massive bank of what are believed to be the largest and most advanced computers now available to any bureaucracy in the world: computers to break codes, direct spy satellites, intercept electronic messages, recog- nize target words in spoken communications and store, organize and index all of it.

Over the years, this virtually unknown Federal agency has repeatedly sought to enlarge its power without consulting the civilian officials who theoretically direct the Government, while it also has sought to influence the operation and development of all civilian communications networks. Indeed, under Vice Adm. Bobby Ray Inman, N.S.A. director from 1977 to 1981, the agency received an enlarged Presidential mandate to involve itself in communications issues, and successfully persuaded private corporations and institutions to cooperate with it.

Yet over the three decades since the N.S.A. was created by a classified executive order signed by President Truman in 1952, neither the Congress nor any President has publicly shown much interest in grappling with the far-reaching legal conflicts surrounding the operation of this extraordinarily powerful and clandestine agency. A Senate committee on intelligence, warning that the N.S.A.'s capabilities impinged on crucial issues of privacy, once urged that Congress or the courts develop a legislative or judicial framework to control the agency's activities. In a nation whose Constitution demands an open Government operating according to precise rules of fairness, the N.S.A. remains an unexamined entity. With the increasing computerization of society, the conflicts it presents become more important. The power of the N.S.A., whose annual budget and staff are believed to exceed those of either the F.B.I. or the C.I.A., is enhanced by its unique legal status within the Federal Government. Unlike the Agriculture Department, the Postal Service or even the C.I.A., the N.S.A. has no specific Congressional law defining its responsibilities and obligations. Instead, the agency, based at Fort George Meade, about 20 miles northeast of Washington, has operated under a series of Presidential directives. Because of Congress's failure to draft a law for the agency, because of the tremendous secrecy surrounding the N.S.A.'s work and because of the highly technical and thus thwarting character of its equipment, the N.S.A. is free to define and pursue its own goals.

Despite the impenetrable secrecy surrounding the agency - no public briefings or access to its premises is allowed - its mission was first discussed openly in the 1975 hearings of the Senate Select Committee to Study Government Operations with Respect to Intelligence Activities. Various aspects of the agency's responsibilities also have been touched upon in a handful of depositions filed by the agency in Federal courts, several recent executive orders and a few aging documents found in the towering stacks of the National Archives.

According to these sources, the N.S.A. has two broad goals, one offensive, one defensive. First, the agency aggressively monitors international communications links searching for ''foreign intelligence,'' intercepting electronic messages as well as signals generated by radar or missile launchings. Second, the agency prevents foreign penetration of communications links carrying information bearing on ''national security.''

According to an unpublished analysis by the House Government Operations Committee, the N.S.A. may have employed 120,000 people in 1976 when armed-services personnel were included in the official count. (According to a letter from the Joint Chiefs of Staff, overseas listening posts numbered 2,000.) In comparison, the F.B.I. had one employee for every six working for the N.S.A. The House report also estimated that the agency's annual expenditures were as high as $15 billion.

The Senate select committee's study of the N.S.A., one of the most extensive independent examinations ever made of the agency, was initiated in the wake of Watergate and the disclosure of other abuses by Federal intelligence agencies. During the course of the investigation, its chairman, Senator Frank Church, repeatedly emphasized his belief that the N.S.A.'s intelligence-gathering activities were essential to the nation's security. He also stressed that the equipment used to watch the Russians could just as easily ''monitor the private communications of Americans.'' If such forces were ever turned against the country's communications system, Senator Church said, ''no American would have any privacy left. ... There would be no place to hide.'' Over the years, N.S.A. surveillance activities have indeed included Americans who were merely stating their political beliefs. The agency first became involved in this more questionable kind of surveillance in the early 1960's when either Attorney General Robert F. Kennedy or the F.B.I. asked it to monitor all telephone calls between the United States and Cuba. This list of international calls was significantly enlarged during the Johnson Administrtion as Federal authorities became concerned that foreign governments might try to influence American civil-rights leaders. The N.S.A. gradually developed a ''watch list'' of Americans that included those speaking out against the Vietnam War.

According to the subsequent investigation by the Senate Intelligence Committee, a total of 1,200 Americans were targeted by the N.S.A. between 1967 and 1973 because of their political activities. The subjects - chosen by the F.B.I., the Secret Service, the C.I.A. and the Defense Intelligence Agency -included members of radical groups, celebrities and ordinary citizens. When it appeared that Congress might learn about the eavesdropping, the surveillance halted.

The Senate intelligence committee also discovered a second illegal surveillance program, under which the N.S.A., and its military predecessors, examined most of the telegrams entering or leaving the country between 1945 and 1975. The program was abruptly halted in May 1975, a date coinciding with the Senate committee's first expression of interest in it.

The records obtained by the committee indicate that from the project's earliest stages, both Government officials and corporate executives understood that the surveillance flatly violated a Federal law against intercepting or divulging telegrams. Certainly, they were aware that such interception violated the Fourth Amendment, guaranteeing against unreasonable searches and seizures, which also holds that a court warrant can be issued only when there is probable cause to believe a crime has been committed.

Using the information thus gathered, the N.S.A. between 1952 and 1974 developed files on approximately 75,000 Americans, some of whom undoubtedly threatened the nation's security. However, the agency also developed files on civil-rights and antiwar activists, Congressmen and other citizens who lawfully questioned Government policies. For at least 13 of the 22 years the agency was building these files, the C.I.A. had access to them and used the data in its Operation Chaos, another computerized and illegal tracking system set up during the Vietnam War. At its peak, the Chaos files had references to more than 300,000 Americans.

Several months after the hearing, the Senate intelligence committee issued a report that expressed great concern about both the N.S.A.'s activities and the failure of Congress and the Federal courts to comprehend them. ''The watch-list activities and the sophisticated capabilities that they highlight present some of the most crucial privacy issues now facing this nation,'' the committee warned. ''Space-age technology has outpaced the law. The secrecy that has surrounded much of the N.S.A.'s activities and the lack of Congressional oversight have prevented, in the past, bringing statutes in line with the N.S.A.'s capabilities. Neither the courts nor Congress have dealt with the interception of communications using the N.S.A.'s highly sensitive and complex technology.'' The committee recommended that Congress approve specific legislation spelling out the precise obligations and limitations of the agency. With the end of World War II and the start of the cold war, the value of effective intelligence remained high. In 1952, a special Presidential committee recommended the establishment of the N.S.A., replacing the four separate surveillance agencies within the Defense Department, concluding that a unified effort was essential because electronic surveillance of international communications ''ranks as our most important single source of intelligence today.''

The logic of the cold war also dictated that intelligence include not only secret blueprints for the latest weapon or infiltrating the enemy's ranks with spies, but also early signs that a blight had hit China's rice crop, indications that a new oil field had been located in a remote corner of Russia and analysis of radio traffic at an important Soviet-bloc airport.

The already expansive appetite of American intelligence analysts was further sharpened by technical advances that were occurring, not entirely by chance, at the same time. The technology in question was the digital computer, the wondrous tool diligently developed by American scientists working for such companies as I.B.M., the RCA Corporation and Sperry Rand, and covertly underwritten in a major way by the N.S.A. The computers' ability to acquire, organize, store and retrieve huge amounts of data was an essential factor leading to the agency's enlarged definition of intelligence.

The importance of the broadest possible intelligence gathering became even more critical when computer know-how began to spread beyond a technological elite based primarily in the United States to scientists in many nations. Simply stated, the spread of advanced computer skills and the related mathematical concepts meant that governments could reduce the chances that their top-secret messages would be intercepted and decoded, while at the same time increasing their ability to collect all kinds of economic and technical intelligence.

As a result of these changes, according to several United States officials, the intelligence apparatus of the Soviet Union began eavesdropping on millions of telephone conversations between Washington and New York and several other major cities in the early 1970's. Because of the unusual sensitivity of the subjects, however, the Federal Government did not exactly trumpet the news of the Soviet surveillance.

