The Criminal N.S.A.

Moderators: Elvis, DrVolin, Jeff

Re: The Criminal N.S.A.

Postby JackRiddler » Mon Jun 02, 2014 2:05 pm

Latest story from Laura Poitras and James Risen, thanks to that Snowden person some people want to defame and destroy.

Oh wait, we surely knew this already, or guessed it since it was technologically possible, so it's a limited hangout, etc. etc. Or it's being put out there through the NY Times, therefore evil.

Enough of my prattle - this is a big story, so read it:

Poitras and Risen wrote:
http://www.nytimes.com/2014/06/01/us/ns ... ml?hp&_r=0

U.S.

N.S.A. Collecting Millions of Faces From Web Images


By JAMES RISEN and LAURA POITRAS

MAY 31, 2014

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

Very interesting. I wonder where the NSA gets a lot of its Faces. From a certain Book?
Alex
14 hours ago

When CNN candidly advocates surveillance and face recognition in the street of NYC:http://www.cnn.com/video/data/2...
CB
14 hours ago

J. Edgar would have _loved_ this. If ever someone like him or worse than him gets ahold of this apparatus, we all better watch out!

See All Comments


The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

Image
Umar Farouk Abdulmutallab, left, who tried to bomb an airplane, and Faisal Shahzad, who tried to set off a car bomb in Times Square. The attempts prompted more image gathering. Credit Reuters; U.S. Marshals Service, via Associated Press

“It’s not just the traditional communications we’re after: It’s taking a full-arsenal approach that digitally exploits the clues a target leaves behind in their regular activities on the net to compile biographic and biometric information” that can help “implement precision targeting,” noted a 2010 document.

One N.S.A. PowerPoint presentation from 2011, for example, displays several photographs of an unidentified man — sometimes bearded, other times clean-shaven — in different settings, along with more than two dozen data points about him. These include whether he was on the Transportation Security Administration no-fly list, his passport and visa status, known associates or suspected terrorist ties, and comments made about him by informants to American intelligence agencies.

It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Given the N.S.A.’s foreign intelligence mission, much of the imagery would involve people overseas whose data was scooped up through cable taps, Internet hubs and satellite transmissions.

Because the agency considers images a form of communications content, the N.S.A. would be required to get court approval for imagery of Americans collected through its surveillance programs, just as it must to read their emails or eavesdrop on their phone conversations, according to an N.S.A. spokeswoman. Cross-border communications in which an American might be emailing or texting an image to someone targeted by the agency overseas could be excepted.

Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University. “There are still technical limitations on it, but the computational power keeps growing, and the databases keep growing, and the algorithms keep improving.”

State and local law enforcement agencies are relying on a wide range of databases of facial imagery, including driver’s licenses and Facebook, to identify suspects. The F.B.I. is developing what it calls its “next generation identification” project to combine its automated fingerprint identification system with facial imagery and other biometric data.

The State Department has what several outside experts say could be the largest facial imagery database in the federal government, storing hundreds of millions of photographs of American passport holders and foreign visa applicants. And the Department of Homeland Security is funding pilot projects at police departments around the country to match suspects against faces in a crowd.

The N.S.A., though, is unique in its ability to match images with huge troves of private communications.

“We would not be doing our job if we didn’t seek ways to continuously improve the precision of signals intelligence activities — aiming to counteract the efforts of valid foreign intelligence targets to disguise themselves or conceal plans to harm the United States and its allies,” said Vanee M. Vines, the agency spokeswoman.

She added that the N.S.A. did not have access to photographs in state databases of driver’s licenses or to passport photos of Americans, while declining to say whether the agency had access to the State Department database of photos of foreign visa applicants. She also declined to say whether the N.S.A. collected facial imagery of Americans from Facebook and other social media through means other than communications intercepts.

“The government and the private sector are both investing billions of dollars into face recognition” research and development, said Jennifer Lynch, a lawyer and expert on facial recognition and privacy at the Electronic Frontier Foundation in San Francisco. “The government leads the way in developing huge face recognition databases, while the private sector leads in accurately identifying people under challenging conditions.”

Ms. Lynch said a handful of recent court decisions could lead to new constitutional protections for the privacy of sensitive face recognition data. But she added that the law was still unclear and that Washington was operating largely in a legal vacuum.

Laura Donohue, the director of the Center on National Security and the Law at Georgetown Law School, agreed. “There are very few limits on this,” she said.

Identity Intelligence: Image Is Everything

An excerpt of a document obtained by Edward J. Snowden, a former contractor with the National Security Agency, referring to the agency’s use of images in intelligence gathering.
http://www.nytimes.com/interactive/2014 ... ument.html


Congress has largely ignored the issue. “Unfortunately, our privacy laws provide no express protections for facial recognition data,” said Senator Al Franken, Democrat of Minnesota, in a letter in December to the head of the National Telecommunications and Information Administration, which is now studying possible standards for commercial, but not governmental, use.

Facial recognition technology can still be a clumsy tool. It has difficulty matching low-resolution images, and photographs of people’s faces taken from the side or angles can be impossible to match against mug shots or other head-on photographs.

Dalila B. Megherbi, an expert on facial recognition technology at the University of Massachusetts at Lowell, explained that “when pictures come in different angles, different resolutions, that all affects the facial recognition algorithms in the software.”


(Can't help interrupting here to wonder if those who see "crisis actors" everywhere understand this is also true of the brain.)

That can lead to errors, the documents show. A 2011 PowerPoint showed one example when Tundra Freeze, the N.S.A.’s main in-house facial recognition program, was asked to identify photos matching the image of a bearded young man with dark hair. The document says the program returned 42 results, and displays several that were obviously false hits, including one of a middle-age man.

Similarly, another 2011 N.S.A. document reported that a facial recognition system was queried with a photograph of Osama bin Laden. Among the search results were photos of four other bearded men with only slight resemblances to Bin Laden.

But the technology is powerful. One 2011 PowerPoint showed how the software matched a bald young man, shown posing with another man in front of a water park, with another photo where he has a full head of hair, wears different clothes and is at a different location.

It is not clear how many images the agency has acquired. The N.S.A. does not collect facial imagery through its bulk metadata collection programs, including that involving Americans’ domestic phone records, authorized under Section 215 of the Patriot Act, according to Ms. Vines.

The N.S.A. has accelerated its use of facial recognition technology under the Obama administration, the documents show, intensifying its efforts after two intended attacks on Americans that jarred the White House. The first was the case of the so-called underwear bomber, in which Umar Farouk Abdulmutallab, a Nigerian, tried to trigger a bomb hidden in his underwear while flying to Detroit on Christmas in 2009. Just a few months later, in May 2010, Faisal Shahzad, a Pakistani-American, attempted a car bombing in Times Square.

The agency’s use of facial recognition technology goes far beyond one program previously reported by The Guardian, which disclosed that the N.S.A. and its British counterpart, General Communications Headquarters, have jointly intercepted webcam images, including sexually explicit material, from Yahoo users.

The N.S.A. achieved a technical breakthrough in 2010 when analysts first matched images collected separately in two databases — one in a huge N.S.A. database code-named Pinwale, and another in the government’s main terrorist watch list database, known as Tide — according to N.S.A. documents. That ability to cross-reference images has led to an explosion of analytical uses inside the agency. The agency has created teams of “identity intelligence” analysts who work to combine the facial images with other records about individuals to develop comprehensive portraits of intelligence targets.

The agency has developed sophisticated ways to integrate facial recognition programs with a wide range of other databases. It intercepts video teleconferences to obtain facial imagery, gathers airline passenger data and collects photographs from national identity card databases created by foreign countries, the documents show. They also note that the N.S.A. was attempting to gain access to such databases in Pakistan, Saudi Arabia and Iran.

The documents suggest that the agency has considered getting access to iris scans through its phone and email surveillance programs. But asked whether the agency is now doing so, officials declined to comment. The documents also indicate that the N.S.A. collects iris scans of foreigners through other means.

In addition, the agency was working with the C.I.A. and the State Department on a program called Pisces, collecting biometric data on border crossings from a wide range of countries.

One of the N.S.A.’s broadest efforts to obtain facial images is a program called Wellspring, which strips out images from emails and other communications, and displays those that might contain passport images. In addition to in-house programs, the N.S.A. relies in part on commercially available facial recognition technology, including from PittPatt, a small company owned by Google, the documents show.

The N.S.A. can now compare spy satellite photographs with intercepted personal photographs taken outdoors to determine the location. One document shows what appear to be vacation photographs of several men standing near a small waterfront dock in 2011. It matches their surroundings to a spy satellite image of the same dock taken about the same time, located at what the document describes as a militant training facility in Pakistan.

A version of this article appears in print on June 1, 2014, on page A1 of the New York edition with the headline: N.S.A. Collecting Millions of Faces From Web Images.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 15988
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Criminal N.S.A.

Postby seemslikeadream » Thu Jun 05, 2014 5:56 pm

Germany Opens Criminal Probe Into NSA Tapping of Merkel’s Phone
Prosecutor: Espionage a Crime Even If It's an Ally
by Jason Ditz, June 04, 2014

Germany’s Federal Public Prosecutor has announced a criminal probe has been opened into the NSA’s wiretapping of Chancellor Angela Merkel’s cellphone, and that Germany would prosecute individuals found to be involved in the scheme.

“Espionage is a crime in Germany regardless of whether those spying are friends or enemies,” noted prosecutor Harald Range, who said his office has information on specific individuals who were involved in the Merkel tap.

The revelation of the Merkel tap came in October, as part of the trove of documents from Edward Snowden. The White House initially denied involvement in the spying, but has since promised to never again spy on the leaders of allied nations.