In 1977, about three years after this surveillance became known to the United States Government, the Carter Administration formally announced that the Russians were conducting wholesale eavesdropping from at least four locations in three different cities, New York, Washington and San Francisco. The targets of real concern were the Government, defense contractors and other large companies whose activities would contribute to Soviet collection of economic intelligence. Henceforth, classified information relating to national defense and foreign relations would be transmitted only by secure means. The Administration proposed the immediate purchase of an additional 100 ''voice scramblers'' for what is called the Executive Secure Voice Network. The central switching point for the network was determined to be the N.S.A., a fact that was unacknowledged by the Administration.

President Carter's decision immediately broadened the category of information requiring Government scrutiny and significantly extended the authority of the N.S.A. Yet no unclassified document defines what kinds of information would be useful to an adversary. A timetable of the trains running between Washington and New York could be useful to an enemy spy. Newspaper articles could serve as source material for intelligence operatives all over the world. Certainly, prececent had been established in 1971, when the N.S.A. was the lead agency in the Nixon Administration's attempt to stop newspapers from printing the Pentagon Papers, the bureaucratic history of the war in Vietnam. After blocking publication for 15 days, the Supreme Court ruled that the Government had failed to show why the material should not be published and that ''without compelling reasons'' prior restraint would be an unreasonable infringement of the freedom of the press.

Until that time, the Federal Government sought to control and protect only those military and diplomatic secrets that had been declared confidential, secret or top secret under a long-established and formally prescribed classification procedure. But now, President Carter had decided to create a huge new category of material worthy of Government protection: information that ''would be useful to an adversary.''

Telephone links in the areas where Soviet spies were known to be listening were rerouted via underground cable. To further reduce the leakage of the new category of information, the President directed the N.S.A. to approach large corporations and other institutions, collect information about their communications networks and assist them in safeguarding their material. The Carter directive sanctioning the N.S.A.'s involvement in the planning, organization and development of private communications systems not handling classified secrets was only one of several ways in which the power of the agency grew. Within the last few years, for example, the N.S.A. has forcefully moved to control the development and dissemination of inventive approaches intended to help the individual citizen, corporation or political organization maintain privacy.

On April 21, 1978, George I. Davida, then professor of electrical engineering and computer science at the University of Wisconsin at Milwaukee, received an order to keep secret all details of his invention, a computer security device. The N.S.A. informed Davida that under a little-known provision of the patent law a violation of the order could subject him to up to two years in jail and a

After the agency's orders were publicized by several newspapers and magazines, the N.S.A. decided to pull in its horns. Inman, the N.S.A.'s director, told a House committee that the two orders exemplified ''not a faulty law but inadequate Government attention to its application.'' He characterized the agency's handling of the voice-scrambling equipment as a ''well-meaning attempt to hold the line that had clearly already been passed by.''

A few years before, the director of the National Science Foundation, Richard C. Atkinson, and Inman had begun privately discussing whether the role of the spy agency in supervising cryptographic research should be expanded. The precise outcome of the talks remains murky, but the N.S.A. apparently won the debate. Today, the National Science Foundation routinely allows the N.S.A. to review any request for the funding of cryptographic research. The N.S.A. also has begun providing financial support for related unclassified civilian research. The first recipients of such support were two Stanford professors of electrical engineering, John T. Gill 3d, and Martin E. Hellman, a code expert who for many years had been sharply critical of the N.S.A.

''Five years ago, I was very much on the opposite side of the fence from N.S.A.,'' said Hellman. ''I wouldn't say I have been co-opted. As a result of them being more friendly and coming part way, I felt I should be more friendly. I guess I am now the first guinea pig.''

Hellman is not sure why the agency was interested in funding nonclassified research, and he acknowledges potential problems. ''One of the fears is that they are trying to buy people. If they support you, then they own you, and you really are going against them if they ask you not to publish something and you do.''

There are, of course, many ways to influence men. In early 1979, Inman spoke to the Armed Forces Communications and Electronics Association, the first public speech ever given by a top N.S.A. official. Speaking in the guarded language of his profession, Inman noted that the agency's mission could ''no longer remain entirely in the shadows.'' One reason for this change, he explained, was that the protection of communications was no longer of interest just to the Government; it also had become a major concern to private institutions. Because of this new interest, tensions, which he did not define, had developed between ''the national-security interests of the Government and the telecommunications-security interests of both the public and private sector.'' The time had come, he said, to begin a dialogue between the N.S.A. and the academic and industrial worlds.

The result of this dialogue so far has been the recommendation by a special committee of the American Council on Education, a prestigious organization of over 1,400 colleges and universities, that all researchers engaged in cryptographic research submit their work to the N.S.A. before publication. Only one of the nine members of the special committee opposed this ''voluntary'' system of prior restraint, George Davida. Davida, who believes such a system Page 67 is unconstitutional, said, ''The increase in the computerization of society has led to the construction of a large number of data bases that are 'electronic windows' into the most intimate details of people's lives. What is even more disturbing is that it is usually impossible to know who is looking in. Thus, these data bases are like one-way mirrors.''

''Encryption,'' he continued, referring to the coding of material placed in computers, ''can serve as a curtain. Therefore, the need for civilian (or nongovernmental) effort in cryptography is a strong one.''

Davida noted that the data bases used right now for statistical purposes, employment records, credit-card operations and many other operations essential to American life are all subject to possible N.S.A. scrutiny. ''The only effective method for maintaining separation of such data involves encryption,'' he declared.

Shortly after Inman persuaded the academic community to accept his system of prior restraint for cryptology, he was named Deputy Director of Central Intelligence by President Reagan, who replaced him with Air Force Lieut. Gen. Lincoln D. Faurer.(Later, Inman left the C.I.A. to become the director of the Microelectronics and Computer Technology Corporation, a private consortium of 10 high-technology companies.) Inman soon warned that many researchers would face mandatory Government censorship of their papers unless a system of review was established to limit the access of the Soviet Union to the benefits of American technology.

Speaking before the annual meeting of the American As-sociation for the Advancement of Science last year, Inman said that other areas where restrictions were required because publication of certain ''technical information could affect the national security in a harmful way. Examples include computer hardware and software, other electronic gear and techniques, lasers, crop projections and manufacturing procedures.''

Many scientists immediately objected. ''If you want to win the Indianapolis 500, you build the fastest car; you don't throw nails on the track,'' commented Peter J. Denning, head of Purdue University's Department of Computer Sciences and former president of the Association for Computing Machinery.

The American Association for the Advancement of Science passed a brief resolution on the day Inman spoke: ''Whereas freedom and national security are best preserved by adherence to the principles of openness that are a fundamental tenet of both American society and the scientific process, be it resolved that the A.A.A.S. opposes governmental restrictions on the dissemination, exchange or availability of unclassified knowledge.''

A few months before Inman's speech, Dr. Edward Teller, the physicist credited with being a major proponent of and contributor to the construction of the hydrogen bomb, wrote an essay attacking Government attempts to restrict scientists, saying, ''Secrecy is not compatible with science, but it is even less compatible with the democratic procedure.''

No laws define the limits of the N.S.A.'s power. No Congressional committee subjects the agency's budget to a systematic, informed and skeptical review. With unknown billions of Federal dollars, the agency purchases the most sophisticated communications and computer equipment in the world. But truly to comprehend the growing reach of this formidable organization, it is necessary to recall once again how the computers that power the N.S.A. are also gradually changing lives of Americans - the way they bank, obtain benefits from the Government and communicate with family and friends. Every day, in almost every area of culture and commerce, systems and procedures are being adopted by private companies and organizations as well as by the nation's security leaders that make it easier for the N.S.A. to dominate American society should it ever decide such action is necessary.


should it ever decide such action is necessary......
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Fri Aug 23, 2013 1:16 pm

Glenn Greenwald ‏@ggreenwald 46m

There goes the "no deliberate abuse" claim, which was always false anyways



NSA Analysts Intentionally Abused Spying Powers Multiple Times
By Chris Strohm - Aug 23, 2013 10:52 AM CT

Some National Security Agency analysts deliberately ignored restrictions on their authority to spy on Americans multiple times in the past decade, contradicting Obama administration officials’ and lawmakers’ statements that no willful violations occurred.