Germany, a nation with a long history of governments with abusive surveillance programs, has taken the NSA story particularly seriously. Indeed, German opposition figures’ only qualm was that the probe wasn’t broad enough, saying they felt it should include surveillance of all Germans, not just the chancellor.

Range says that the probe of Merkel may indeed just be a jumping off point, and that he will broaden the case if the office gets more evidence on the general surveillance programs against Germany.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Jun 10, 2014 9:00 am

EXCLUSIVE REPORT: NSA Whistleblower: Snowden Never Had Access to the JUICIEST Documents … Far More Damning
Posted on June 7, 2014 by WashingtonsBlog
NSA Spying On Congress, Admirals, Lawyers … Content As Well As Metadata … Cheney Was Running the Show

NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping.

Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:


He says the NSA started spying on President Obama when he was a candidate for Senate:


Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this.

Washington’s Blog called Tice to find out more about what he saw when he was at NSA.

RUSSELL TICE: We now know that NSA was wiretapping [Senator] Frank Church and another Senator. [That has been confirmed.]

And that got out by accident. All the information the NSA had back then – and probably many other senators and important people too, back in the 70s – they shredded and they destroyed all of that evidence. As much as they could find, they destroyed it all. By accident, something popped up 40 years later.

And, in fact, they were asked 40 years ago whether NSA had bugged Congress. And, of course, they lied. They lied through their teeth.

NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance

WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent. [Background here, here and here.]

Does Snowden even have documents which contain the information which you’ve seen?

RUSSELL TICE: The answer is no.

WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?

RUSSELL TICE: Think of it this way. Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?

Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?

They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA. They made the reports look like they were Humint (human intelligence) reports. They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago. [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.]

Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level. It’s called “ECI” - Exceptionally Controlled Information – and it’s called the black program … which I was a specialist in, by the way.

I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations It’s highly unlikely Mr. Snowden had any access to these.

Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it. It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System. The JWICS system is what everybody at NSA has access to. Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.

And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].

ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.

These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them. [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]

It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.

When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times – that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.

There was no such thing beforehand. It was made up … to try to placate the American people.

The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.

So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.

Snowden’s Failure To Understand the Most Important Documents

RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.

The stuff that I saw looked like a bunch of alphanumeric gobbledygook. Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst. So he would see something like that, and he wouldn’t know what he’s looking at.

But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.

I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.

Cheney Was Running the Show

WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive].

Is that right … and if so, how do you know that?

RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington.

WASHINGTON’S BLOG: It sounds like it wasn’t going through normal routes? It’s not like Cheney or Addington made formal requests to the NSA … through normal means?

RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.

NSA Is Spying On CONTENT as Well as Metadata

WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata?

RUSSELL TICE: Of course it is. Of course. [Background. But see this.]

NSA Spying On Journalists, Congress, Admirals, Lawyers …

RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such.

I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state.

Or an Admiral and his wife, and his kids and his staffers …

The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else.

These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.

Snowden and Greenwald’s Whistleblowing Was Done In the Right Way

RUSSELL TICE: If Mr. Snowden would have had access to VRK, ECI, SAP, STO (and a few others that I will not mention here), and he released them en masse to the press, I would volunteer to shoot him as a traitor myself.

But this is not what he did.

He gave up JWICS info that he insisted be vetted for sources and methods, and true damage to national security. Mr. Greenwald and company should be congratulated on the restraint that they have shown with the JWICS documentation that they have in hand via Mr. Snowden.

Postscript: When Tice started blowing the whistle on NSA mass surveillance in the early 2000s, the NSA all of a sudden decided that Tice was “crazy”. As Tice told us:

For many years, I was the only NSA whistleblower in public.

And what they did is call me in – 9 months after my routine psychological evaluation – which I passed with flying colors, like every other one I’ve had in my entire career, passed with flying colors.

They called me in for an “emergency” psychological evaluation, and they declared me nuts.

I am a fairly good judge of character, and I found Tice to be humorous, self-deprecating in a healthy and light-hearted way, and consistent on the facts. Tice talked about how he was a pretty darn good football player in junior college, but no star athlete. He talked about how one reporter tried to make him out to be James Bond with leading man looks, and he thought that was ridiculous. We shared some normal “guy talk” about women. Tice has a little anger at the way the NSA tried to whitewash the mass surveillance that he uncovered (wouldn’t you be?), but he wasn’t enraged or over-the-top. Tice is also a patriotic American, not a subversive. Specifically, we spent a long time talking about the importance of the Constitution and the rule of law. In other words, Tice seems “oriented to reality”, completely sane, normal, ethical and bright to me.

And the following facts are more important than my personal impression:

Many of Tice’s allegations have been confirmed by Snowden and other government whistleblowers. And see this
Soviet leaders were famous for throwing dissidents into psychiatric wards. Unfortunately, the same thing sometimes happens in modern America
Given the way that the NSA has been repeatedly caught in lies about its surveillance programs – and the way that it has attacked whisteblowers – I believe Tice over the NSA.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Jun 11, 2014 6:13 am

Does Snowden Know Why the NSA Doesn't Need Warrants? He Might.
Tuesday, 10 June 2014 10:21
By Peter Van Buren, Truthout | News Analysis

A funny thing to come out of Snowden's recent interview with NBC News was his claim that he raised concerns about the National Security Agency's (NSA) surveillance of US citizens through channels at the NSA, well before he began disclosing classified documents to journalists like Glenn Greenwald.
For almost a year, the NSA denied any record of Snowden speaking up, though located a single such email only following the recent television interview. It gets complicated, and very interesting, from that point.
Snowden's Email to the NSA
The email the NSA disclosed showed Snowden asked a fairly simple legal question arising from an NSA training session that outlined various legal authorities, from the US Constitution on down.
"I'm not entirely certain, but this does not seem correct, as it seems to imply Executive Orders have the same precedence as law," Snowden wrote, citing a hierarchy of governing authorities referenced during the training. "My understanding is that E.O.s [Executive Orders] may be superseded by federal statute, but E.O.s may not override statute. Am I incorrect in this? Between E.O.s and laws, which have precedence?"
"Hello Ed," came the reply from an NSA lawyer. "Executive orders . . . have the 'force and effect of law.' That said, you are correct that E.O.s cannot override a statute."
What the Email Means
Based on the NSA training he was given, Snowden was questioning which carries more weight within the NSA - an actual law passed by Congress, or an order from the president (an E.O., or executive order). The answer was a bit curvy, saying that absent a specific law to the contrary, an order from the president has the force of a law.
By way of a trite illustration, if Congress passed a law requiring Snowden to eat tuna every day for lunch in the NSA canteen, he'd have to do that, even if the president ordered him to have the tomato soup instead. However, absent a law specifically telling him what to eat, the president's order meant he would have to eat soup. Of course, if Congress did not even know of the president's order, it could not pass a law countering it.
Back to 2006
Hold on to the Snowden question for a moment and let's go back to 2006.
In 2006 we knew very, very little about what the NSA was doing, and knew even less about the scope and scale of their surveillance of Americans. That context is important.
General Michael Hayden, then head of the NSA, gave a talk in January 2006 at the National Press Club. Journalist Jonathan Landay started a back-and-forth with Hayden over the wording and meaning of the Fourth Amendment. Most media outlets played the story as a mockery of Hayden, claiming he did not even know what the Fourth said. MSNBC quipped, "Well, maybe they have a different Constitution over there at the NSA."
Let's take another look at the exchange, with a few parts highlighted:
LANDAY: I'm no lawyer, but my understanding is that the Fourth Amendment of the Constitution specifies that you must have probable cause to be able to do a search that does not violate an American's right against unlawful searches and seizures. Do you use -
HAYDEN: No, actually - the Fourth Amendment actually protects all of us against unreasonable search and seizure.
LANDAY: But the -
HAYDEN: That's what it says.
LANDAY: But the measure is probable cause, I believe.
HAYDEN: The amendment says unreasonable search and seizure.
LANDAY: But does it not say probable -
HAYDEN: No. The amendment says -
LANDAY: The court standard, the legal standard -
HAYDEN: - unreasonable search and seizure.
LANDAY: The legal standard is probable cause, General. You used the terms just a few minutes ago, "We reasonably believe." And a FISA court, my understanding is, would not give you a warrant if you went before them and say "we reasonably believe"; you have to go to the FISA court, or the attorney general has to go to the FISA court and say, "we have probable cause."
And so what many people believe - and I'd like you to respond to this - is that what you've actually done is crafted a detour around the FISA court by creating a new standard of "reasonably believe" in place of probable cause because the FISA court will not give you a warrant based on reasonable belief; you have to show probable cause. Could you respond to that, please?
HAYDEN: Sure. I didn't craft the authorization. I am responding to a lawful order. All right? The attorney general has averred to the lawfulness of the order.
Just to be very clear - and believe me, if there's any amendment to the Constitution that employees of the National Security Agency are familiar with, it's the Fourth. And it is a reasonableness standard in the Fourth Amendment. And so what you've raised to me - and I'm not a lawyer, and don't want to become one - what you've raised to me is, in terms of quoting the Fourth Amendment, is an issue of the Constitution. The constitutional standard is "reasonable." And we believe - I am convinced that we are lawful because what it is we're doing is reasonable.
Reasonable Searches Versus Warranted Searches