“Over the past decade, very rare instances of willful violations of NSA’s authorities have been found,” the NSA said in a statement to Bloomberg News. “NSA takes very seriously allegations of misconduct, and cooperates fully with any investigations -- responding as appropriate. NSA has zero tolerance for willful violations of the agency’s authorities.”
Enlarge image NSA Analysts Intentionally Abused Spying Powers Multiple Times

The Threat Operations Center inside the National Security Agency in Fort Mead, Maryland, in this 2006 file photo. Photographer: Paul J. Richards/AFP via Getty Images

The incidents, chronicled in a new report by the NSA’s inspector general, provide more evidence that U.S. agencies sometimes have violated legal and administrative restrictions on domestic spying, and may add to the pressure to bolster laws that govern intelligence activities.

The inspector general documented an average of one case per year over 10 years of intentionally inappropriate actions by people with access to the NSA’s vast electronic surveillance systems, according to an official familiar with the findings. The incidents were minor, the official said, speaking on the condition of anonymity to discuss classified intelligence.

The deliberate actions didn’t violate the 1978 Foreign Intelligence Surveillance Act or the USA Patriot Act, the NSA said in its statement. Instead, they overstepped 1981 Executive Order 12333, issued by President Ronald Reagan, which governs U.S. intelligence operations.

The actions, said a second U.S. official briefed on them, were the work of overzealous NSA employees or contractors eager to prevent any encore to the September 11, 2001, terrorist attacks.
Defending NSA

The agency has taken steps to ensure that everyone understands legal and administrative boundaries, whom to consult when questions arise, and the consequences of violations or willful ignorance, said the official, who spoke on the condition of anonymity because the inspector general’s report is classified. The report was provided to the congressional intelligence committees, according to administration officials.

The compilation of willful violations, while limited, contradicts repeated assertions that no deliberate abuses occurred.

Army General Keith Alexander, director of the NSA, said during a conference in New York on Aug. 8 that “no one has willfully or knowingly disobeyed the law or tried to invade your civil liberties or privacy.”

Senator Dianne Feinstein, a California Democrat who heads the Senate Intelligence Committee, and Republican Representative Mike Rogers of Michigan, chairman of the House Intelligence Committee, have defended the NSA.
Careful Distinctions

Feinstein said in an Aug. 16 statement that her committee “has never identified an instance in which the NSA has intentionally abused its authority to conduct surveillance for inappropriate purposes.”

Rogers said on CBS Corp.’s “Face the Nation” television show on July 28 that there were “zero privacy violations” in the agency’s collection of phone records of Americans.

The lawmakers’ staffs since have parsed the comments by their bosses, distinguishing between violations of the law governing electronic surveillance and the deliberate violations of the 1981 executive order.

Susan Phalen, a spokeswoman for Rogers, said in an Aug. 16 statement that Rogers meant there hadn’t been “willful and intentional violations of law.”

Feinstein meant there hadn’t been any intentional violations of the NSA’s authority under the Foreign Intelligence Surveillance Act, according to her office.
Violating FISA

John DeLong, the NSA’s director of compliance, first referred to abuses of the 1981 executive order on Aug. 16, telling reporters there had been rare instances of “willful violations” of legal authority and the privacy rights of U.S. citizens. He said there had been “a couple over the past decades,” according to a transcript provided by the agency.

“When they do occur, right, they are detected, corrected, reported to the inspector general and appropriate action is taken,” he said.

Intelligence officials have attributed most abuses of the FISA restrictions on the NSA’s surveillance of domestic phone calls, e-mails and other communications to technical or inadvertent errors.

Legal opinions declassified on Aug. 21 revealed that the NSA intercepted as many as 56,000 electronic communications a year of Americans who weren’t suspected of having links to terrorism, before a secret court that oversees surveillance found the operation unconstitutional in 2011.

In a declassified legal opinion from October 2011, the court said the agency substantially misrepresented the scope of surveillance operations three times in less than three years.

A May 2012 internal government audit found more than 2,700 violations involving NSA surveillance of Americans and foreigners over a one-year period. The audit was reported Aug. 16 by the Washington Post, citing documents provided by former NSA contractor Edward Snowden.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Fri Aug 23, 2013 2:25 pm

LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA
Wednesday, August 21, 2013 at 7:37PM

“A Special Surveillance Chip”

According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese.

The backdoor is called “Trusted Computing,” developed and promoted by the Trusted Computing Group, founded a decade ago by the all-American tech companies AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft, and Wave Systems. Its core element is a chip, the Trusted Platform Module (TPM), and an operating system designed for it, such as Windows 8. Trusted Computing Group has developed the specifications of how the chip and operating systems work together.

Its purpose is Digital Rights Management and computer security. The system decides what software had been legally obtained and would be allowed to run on the computer, and what software, such as illegal copies or viruses and Trojans, should be disabled. The whole process would be governed by Windows, and through remote access, by Microsoft.

Now there is a new set of specifications out, creatively dubbed TPM 2.0. While TPM allowed users to opt in and out, TPM 2.0 is activated by default when the computer boots up. The user cannot turn it off. Microsoft decides what software can run on the computer, and the user cannot influence it in any way. Windows governs TPM 2.0. And what Microsoft does remotely is not visible to the user. In short, users of Windows 8 with TPM 2.0 surrender control over their machines the moment they turn it on for the first time.

It would be easy for Microsoft or chip manufacturers to pass the backdoor keys to the NSA and allow it to control those computers. NO, Microsoft would never do that, we protest. Alas, Microsoft, as we have learned from the constant flow of revelations, informs the US government of security holes in its products well before it issues fixes so that government agencies can take advantage of the holes and get what they’re looking for.

more: http://www.testosteronepit.com/home/201 ... windo.html
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Aug 24, 2013 3:52 pm

Google and the NSA: Who’s holding the ‘shit-bag’ now?
by Julian Assange
August 24th, 2013

It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA for their compliance with the PRISM mass surveillance system.

So just how close is Google to the US securitocracy? Back in 2011 I had a meeting with Eric Schmidt, the then Chairman of Google, who came out to see me with three other people while I was under house arrest. You might suppose that coming to see me was gesture that he and the other big boys at Google were secretly on our side: that they support what we at WikiLeaks are struggling for: justice, government transparency, and privacy for individuals. But that would be a false supposition. Their agenda was much more complex, and as we found out, was inextricable from that of the US State Department. The full transcript of our meeting is available online through the WikiLeaks website.

The pretext for their visit was that Schmidt was then researching a new book, a banal tome which has since come out as The New Digital Age. My less than enthusiastic review of this book was published in the New York Times in late May of this year. On the back of that book are a series of pre-publication endorsements: Henry Kissinger, Bill Clinton, Madeleine Albright, Michael Hayden (former head of the CIA and NSA) and Tony Blair. Inside the book Henry Kissinger appears once again, this time given pride of place in the acknowledgements.

Schmidt’s book is not about communicating with the public. He is worth $6.1 billion and does not need to sell books. Rather, this book is a mechanism by which Google seeks to project itself into Washington. It shows Washington that Google can be its partner, its geopolitical visionary, who will help Washington see further about America’s interests. And by tying itself to the US state, Google thereby cements its own security, at the expense of all competitors.

Two months after my meeting with Eric Schmidt, WikiLeaks had a legal reason to call Hilary Clinton and to document that we were calling her. It’s interesting that if you call the front desk of the State Department and ask for Hillary Clinton, you can actually get pretty close, and we’ve become quite good at this. Anyone who has seen Doctor Strangelove may remember the fantastic scene when Peter Sellers calls the White House from a payphone on the army base and is put on hold as his call gradually moves through the levels. Well WikiLeaks journalist Sarah Harrison, pretending to be my PA, put through our call to the State Department, and like Peter Sellers we started moving through the levels, and eventually we got up to Hillary Clinton’s senior legal advisor, who said that we would be called back.

Shortly afterwards another one of our people, WikiLeaks’ ambassador Joseph Farrell, received a call back, not from the State Department, but from Lisa Shields, the then girlfriend of Eric Schmidt, who does not formally work for the US State Department. So let’s reprise this situation: The Chairman of Google’s girlfriend was being used as a back channel for Hillary Clinton. This is illustrative. It shows that at this level of US society, as in other corporate states, it is all musical chairs.

That visit from Google while I was under house arrest was, as it turns out, an unofficial visit from the State Department. Just consider the people who accompanied Schmidt on that visit: his girlfriend Lisa Shields, Vice President for Communications at the CFR; Scott Malcolmson, former senior State Department advisor; and Jared Cohen, advisor to both Hillary Clinton and Condoleezza Rice, a kind of Generation Y Kissinger figure — a noisy Quiet American as the author Graham Greene might have put it.

Google started out as part of Californian graduate student culture around San Francisco’s Bay Area. But as Google grew it encountered the big bad world. It encountered barriers to its expansion in the form of complex political networks and foreign regulations. So it started doing what big bad American companies do, from Coca Cola to Northrop Grumman. It started leaning heavily on the State Department for support, and by doing so it entered into the Washington DC system. A recently released statistic shows that Google now spends even more money than Lockheed Martin on paid lobbyists in Washington.

Jared Cohen was the co-writer of Eric Schmidt’s book, and his role as the bridge between Google and the State Department speaks volumes about how the US securitocracy works. Cohen used to work directly for the State Department and was a close advisor to both Condolezza Rice and Hillary Clinton. But since 2010 he has been Director of Google Ideas, its in-house ‘think/do’ tank.

Documents published last year by WikiLeaks obtained from the US intelligence contractor Stratfor, show that in 2011 Jared Cohen, then (as he is now) Director of Google Ideas, was off running secret missions to the edge of Iran in Azerbaijan. In these internal emails, Fred Burton, Stratfor’s Vice President for Intelligence and a former senior State Department official, describes Google as follows:

“Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do…[Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag”

In further internal communication, Burton subsequently clarifies his sources on Cohen’s activities as Marty Lev, Google’s director of security and safety and.. Eric Schmidt.

WikiLeaks cables also reveal that previously Cohen, when working for the State Department, was in Afghanistan trying to convince the four major Afghan mobile phone companies to move their antennas onto US military bases. In Lebanon he covertly worked to establish, on behalf of the State Department, an anti-Hezbollah Shia think tank. And in London? He was offering Bollywood film executives funds to insert anti-extremist content into Bollywood films and promising to connect them to related networks in Hollywood. That is the Director of Google Ideas. Cohen is effectively Google’s director of regime change. He is the State Department channeling Silicon Valley.

That Google was taking NSA money in exchange for handing over people’s data comes as no surprise. When Google encountered the big bad world, Google itself got big and bad.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Sat Aug 24, 2013 5:01 pm

^^
AWESOME!

Their agenda was much more complex, and as we found out, was inextricable from that of the US State Department


It's refreshing to see that even Assange, as world-weary and 'clued-in' as he has the right to feel by now, still enjoys the hunt.
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Aug 24, 2013 7:13 pm

Published on Saturday, August 24, 2013 by Electronic Frontier Foundation
Three Illusory "Investigations" of the NSA Spying Are Unable to Succeed
by Mark Jaycox
Since the revelations of confirmed National Security Agency spying in June, three different "investigations" have been announced. One by the Privacy and Civil Liberties Oversight Board (PCLOB), another by the Director of National Intelligence, Gen. James Clapper, and the third by the Senate Intelligence Committee, formally called the Senate Select Committee on Intelligence (SSCI).
(Photo: Electronic Frontier Foundation)

All three investigations are insufficient, because they are unable to find out the full details needed to stop the government's abuse of Section 215 of the PATRIOT Act and Section 702 of the Foreign Intelligence Surveillance Act. The PCLOB can only request—not require—documents from the NSA and must rely on its goodwill, while the investigation led by Gen. Clapper is led by a man who not only lied to Congress, but also oversees the spying. And the Senate Intelligence Committee—which was originally designed to effectively oversee the intelligence community—has failed time and time again. What's needed is a new, independent, Congressional committee to fully delve into the spying.

The PCLOB: Powerless to Obtain Documents

The PCLOB was created after a recommendation from the 9/11 Commission to ensure civil liberties and privacy were included in the government's surveillance and spying policies and practices.

But it languished. From 2008 until May of this year, the board was without a Chair and unable to hire staff or perform any work. It was only after the June revelations that the President asked the board to begin an investigation into the unconstituional NSA spying. Yet even with the full board constituted, it is unable to fulfill its mission as it has no choice but to base its analysis on a steady diet of carefully crafted statements from the intelligence community.

As we explained, the board must rely on the goodwill of the NSA's director, Gen. Keith Alexander, and Gen. Clapper—two men who have repeatedly said the NSA doesn't collect information on Americans.

In order to conduct a full investigation, the PCLOB will need access to all relevant NSA, FBI, and DOJ files. But the PCLOB is unable to compel testimony or documents because Congress did not give it the same powers as a Congressional committee or independent agency. This is a major problem. If the NSA won't hand over documents to Congress, then it will certainly not give them to the PCLOB.

The Clapper Investigation: Overseen by a Man Accused of Lying to Congress

The second investigation was announced by President Obama in a Friday afternoon news conference. The President called for the creation of an "independent" task force with "outside experts" to make sure "there absolutely is no abuse in terms of how these surveillance technologies are used." Less than two days later, the White House followed up with a press release announcing the task force would be led by Gen. Clapper and would also report to him. What's even worse: the task force was not tasked with looking at any abuse. It was told to focus on how to "protect our national security and advance our foreign policy." And just this week, ABC News reported the task force will be full of thorough Washington insiders--not "outside experts." For instance, one has advocated the Department of Homeland Security be allowed to scan all Internet traffic going in and out of the US. And another, while a noted legal scholar on regulatory issues, has written a paper about government campaigns to infiltrate online groups and activists. In one good act, the White House selected Peter Swire to be on the task force. Swire is a professor at Georgia Tech and has served as the White House's first ever Chief Privacy Officer. Recently, he signed an amicus brief in a case against the NSA spying by the Electronic Privacy Information Center arguing that the NSA’s telephony metadata program is illegal under Section 215 of the PATRIOT Act. Despite this, and at the end of a day, a task force led by General Clapper full of insiders,—and not directed to look at the extensive abuse—will never get at the bottom of the unconstitutional spying.

The Senate Intelligence Committee Has Already Failed

The last "investigation" occurring is a "review" led by the Senate Intelligence Committee overseeing the intelligence community. But time and time again the committee has failed at providing any semblance of oversight. First, the chair and ranking member of the committee, Senators Dianne Feinstein (CA) and Saxby Chambliss (GA), respectively, are stalwart defenders of the NSA and its spying activities. They have both justified the spying, brushed aside any complaints, and denied any ideas of abuse by the NSA.

Besides defending the intelligence community, the committee leadership have utterly failed in oversight—the reason why the Senate Intelligence Committee was originally created by the Church Committee. As was revealed last week, Senator Feinstein was not shown or even told about the thousands of violations of the spying programs in NSA audits of the programs. This is in direct contradiction to her statements louting the "robust" oversight of the Intelligence Committee. Lastly, the committee is prone to secrets and hiding behind closed doors: this year, the Senate Intelligence Committee has met publicly only twice. What's clear is that the Intelligence Committee has been unable to carry out its oversight role and fresh eyes are needed to protect the American people from the abuses of the NSA.