The full text of the Fourth Amendment is as follows, broken into two parts for our purposes here:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
AND
no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
The reporter questioning Hayden, and most everyone else, wrongly conflates "unreasonable" with "unwarranted," claiming that the only reasonable search is one done under a warrant. That is not true.
Cops search people and cars all the time, legally, without warrants. The same thing happens at the border with the Transportation Security Administration (TSA) and others. The New York Police Department has its infamous stop and frisk practice.
There are libraries of case law on this, and yes, courts have generally - but not always - claimed that the same probable cause required to obtain a search warrant is an implied part of a "reasonable" search.
One Supreme Court case of interest is Vernonia Sch. Dist. 47J v. Acton. The case involved a student's refusal to submit to drug testing as a condition of playing high school sports. But take a look at the clarity of precedent in the court's opinion (emphasis added):
Where a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing, this Court has said that reasonableness generally requires the obtaining of a judicial warrant. Warrants cannot be issued, of course, without the showing of probable cause required by the Warrant Clause. But a warrant is not required to establish the reasonableness of all government searches; and when a warrant is not required (and the Warrant Clause therefore not applicable), probable cause is not invariably required either. A search unsupported by probable cause can be constitutional, we have said, "when special needs, beyond the normal need for law enforcement, make the warrant and probable cause requirement impracticable."
What Hayden Knew, Part I
As head of the NSA, Hayden was not an emotional man, one prone to off-the-cuff remarks, or an imprecision of language. Standing in front of the press in 2006, Hayden knew in great detail the vast scope and scale of surveillance of Americans his agency was carrying out at that very moment, even if his audience did not. Hayden had also been around Washington a long time, and knew political will fades, and winds change. He was not about to implicate himself in a violation of the constitution in front of a room full of journalists.
Hayden parsed the Fourth Amendment to maintain that under some legal opinions, a government search could be both "reasonable" and unwarranted and still be constitutional. Hayden also clearly referred to "the authorization," said, "I am responding to a lawful order" and added that "the attorney general has averred to the lawfulness of the order." He ended by saying "I am convinced that we are lawful because what it is we're doing is reasonable."
What Hayden Knew, Part II
The law, the statute Snowden asked about in his 2013 email to the NSA lawyer, as passed by Congress was clear: under the Foreign Intelligence Surveillance Act (FISA), government officials have to prove to the secret intelligence court that there was "probable cause" to believe that a person was tied to terrorism to obtain a search warrant. Warrants, FISA or otherwise, still require probable cause, precisely as the Fourth Amendment states.
But what if, standing there in 2006, guessing some or all of his NSA's work would someday become public, Hayden knew he was covered for all the searches he was doing without warrants if he just chose his words very carefully. What if Hayden had an executive order from the president in his office safe, a secret legal memo, similar to the memos we now know of by John Yoo that explained how torture was not torture, or the one by David Barron explaining how the president ordering the drone killing of an American was not a violation of the Fifth Amendment's guarantee of due process. Perhaps in that executive order, Hayden had laid out the legal argument that the NSA's electronic surveillance of every American constituted a "reasonable" search under the Fourth Amendment. Reasonable searches do not require warrants. The Fourth prohibits only "unreasonable searches." All the push and shove over unwarranted searches was just a smokescreen, a distraction for the public. It was all legal without a warrant anyway.
At that point everything Hayden said - that what the NSA was doing was lawful because it was reasonable - makes chilling sense.
What Snowden Knows
Edward Snowden and the journalists working with his materials are smart cats. Over the past year they have had a curious knack for releasing a document, watching the president lie about it ("we don't read Americans' emails") and then releasing another document exposing the lie.
Does Snowden know of, or strongly suspect, there is a secret executive order legalizing everything the NSA is doing by claiming the searches are "reasonable," and thus no warrant is needed to conduct them on a mass scale? Did something in his NSA training hint at that, and, through his email inquiry asking about the relative strength of an executive order versus a law (in the case, the FISA law requiring probable cause for warrants to be issued), was Snowden trying to tease that out of the NSA lawyer he wrote to?
Ask Obama This Question
So let's make it simple: Journalists with access to the president, ask this question directly: Is there an executive order or other document stating that the NSA's surveillance of US citizens is "reasonable," and thus no warrant is required for the surveillance to continue and remain constitutional under the Fourth Amendment?
Yes or no, Mr. President. Edward Snowden and the rest of us would like to know.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Mon Jun 30, 2014 9:58 am



User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby conniption » Tue Jul 01, 2014 5:18 am

Washington's Blog
(embedded links)

Top NSA Officials: U.S. Has Turned Into Stasi Germany or Soviet Union

Posted on June 30, 2014
by WashingtonsBlog


What the Heck Happened to America?

Senior NSA executive Thomas Drake is an expert on spying in Stasi Germany … having studied it for years.

Drake told Washington’s Blog that the U.S. has adopted the Stasi model:

“Collect it all, know it all” [the NSA's model] is actually the Stasi model. It’s not just know everything; we have to be able to keep everything that we want to know, even if we don’t know it yet.

It’s a collect it all first mentality … and then we’ll get to know it all. I call it “feeding the beast”.

I keep shuddering because I’m intimately familiar with the East German surveillance state mentality.


A lieutenant colonel for the Stasi East German’s – based upon his experience – agrees. And German Chancellor Angela Merkel – who grew up in Stasi Germany – says the NSA is exactly the same. Top American constitutional experts also say that the Obama and Bush administration are worse than the Stasi East Germans.

Senior NSA official Bill Binney – the senior technical director within the agency who headed NSA’s global digital data gathering program and managed thousands of NSA employees – is an expert on Soviet spying.

Binney spent decades studying – and trying to counter – the repressive Soviet program of mass surveillance.

Binney says that – after 9/11 – America implemented the same type of system used by the Soviets and other authoritarian regimes:
You’ve got the NSA doing all this collecting of material on all of its citizens – that’s what the SS, the Gestapo, the Stasi, the KGB, and the NKVD did.


Postscript: Unfortunately, it’s not just spying …

In the decade after 9/11, the U.S. used specialized communist torture techniques specifically aimed at extracting false confessions.

Under Obama, whistleblowers and dissidents are treated as ruthlessly as in the Soviet Union.

When bad government policy leads to bad results, the U.S. government does what the Soviets did: manipulate the data.

The Soviets had Pravda … similarly, propaganda is now being used within the U.S. The U.S. government pumps out massive amounts of propaganda through the mainstream and “gatekeeper” alternative media, movies, video games, and other venues.

And the American economy has gone from capitalism to socialism … at least for the fatcats.

What the heck happened to American ideals?
conniption
 
Posts: 2480
Joined: Sun Nov 11, 2012 10:01 pm
Blog: View Blog (0)

Re: The Criminal N.S.A.

Postby seemslikeadream » Thu Jul 03, 2014 6:03 pm

NSA 'totalitarian,' ex-staffer tells German parliament
A former NSA technical chief has told Germany's parliament that the US agency has become a "totalitarian" mass collector of data. German public broadcasters say the NSA targets individuals who use encryption services.

NSA whisteblowers testify in Berlin
Former NSA technical head William Binney described the US National Security Agency in Berlin on Thursday as an entity that had abandoned every rule-of-law principle and breached the democratic freedoms of citizens.
Binney was the first American insider to testify to the German Bundestag's newly formed NSA inquiry committee, which is pursuing three questions, including whether German intelligence services had worked with the NSA.
Whistleblower und früherer NSA-Mitarbeiter William Binney
Binney told the Bundestag committee the NSA's mass-data collection was "senseless" as a counterterrorism measure
Testifying, Binney accused the NSA of having a "totalitarian mentality" and wanting "total information control" over citizens in breach of the US constitution. It was an approach that until now the public had only seen among dictators, he added.
Mass collection was "senseless" and did not help in counterterrorism, and actually hindered the agency's capabilities, Binney said.
The NSA represented the "greatest threat" to American society since the US Civil War of the 19th century, Binney added.
Binney left the NSA as its technical chief in 2001 shortly it began mass scanning in the wake of 9/11 hijack attacks by al Qaeda terrorists on New York and Washington.
Ultimate form of control, says Drake
Another former NSA staffer, Thomas Drake, who left the NSA after trying to use official complaint channels, told the inquiry that almost all data that transited Germany was accessed by the NSA and Germany's BND foreign intelligence service -- or the NSA alone.
The US government was exercising the ultimate form of control, Drake said, adding that the German BND's silence on the issue was "terrible."
"The public has a right to know what the NSA does," he said, according to a quote from the hearing delivered by the Geman DPA news agency in German.
Drake said the United States would soon become a "real surveillance" nation in which the private lives of individuals were becoming more and more the property of the state.
On Wednesday, the Privacy and Civil Liberties Oversight Board ( PCLOB), a panel appointed by US President Barack Obama, defended the NSA's vast foreign intelligence data sweeps.
NSA spying on encryption users
Two of Germany's major public broadcasting channels, NDR and WDR, reported simultaneously on Thursday that the NSA was apparently spying specifically on mmindividuals who use encryption and anonymization procedures to hide data flows.
Details of those individuals, including IP addresses, for example those trying to work around internet censorship in Iran, were filtered out and ended up in a special NSA database, the report said.
The channels said the student Sebastian Hahn -- based in Erlangen in Germany's southern state of Bavaria -- was targeted by the NSA because he operated a server as part of Tor, a network for users trying to make their internet activity untraceable. Alone Hahn's Tor server was used by "hundreds of thousands" daily, the broadcasters claimed.
Hahn on his internet blog said he was shocked that in the wake last year's whistle-blowing by exiled former NSA contractor Edward Snowden that the NSA had focused its spying on innocent individuals as if the practice were normal and matter-of-fact.
'Complete cynicism,' says journalists' network
The German section head of the journalists' network Reporters Without Borders, Christian Mihr, said media workers and rights activists used such networks and their targeting by the NSA exhibited the "complete cynicism" of US surveillance practices.
Binney told the committee that the joint NDR-WDR report was plausible.
Committee member demands expanded prosecution probe
The inquiry committee's leading Social Democrat (SPD) Christian Fliesek demanded the German federal prosecutions service immediately begin a probe into the alleged "mass surveillance of German citizens."
Mihr demanded that Merkel's coalition government end its tactic of trying to "sit out the NSA scandal" and excluding areas of inquiry.
Inquiry committee chairman, Patrick Sensburg (pictured above center) of Chancellor Angela Merkel's Christian Democrat conservatives, began Thursday's hearing in Berlin by claiming his committee knew little about the NSA's internal structures and practices.