A New Church Committee

All three of these investigations are destined to fail. What's needed is a new, special, investigatory committee to look into the abuses of by the NSA, its use of spying powers, its legal justifications, and why the intelligence committees were unable to rein in the spying. In short, we need a contemporary Church Committee. It's time for Congress to reassert its oversight capacity. The American public must be provided more information about the NSA's unconstitutional actions and the NSA must be held accountable. Tell your Congressmen now to join the effort.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Mark Jaycox is a Policy Analyst and Legislative Assistant for the Electronic Frontier Foundation. His issues include user privacy, civil liberties, EULAs, and current legislation or policy rising out of Washington, DC
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sun Aug 25, 2013 10:55 am

The NSA: "The Abyss From Which There Is No Return"
Sunday, 25 August 2013 09:54 By John W Whitehead, The Rutherford Institute | Op-Ed

Gen. Keith Alexander, director of the National Security Agency, arrives to testify on cybersecurity before the Senate Appropriations Committee on Capitol Hill in Washington, June 12, 2013. (Photo: Christopher Gregory / The New York Times)Gen. Keith Alexander, director of the National Security Agency, arrives to testify on cybersecurity before the Senate Appropriations Committee on Capitol Hill in Washington, June 12, 2013. (Photo: Christopher Gregory / The New York Times)“The National Security Agency’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If a dictator ever took over, the N.S.A. could enable it to impose total tyranny, and there would be no way to fight back.”—Senator Frank Church (1975).

We now find ourselves operating in a strange paradigm where the government not only views the citizenry as suspects but treats them as suspects, as well. Thus, the news that the National Security Agency (NSA) is routinely operating outside of the law and overstepping its legal authority by carrying out surveillance on American citizens is not really much of a surprise. This is what happens when you give the government broad powers and allow government agencies to routinely sidestep the Constitution.

Indeed, as I document in my book, A Government of Wolves: The Emerging American Police State, these newly revealed privacy violations by the NSA are just the tip of the iceberg. Consider that the government’s Utah Data Center (UDC), the central hub of the NSA’s vast spying infrastructure, will be a clearinghouse and a depository for every imaginable kind of information—whether innocent or not, private or public—including communications, transactions and the like. In fact, anything and everything you’ve ever said or done, from the trivial to the damning—phone calls, Facebook posts, Twitter tweets, Google searches, emails, bookstore and grocery purchases, bank statements, commuter toll records, etc.—will be tracked, collected, catalogued and analyzed by the UDC’s supercomputers and teams of government agents.

By sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise. Indeed, we are all becoming data collected in government files. Whether or not the surveillance is undertaken for “innocent” reasons, surveillance of all citizens, even the innocent sort, gradually poisons the soul of a nation. Surveillance limits personal options—denies freedom of choice—and increases the powers of those who are in a position to enjoy the fruits of this activity.

If this is the new “normal” in the United States, it is not friendly to freedom. Frankly, we are long past the point where we should be merely alarmed. These are no longer experiments on our freedoms. These are acts of aggression.

Senator Frank Church (D-Ida.), who served as the chairman of the Select Committee on Intelligence that investigated the National Security Agency in the 1970s, understood only too well the dangers inherent in allowing the government to overstep its authority in the name of national security. Church recognized that such surveillance powers “at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.”

Noting that the NSA could enable a dictator “to impose total tyranny” upon an utterly defenseless American public, Church declared that he did not “want to see this country ever go across the bridge” of constitutional protection, congressional oversight and popular demand for privacy. He avowed that “we,” implicating both Congress and its constituency in this duty, “must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”

Unfortunately, we have long since crossed over into that abyss, first under George W. Bush, who, among other things, authorized the NSA to listen in on the domestic phone calls of American citizens in the wake of the 9/11 attacks, and now under President Obama, whose administration has done more to undermine the Fourth Amendment’s guarantee of privacy and bodily integrity than any prior administration. Incredibly, many of those who were the most vocal in criticizing Bush for attempting to sidestep the Constitution have gone curiously silent in the face of Obama’s repeated violations.

Whether he intended it or not, it well may be that Obama, moving into the home stretch and looking to establish a lasting “legacy” to characterize his time in office, is remembered as the president who put the final chains in place to imprison us in an electronic concentration camp from which there is no escape. Yet none of this could have been possible without the NSA, which is able to operate outside the constitutional system of checks and balances because Congress has never passed a law defining its responsibilities and obligations.

The constitutional accountability clause found in Article 1, section 9, clause 7 of the Constitution demands that government agencies function within the bounds of the Constitution. It does so by empowering the people’s representatives in Congress to know what governmental agencies are actually doing by way of an accounting of their spending and also requiring full disclosure of their activities. However, because agencies such as the NSA operate with “black ops” (or secret) budgets, they are not accountable to Congress.

In his book Body of Secrets, the second installment of the most extensively researched inquiry into the NSA, author James Bamford describes the NSA as “a strange and invisible city unlike any on earth” that lies beyond a specially constructed and perpetually guarded exit ramp off the Baltimore-Washington Parkway. “It contains what is probably the largest body of secrets ever created.”

Bamford’s use of the word “probably” is significant since the size of the NSA’s staff, budget and buildings is kept secret from the public. Intelligence experts estimate that the agency employs around 38,000 people, with a starting salary of $50,000 for its entry-level mathematicians, computer scientists and engineers. Its role in the intelligence enterprise and its massive budget dwarf those of its better-known counterpart, the Central Intelligence Agency (CIA). The NSA’s website provides its own benchmarks:

Neither the number of employees nor the size of the Agency’s budget can be publicly disclosed. However, if the NSA/CSS were considered a corporation in terms of dollars spent, floor space occupied, and personnel employed, it would rank in the top 10 percent of the Fortune 500 companies.

If the NSA’s size seems daunting, its scope is disconcerting, especially as it pertains to surveillance activities domestically. The first inkling of this came in December 2005 when the New York Times reported that President Bush had secretly authorized the NSA to monitor international phone calls and email messages initiated by individuals (including American citizens) in the United States. Bush signed the executive order in 2002, under the pretext of needing to act quickly and secretly to detect communication among terrorists and their contacts and to quell future attacks in the aftermath of September 11, 2001.

The New York Times story forced President Bush to admit that he had secretly instructed the NSA to wiretap Americans’ domestic communications with international parties without seeking a FISA warrant or congressional approval. The New York Times had already sat on its story for a full year due to White House pressure not to publish its findings. It would be another six months before USA Today delivered the second and most significant piece of the puzzle, namely that the NSA had been secretly collecting the phone records of tens of millions of Americans who used the national “private” networks AT&T, Verizon and BellSouth.

It would be another seven years before Americans were given undeniable proof—thanks to NSA whistleblower Edward Snowden—that the NSA had not only broken privacy rules or overstepped its legal authority thousands of times every year but was actively working to flout attempts at oversight and accountability, aided and abetted in this subterfuge by the Obama administration.

Then again, all Snowden really did was confirm what we already suspected was happening. We already knew the NSA was technologically capable of spying on us. We also knew that the agency had, since the 1960s, routinely spied on various political groups and dissidents.

So if we already knew that the government was spying on us, what’s the big deal? And more to the point, as I often hear many Americans ask, if you’re not doing anything wrong, why should you care?

The big deal is simply this: once you allow the government to start breaking the law, no matter how seemingly justifiable the reason, you relinquish the contract between you and the government which establishes that the government works for and obeys you, the citizen—the employer—the master. And once the government starts operating outside the law, answerable to no one but itself, there’s no way to rein it back in, short of revolution.

As for those who are not worried about the government filming you when you drive, listening to your phone calls, using satellites to track your movements and drones to further spy on you, you’d better start worrying. At a time when the average American breaks at least three laws a day without knowing it thanks to the glut of laws being added to the books every year, there’s a pretty good chance that if the government chose to target you for breaking the law, they’d be able to come up with something without much effort.

Then again, for those who insist they’re not doing anything wrong, per se, perhaps they should be. Because if you’re not doing anything wrong, it just might mean that you’re not doing anything at all, which is how we got into this mess in the first place.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sun Aug 25, 2013 2:24 pm


August 23, 2013, 8:45 PM

NSA Officers Spy on Love Interests


By Siobhan Gorman

Reuters
An undated aerial handout photo shows the National Security Agency (NSA) headquarters building in Fort Meade, Md.