Prosecutor decides belatedly on probe
"We don't know much about the NSA," Sensburg said.
Federal Prosecutor Harald Range recently began a probe into last year's disclosure that the NSA had eavesdropped on Chancellor Angela Merkel's mobile phone.
Live transmission absent
During Thursday's session, four conservative inquiry committee members used their votes to block a live transmission of Binney's testimony on the Bundestag's own parliamentary video channel on the Internet, according to the news agency AFP.
The Social Democrats' Fliesek objected to what he called the conservatives "hard stance" and said he would continue to push for live transmissions from the inquiry.
State neglecting task to protect
Two of Germany's opposition parties strongly criticized the alleged NSA targeting of Tor.
Pirate Party spokesman Kristos Thingilouthis said persons who used digital tools to avoid surveillance were being treated by the NSA as "terrorists."
Katharina Schulze, the internal affairs spokeswoman for the Greens deputies in the Bavarian state assembly, said the German state as a whole was all the more neglecting its obligation to protect citizens from "shameless" NSA surveillance.
A Greens member of the federal Inquiry committee Konstantin von Notz said it was "perverse" that German government had recommended that citizens protect themselves by encrypting their data only to find themselves under observation.
Veteran Greens parliamentarian Hans-Christian Ströbele, who visited Snowdon in Moscow last October and has sought his appearance before the Berlin inquiry, said no longer could anyone in Germany claim that documents from Snowden were false
.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby coffin_dodger » Sun Jul 06, 2014 9:55 am



NYT 'helps' detect future dissenters.
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sun Jul 06, 2014 11:03 pm

The NSA Said Edward Snowden Had No Access to Surveillance Intercepts. They Lied.
—By Kevin Drum| Sun Jul. 6, 2014 12:45 AM EDT


For more than a year, NSA officials have insisted that although Edward Snowden had access to reports about NSA surveillance, he didn't have access to the actual surveillance intercepts themselves. It turns out they were lying.1 In fact, he provided the Washington Post with a cache of 22,000 intercept reports containing 160,000 individual intercepts. The Post has spent months reviewing these files and estimates that 11 percent of the intercepted accounts belonged to NSA targets and the remaining 89 percent were "incidental" collections from bystanders.

So was all of this worth it? The Post's review illustrates just how hard it is to make that judgment:

Among the most valuable contents — which The Post will not describe in detail, to avoid interfering with ongoing operations — are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.

Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that officials said would compromise ongoing operations.

Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.

....If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.

The whole story is worth a read in order to get a more detailed description of what these intercepts looked like and who they ended up targeting. In some ways, the Snowden intercepts show that the NSA is fairly fastidious about minimizing data on US persons. In other ways, however, the NSA plainly stretches to the limit—and probably beyond—the rules for defining who is and isn't a US person. Click the link for more.

1Naturally the NSA has an explanation:

Robert S. Litt, the general counsel for the Office of the Director of National Intelligence, said in a prepared statement that Alexander and other officials were speaking only about "raw" intelligence, the term for intercepted content that has not yet been evaluated, stamped with classification markings or minimized to mask U.S. identities.

“We have talked about the very strict controls on raw traffic..." Litt said. “Nothing that you have given us indicates that Snowden was able to circumvent that in any way.”

Silly intelligence committee members. They should have specifically asked about access to processed content.

Jesus. If someone in Congress isn't seriously pissed off about this obvious evasion, they might as well just hang up their oversight spurs and disband.



In NSA-intercepted data, those not targeted far outnumber the foreigners who are
Files provided by Snowden show extent to which ordinary Web users are caught in the net

Target package prepared by the National Security Agency prior to the capture of Abu Hamza in January 2011
BY BARTON GELLMAN, JULIE TATE AND ASHKAN SOLTANI July 5
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.

Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.

Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.

The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address.

Among the most valuable contents — which The Post will not describe in detail, to avoid interfering with ongoing operations — are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.



A breakdown of the cache of NSA-intercepted communications provided to the Washington Post by Edward Snowden
Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that officials said would compromise ongoing operations.

Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.

In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach.

The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.


The material spans President Obama’s first term, from 2009 to 2012, a period of exponential growth for the NSA’s domestic collection.

Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.

No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the president’s Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects — not only from its targets but also from people who may cross a target’s path.


A composite image of two of the more than 5,000 private photos among data collected by the National Security Agency from online accounts and network links in the United States. The images were included in a large cache of NSA intercepts provided by former agency contractor Edward Snowden. (Images obtained by The Washington Post)
Among the latter are medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque.

Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam or striking risque poses in shorts and bikini tops.