WASHINGTON—National Security Agency officers on several occasions have channeled their agency’s enormous eavesdropping power to spy on love interests, U.S. officials said.

The practice isn’t frequent — one official estimated a handful of cases in the last decade — but it’s common enough to garner its own spycraft label: LOVEINT.

Spy agencies often refer to their various types of intelligence collection with the suffix of “INT,” such as “SIGINT” for collecting signals intelligence, or communications; and “HUMINT” for human intelligence, or spying.

The “LOVEINT” examples constitute most episodes of willful misconduct by NSA employees, officials said.

In the wake of revelations last week that NSA had violated privacy rules on nearly 3,000 occasions in a one-year period, NSA Chief Compliance Officer John DeLong emphasized in a conference call with reporters last week that those errors were unintentional. He did say that there have been “a couple” of willful violations in the past decade. He said he didn’t have the exact figures at the moment.

NSA said in a statement Friday that there have been “very rare” instances of willful violations of any kind in the past decade, and none have violated key surveillance laws. “NSA has zero tolerance for willful violations of the agency’s authorities” and responds “as appropriate.”

The LOVEINT violations involved overseas communications, officials said, such as spying on a partner or spouse. In each instance, the employee was punished either with an administrative action or termination.

Most of the incidents, officials said, were self-reported. Such admissions can arise, for example, when an employee takes a polygraph tests as part of a renewal of a security clearance.

Sen. Dianne Feinstein (D., Calif.), who chairs the Senate intelligence committee, said the NSA told her committee about a set of “isolated cases” that have occurred about once a year for the last 10 years, where NSA personnel have violated NSA procedures.

She said “in most instances” the violations didn’t involve an American’s personal information. She added that she’s seen no evidence that any of the violations involved the use of NSA’s domestic surveillance infrastructure, which is governed by a law known as the Foreign Intelligence Surveillance Act.

“Clearly, any case of noncompliance is unacceptable, but these small numbers of cases do not change my view that NSA takes significant care to prevent any abuses and that there is a substantial oversight system in place,” she said. “When errors are identified, they are reported and corrected.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sun Aug 25, 2013 2:43 pm

New NSA documents: U.S. intelligence heard from the United Nations headquarters

New documents prove to SPIEGEL information: Even the United Nations headquarters in New York was tapped by the U.S. NSA, although an agreement prohibiting just that. Even the U.S. Consulate in Frankfurt served as a listening post.
Uno-Hauptquartier in New York: illegales Abhörziel der NSA Zur Großansicht
REUTERS

UN headquarters in New York: The aim of the NSA illegal wiretapping

Hamburg - The U.S. Secret NSA has not only the European Union bugged, but also the headquarters of the United Nations. This is evident from the NSA secret documents, the DER SPIEGEL has analyzed.

Thus, it is the NSA succeeded in the summer of 2012 to penetrate the internal video conference system of the international community and to crack the encryption. This was for "a dramatic improvement of the data from video teleconferencing and the ability to decrypt this traffic" taken care of, according to a secret NSA document. "The traffic gives us the internal video teleconferencing the UN (yay!)." Within three weeks, the number of decrypted communications had risen from 12 to 458th

In one case, the NSA had also caught the Chinese intelligence in it, also a spy. Then, the NSA intercepted, which had previously listened to the Chinese. The espionage actions are illegal, in valid today agreements with the UN, the United States has pledged not to take covert action.

From the internal documents also indicate that the NSA has spied the EU even after the move to the new embassy premises in September 2012. Among the documents that the whistleblower Edward Snowden has copies of the NSA's computers to maps of the EU embassy located on 3rd Avenue in New York, concerning the location of the offices, but also the IT infrastructure and the server. The new EU building was the U.S. intelligence codenamed "Apalachee". The EU embassy in Washington was known internally as "Magothy".

Foreign Office: "no own knowledge"

In three ways, the NSA attacked by its own account, the European branches: each bug as well as by copying the hard drives in New York and infiltrating the computer network in Washington. Here, the NSA took advantage that the computer of the EU embassies about a so-called Virtual Private Network (VPN) are interconnected. "If we lose access to a page where we can get him back immediately when we come through the VPN to the other side" for components in NSA technicians in an internal presentation. "We have used several times when we were at, Magothy 'kicked out."

ANZEIGE
The Federal Foreign Office in Berlin claims to own any information about a possible spying by the United Nations and embassies by the U.S. NSA. "We do not own findings," a spokesman said on Sunday.

According to internal documents, the NSA also maintains more than 80 embassies and consulates worldwide own monitoring program, which is internally called "Special Collection Service" and is often operated without the knowledge of the host country. A corresponding to the NSA listening post accordingly in Frankfurt, a further entertained in Vienna.

The existence of the eavesdropping devices in embassies and consulates should be kept secret at all costs, according to the material. If they were known, would "relations with the host country causing serious damage," said one NSA document.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Aug 26, 2013 1:31 pm



To make journalism harder, slower, less secure
Aug.
26
That’s what the surveillance state is trying to do. It has the means, the will and the latitude to go after journalism the way it went after terrorism. Only a more activist press stands a chance of resisting this.

Last week, the novelist and former CIA operative Barry Eisler published one of the most important posts I have read about what’s happening to the press since the Snowden revelations began in early June. In it, he tries to explain why authorities in the UK detained Brazilian national David Miranda for nine hours at Heathrow airport and confiscated all the technology he had on him. (Miranda, as everyone following the story knows, is the spouse of The Guardian columnist Glenn Greenwald. He had been acting as a courier, bringing documents on encrypted thumb drives back and forth between Greenwald in Brazil and his collaborator, Laura Poitras, in Germany.)

Eisler’s explanation of this pivotal event is the most persuasive I have seen.

1. Sand in the gears

“Put yourself in the shoes of the National Surveillance State,” he writes. You’ve already commandeered the internet for state use and you have most of the world’s communications monitored and stored. Journalists are beginning to realize than none of their means is secure, so they’re retreating to face to face meetings, traveling backwards in technological time to evade your reach. But you find out about one of these meetings: Greenwald’s spouse is visiting Berlin. Eisler explains:

The purpose was to demonstrate to journalists that what they thought was a secure secondary means of communication — a courier, possibly to ferry encrypted thumb drives from one air-gapped computer to another — can be compromised, and thereby to make the journalists’ efforts harder and slower.

Recognizing that you can’t bring journalism to a complete halt, you try to throw sand in the gears. David Miranda was detained and questioned under a terrorism statute in Britain. What’s the connection? As Eisler says, “Part of the value in targeting the electronic communications of actual terrorists is that the terrorists are forced to use far slower means of plotting. The NSA has learned this lesson well, and is now applying it to journalists.” He writes:

To achieve the ability to monitor all human communication, broadly speaking the National Surveillance State must do two things: first, button up the primary means of human communication — today meaning the Internet, telephone, and snail mail; second, clamp down on backup systems, meaning face-to-face communication, which is, after all, all that’s left to the population when everything else has been bugged. Miranda’s detention was part of the second prong of attack. So, incidentally, was the destruction of Guardian computers containing some of Snowden’s leaks. The authorities knew there were copies, so destroying the information itself wasn’t the point of the exercise. The point was to make the Guardian spend time and energy developing suboptimal backup options — that is, to make journalism harder, slower, and less secure.

2. Working together

The day after Eisler’s post appeared, Ben Smith of Buzzfeed found out — and the Guardian then announced — that some of the Snowden documents had been shared with the New York Times, which will report in partnership with the Guardian on some NSA stories. Britain’s equivalent of the NSA, the GCHQ, had forced the Guardian editors to halt work in London on the Snowden leaks. But…

Journalists in America are protected by the first amendment which guarantees free speech and in practice prevents the state seeking pre-publication injunctions or “prior restraint”.

It is intended that the collaboration with the New York Times will allow the Guardian to continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach. Snowden is aware of the arrangement.

Sunday night, Ben Smith broke more news: another skilled newsroom, the investigative non-profit site, ProPublica, is also working on Snowden stories with The Guardian. This is the right move. They are trying to make journalism harder, slower and less secure by working together against you. You have to work together against them to publish anyway and put the necessary materials beyond their reach.

As I wrote in my last post, the surveillance state is global, so the struggle to report on its overreach has to move about the globe, as well. Another good sign:

In an open letter to David Cameron published in today’s Observer, the editors of Denmark’s Politiken, Sweden’s Dagens Nyheter, Norway’s Aftenposten and Finland’s Helsingin Sanomat describe the detention of David Miranda, the partner of the Guardian’s Glenn Greenwald, as harassment.

They say that the “events in Great Britain over the past week give rise to deep concern” and call on the British prime minister to “reinstall your government among the leading defenders of the free press”.

The World Association of Newspapers and News Publishers wrote a similar letter to Cameron. They understand this is a global fight. The rest of the British press is only beginning to wake up to it.

3. “Give me the box you will allow me to operate in.”

In an appearance last month on Charlie Rose, former NSA and CIA director Michael Hayden was asked about the “appropriate balance” between secrecy and transparency.

Hayden said that if it were up to him, he would “keep it all secret” because NSA could best operate that way. But: “I know I live in a modern democracy,” which won’t allow anyone to operate for long without a “national consensus” underpinning the program. You can’t have a national consensus without a national discussion, he admitted. And you can’t have such a discussion “without a significant portion of the citizenry” knowing something about what you’re doing. And so, Hayden said, he had come to accept that the NSA would have to “shave points off of our operational effectiveness” in order to become “a bit more transparent to the American people.”

As a former head of the CIA and the NSA, Hayden said he understood that he would be constrained by what American democracy thought acceptable. All he wanted from Congress was clear guidance. “Tell me the box,” he said, making a square with his hands as he talked. “Give me the box you will allow me to operate in. I’m going to play to the very edges of that box.” He said he would be “very aggressive,” and probably “get chalk dust on my cleats” but still:

You, the American people, through your elected representatives, give me the field of play and I will play very aggressively in it, as long as you understand what risk you are embracing by keeping me and my colleagues in this box, Charlie, we are good to go. We understand. We follow the guidance of the American people.

Hayden’s sketch of a surveillance state properly constrained by a wary public left a few things out, of course. When the Director of National Intelligence can lie to Congress in open session and keep his job, Hayden’s system has broken down. When United States senators, alarmed about what they are told, cannot alert the American people because of secrecy requirements, Hayden’s “through your elected representatives” becomes a hollow phrase. Over-classification makes “national consensus” impossible on its face. A ”secret body of law giving the National Security Agency the power to amass vast collections of data on Americans” is not likely to generate much discussion… is it? Hayden’s descriptions sound reasonable — reasonable enough that Charlie Rose didn’t push back on them — but the behavior of the surveillance state doesn’t match up with his soothing words.

WHICH IS WHY WE NEED JOURNALISTS! In fact, we can go further. Without including in the picture an aggressive press that is free to operate without fear or coercion, the surveillance state cannot be made compatible with representative democracy. Even then, it may be impossible.

4. The establishment press is beginning to get it

Barry Eisler concluded his compelling post with this:

The authorities want you to understand they can do it to you, too. Whether they’ve miscalculated depends on how well they’ve gauged the passivity of the public.

Making journalism harder, slower and less secure, throwing sand in the gears, is fully within the capacity of the surveillance state. It has the means, the will and the latitude to go after journalism the way it went after terrorism. News stories alone are not going to make it stop. There are signs that the establishment press is beginning to get it. Sharing the work of turning the Snowden documents into news is one. David Carr’s column in today’s New York Times is another. “It is true that Mr. Assange and Mr. Greenwald are activists with the kind of clearly defined political agendas that would be frowned upon in a traditional newsroom,” Carr wrote. “But they are acting in a more transparent age — they are their own newsrooms in a sense — and their political beliefs haven’t precluded other news organizations from following their leads.”

Only if they can turn a mostly passive public into a more active one can journalists come out ahead in this fight. I know they don’t think of mobilization as their job, and there are good reasons for that, but they didn’t expect editors to be destroying hard drives under the gaze of the authorities, either. Journalism almost has to be brought closer to activism to stand a chance of prevailing in its current struggle with the state.



Assange's Snowden prophecy: "Young people are going to be the technicians that are in control of the great databases of the NSA and can reveal information to the rest of the world. Sometimes there is risk involved... but they can act to sabotage. This is a new pre-revolutionary moment."
[img]
http://www.truthdig.com/images/made/ima ... 00_392.jpg[/img]
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Aug 27, 2013 9:12 am

Is the NSA surveillance program really about spying on environmentalists?

By Sarah Laskow
350350.org

At the Guardian, Nafeez Ahmed, executive director of the Institute for Policy Research & Development, has an idea about what might be driving the massive expansion of the NSA’s domestic surveillance program that we’ve learned so much about lately. It’s not concerns about religious fundamentalists who hate America. Instead, he suggests, the government is worried about environmental activism:

But why have Western security agencies developed such an unprecedented capacity to spy on their own domestic populations? Since the 2008 economic crash, security agencies have increasingly spied on political activists, especially environmental groups, on behalf of corporate interests. This activity is linked to the last decade of US defence planning, which has been increasingly concerned by the risk of civil unrest at home triggered by catastrophic events linked to climate change, energy shocks or economic crisis — or all three.

Who would have thunk? It turns out the U.S. government is worried about climate change, after all. At least if being worried about climate change lets them use all their cool spy gear.

Across the government, security professionals are fretting about natural disasters and global oil shortfalls, Ahmed explains. The Department of Defense has written that “climate change, energy security, and economic stability are inextricably linked.” They’re nervous about what this means: What are people going to do when they realized they’re, to use the technical term, totally screwed? The Army’s Strategic Studies Institute has suggested that, in the case of a total freak-out, it might be necessary to “use of military force against hostile groups inside the United States.”

Who are those hostiles? Why, they might just be environmentalists.

The government tends to see environmentalists in one of two ways. They’re either harmless hippie treehuggers who can easily be ignored or dangerous eco-terrorists who need to be watched. The defense and intelligence people incline toward the latter view.

As early as 2008, DHS contractors were looking into environmental action and “labeled environmental organizations like the Sierra Club, the Humane Society and the Audubon Society as ‘mainstream organizations with known or possible links to eco-terrorism.’” And as Adam Federman has been documenting, law enforcement and corporations have been spying on environmentalists who are fighting against fracking and tar-sands development, even infiltrating direct action groups like the Great Plains Tar Sands Resistance.

This isn’t just a problem in the United States, as Ahmed points out:

[I]nternal police documents obtained by the Guardian in 2009 revealed that environment activists had been routinely categorised as “domestic extremists” targeting “national infrastructure” as part of a wider strategy tracking protest groups and protestors.

Ahmed’s article mainly establishes that the government has concerns about political groups of various stripes, and also worries about the effect of an oil shortfall on society — in other words, it’s pretty far from an irrefutable case that the NSA is primarily targeting environmentalists. But we’re just saying, if you signed up for any of Grist’s newsletters (thanks!), Barack Obama probably is reading your email. Say hi from us!
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Aug 28, 2013 4:38 pm

Wednesday, 28 August 2013 14:35
Will NSA Metadata Be Used to Blackmail You?


JOE GIAMBRONE FOR BUZZFLASH AT TRUTHOUT

“I’m an upstanding citizen and I’m not doing anything wrong.
I just don’t want the government invading my privacy.”
–unnamed
I got into a heated argument, a disagreeable shouting match over that idea today – mostly being shouted at for nitpicking someone on my own side. I find the above rationale to be a surface response without any thought behind it or any acknowledgement of how actual surveillance-societies of the past devolved into Orwellian abominations. Worse still, the current drive for a “Total Information Awareness” society, where birth to death communications will be stored forever by the government, looms over us.

NSA / Booz Allen Hamilton whistleblower Edward Snowden has said:

“…they are intent on making every conversation and every form of behavior in the world known to them.”
To that end the NSA’s operating budget has increased steadily, avoiding any cutbacks from the so-called “sequester.” The new NSA storage facility in Utah is a central piece of this total data capture society.

“An article by Forbes estimates the storage capacity as between 3 and 12 exabytes in the near term… advances in technology could be expected to increase the capacity by orders of magnitude in the coming years.” (Wikipedia)
NSA Whistleblower William Binney revealed further problems at the National Security Agency and its runaway capabilities:

“Binney alleged… controls that limited unintentional collection of data pertaining to U.S. citizens were removed, prompting concerns by him and others that the actions were illegal and unconstitutional. Binney alleged that the Bluffdale (Utah) facility was designed to store a broad range of domestic communications for data mining without warrants.”(Wikipedia)
Edward Snowden has also said:

“I also had the capability without any warrant to search for, seize, and read your communications. Anyone’s communications at any time. That is the power to change people’s fates.”
Changing people’s fates is the key phrase here. How and why can this personal data be used? With lifelong surveillance of everyone, we are little better off than goldfish swimming from glass wall to wall, always under the complete scrutiny of the authorities. It doesn’t take any imagination whatsoever to see the implications of total scrutiny by secretive government or quasi-governmental entities (or others!).

The STASI regime in East Germany was legendary for this type of behavior, monitoring their own people allegedly for their own good. A hyper-paranoid society emerged where everyone was suspect. Anyone could be an informant coerced by the authorities into betraying their neighbors or family members. Trust of government was nonexistent, and soon all trust throughout the society crumbled. Any stranger could be a government agent, himself blackmailed by the state into carrying out their wishes.

Guilt by Association

The problem is blackmail. That is what Edward Snowden meant when he talked about changing people’s fates. When all associations are known to authorities, the very act of communicating with someone becomes dangerous. If they are found to be displeasing to the secretive masters of society, then how long before your very real, recorded linkage to them becomes problematic as well? Guilt by association and character assassinations do not require you to be “doing anything wrong,” only to be perceived that way as a result of smears. Sensitive data about personal habits can destroy a political campaign before it ever begins. The manipulation of the public takes many forms, which political activists and the professional political class understand well.

While Obama and Company (on both sides of the aisle) hawk this glaringly unconstitutional assault as alleged protection, being no threat to the public whatsoever – their vanilla lives deemed uninteresting enough to not concern the state – the terrifying nature of power and coercion must be addressed. Before we follow the propaganda line that we are “not doing anything wrong,” and so have nothing to worry about, there is plenty to worry about when privacy is erased.

The legal justifications for securing our personal effects, enshrined in the 4th Amendment, represent the cornerstone of American freedom: that F-word that politicians blather on about at length even as they secretly betray it.

This is not simply a personal preference to be private, but the necessary precondition for a free society. Private communications are the difference between what once was America and what once was the Soviet Union, or Orwell’s dystopia if you prefer. The value of having secure, private lives free of government malfeasance and scrutiny is beyond a price and beyond debate. As long as the Constitution remains the “Supreme Law of the Land,” those who willingly and gleefully violate it have committed treasons against the American People.

Personal preference has got nothing to do with it. This is about the very nature of freedom, to be free of coercion and blackmail. While it’s true that the government apparatus likely has nothing against most people because of their unremarkable ordinariness, this government posture changes immediately as people become politically active. What the masters of society take very seriously are their own positions of power, and they brook no challengers. Once a citizen becomesactive in attempting to change official policy, all bets are off.

The US government surveils the lives of citizens who stand up and say “No.” This has been in evidence since forever; name your time period. But more recently from Seattle WTO protests 1999, to the anti-war movement 2003, to Miami FTAA opponents 2003, to the protestors at national political conventions, and of course to Occupy Wall Street activists the federal government has used all means at its disposal to invade the privacy of its citizen-opponents. Ongoing surveillance of domestic political movements is the norm, as is infiltration by FBI “informants” (criminals who have made deals with FBI to go undercover and spy for them).

What’s more, the government contracts with private, for-profit spy corporations such as Booz, Allen Hamilton and Stratfor. It hands this power to blanket spy on the entire citizenry over to private interests for them to exploit. All this is done in secret, and the Congress cannot even oversee the activities of private contractors, who are naturally shielded from the kind of scrutiny which we are all now subject to by them. If someone has no problem with the government owning all their personal data (I can’t imagine why), they surely must stop and think about turning over that power to private money-making corporations who are legally shielded from public accountability.

One of the most crucial and ignored whistleblowers to come out of the National Security Agency is a satellite analyst by the name of Russell Tice. What Mr. Tice has revealed is shocking and largely un-reportable in the corporate perception-management media. It would shake the very system to its core, and so recently Mr. Tice has beenpersona non grata on corporate airwaves. Previously he was welcomed as an expert on the spying programs as an actual former NSA analyst. After Tice revealed more damaging information, disclosures which threaten the very legitimacy of those who fail to perform Congressional oversight on the runaway surveillance agency, his spotlight was shut down. Russell Tice finally revealed that for at least a decade now those at the top of the intelligence chain secretly abuse the capabilities of their federal surveillance state.

“[NSA] went after lawyers and law firms… They went after judges. One of the judges is now sitting on the Supreme Courtthat I had his wiretap information in my hand… They went after State Department officials. They went after people in the executive service that were part of the White House — their own people!”
–NSA Satellite Analyst Russell Tice
Now a picture emerges of something quite a bit more damaging to society than simple privacy preferences. According to Tice, those sitting in Congress and tasked with doing oversight on the spy agencies are themselves under surveillance and compromised.

Their loyalties and duties are compromised.
Their judgments are compromised.
Their repeated displays of gross ignorance about NSA programs are perhaps intentional, by design.
These Senators and Intelligence Committee Congresspersons must toe the line or face expulsion at the next election cycle (or worse). That is how the NSA and its secretive doings can “change people’s fates.”

Is it too obvious to state that such blackmail is criminal and an assault on democracy? This attack is on the American People, who are now at the mercy of a Vichy Congress, occupied by the STASI intelligence/surveillance state.

James Clapper, America’s current “Director of National Intelligence,” blatantly lied to Congress on live TV, March 12th. Clapper claimed that NSA doesn’t collect Americans’ communications knowing full well that they do and are expanding this capability daily. Clapper received no penalty whatsoever for Contempt of Congress, a criminal offense! In the Alice in Wonderland world of Washington politics, instead of being jailed for a year for lying to the Congress, Mr. Clapper was voted in UNANIMOUSLY to take over all 16 of America’s spy agencies this August.

Clapper’s current version of the NSA Big Lie is that: “I realized later Sen. Wyden was asking about… metadata collection, rather than content collection… Thus, my response was clearly erroneous, for which I apologize.”

But it’s not just “metadata,” and the metadata is only one component of the data collection, used to more easily search through the actual content that is also stored by the National Security Agency for varying lengths of time. When the UK Guardian released this information, provided by Edward Snowden, their offices were later raided by British security forces and computer hard drives were destroyed, as in a typical Banana Republic assault on the press.

James Clapper continues to lie, and the liars have no disincentive to stop their officially-blessed fabricating. Congressional oversight is negated absolutely, and the Congress remains powerless in the face of the Total Surveillance State – where they are prime targets for blackmail and coercion.

The official pattern has been to lie, backtrack to the next position and to maintain it until further revelations make the current story untenable. Then, a new story is told with the theme being that regular, inactive, unengaged Americans have nothing to worry about; they are already neutralized. The truth is that all Americans have plenty to worry about, the complete destruction of privacy and “freedom,” that buzzword that passes by without the slightest contemplation of what it means. Rule by a secretive military / corporate dictatorship is simply not the “America” that people think of. Surely it bears no resemblance to the “Land of the free.” It is an entirely different and alien place.

So what’s your personal preference on that one?

Joe Giambrone publishes Political Film Blog, and his novel of Hollywood debauchery, Hell of a Deal, is available now.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 86 guests