“None of the hits that were received were relevant,” two Navy cryptologic technicians write in one of many summaries of nonproductive surveillance. “No additional information,” writes a civilian analyst. Another makes fun of a suspected kidnapper, newly arrived in Syria before the current civil war, who begs for employment as a janitor and makes wide-eyed observations about the state of undress displayed by women on local beaches.

By law, the NSA may “target” only foreign nationals located overseas unless it obtains a warrant based on probable cause from a special surveillance court. For collection under PRISM and Upstream rules, analysts must state a reasonable belief that the target has information of value about a foreign government, a terrorist organization or the spread of nonconventional weapons.

Most of the people caught up in those programs are not the targets and would not lawfully qualify as such. “Incidental collection” of third-party communications is inevitable in many forms of surveillance, but in other contexts the U.S. government works harder to limit and discard irrelevant data. In criminal wiretaps, for example, the FBI is supposed to stop listening to a call if a suspect’s wife or child is using the phone.

There are many ways to be swept up incidentally in surveillance aimed at a valid foreign target. Some of those in the Snowden archive were monitored because they interacted directly with a target, but others had more-tenuous links.

If a target entered an online chat room, the NSA collected the words and identities of every person who posted there, regardless of subject, as well as every person who simply “lurked,” reading passively what other people wrote.


“1 target, 38 others on there,” one analyst wrote. She collected data on them all.

In other cases, the NSA designated as its target the Internet protocol, or IP, address of a computer server used by hundreds of people.

The NSA treats all content intercepted incidentally from third parties as permissible to retain, store, search and distribute to its government customers. Raj De, the agency’s general counsel, has testified that the NSA does not generally attempt to remove irrelevant personal content, because it is difficult for one analyst to know what might become relevant to another.

The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports.

If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.


‘He didn’t get this data’
U.S. intelligence officials declined to confirm or deny in general terms the authenticity of the intercepted content provided by Snowden, but they made off-the-record requests to withhold specific details that they said would alert the targets of ongoing surveillance. Some officials, who declined to be quoted by name, described Snowden’s handling of the sensitive files as reckless.

In an interview, Snowden said “primary documents” offered the only path to a concrete debate about the costs and benefits of Section 702 surveillance. He did not favor public release of the full archive, he said, but he did not think a reporter could understand the programs “without being able to review some of that surveillance, both the justified and unjustified.”

“While people may disagree about where to draw the line on publication, I know that you and The Post have enough sense of civic duty to consult with the government to ensure that the reporting on and handling of this material causes no harm,” he said.

In Snowden’s view, the PRISM and Upstream programs have “crossed the line of proportionality.”

“Even if one could conceivably justify the initial, inadvertent interception of baby pictures and love letters of innocent bystanders,” he added, “their continued storage in government databases is both troubling and dangerous. Who knows how that information will be used in the future?”

For close to a year, NSA and other government officials have appeared to deny, in congressional testimony and public statements, that Snowden had any access to the material.


As recently as May, shortly after he retired as NSA director, Gen. Keith Alexander denied that Snowden could have passed FISA content to journalists.

“He didn’t get this data,” Alexander told a New Yorker reporter. “They didn’t touch —”

“The operational data?” the reporter asked.

“They didn’t touch the FISA data,” Alexander replied. He added, “That database, he didn’t have access to.”

Robert S. Litt, the general counsel for the Office of the Director of National Intelligence, said in a prepared statement that Alexander and other officials were speaking only about “raw” intelligence, the term for intercepted content that has not yet been evaluated, stamped with classification markings or minimized to mask U.S. identities.

“We have talked about the very strict controls on raw traffic, the training that people have to have, the technological lockdowns on access,” Litt said. “Nothing that you have given us indicates that Snowden was able to circumvent that in any way.”

In the interview, Snowden said he did not need to circumvent those controls, because his final position as a contractor for Booz Allen at the NSA’s Hawaii operations center gave him “unusually broad, unescorted access to raw SIGINT [signals intelligence] under a special ‘Dual Authorities’ role,” a reference to Section 702 for domestic collection and Executive Order 12333 for collection overseas. Those credentials, he said, allowed him to search stored content — and “task” new collection — without prior approval of his search terms.


“If I had wanted to pull a copy of a judge’s or a senator’s e-mail, all I had to do was enter that selector into XKEYSCORE,” one of the NSA’s main query systems, he said.

The NSA has released an e-mail exchange acknowledging that Snowden took the required training classes for access to those systems.

‘Minimized U.S. president’
At one level, the NSA shows scrupulous care in protecting the privacy of U.S. nationals and, by policy, those of its four closest intelligence allies — Britain, Australia, Canada and New Zealand.

More than 1,000 distinct “minimization” terms appear in the files, attempting to mask the identities of “possible,” “potential” and “probable” U.S. persons, along with the names of U.S. beverage companies, universities, fast-food chains and Web-mail hosts.

Some of them border on the absurd, using titles that could apply to only one man. A “minimized U.S. president-elect” begins to appear in the files in early 2009, and references to the current “minimized U.S. president” appear 1,227 times in the following four years.

Even so, unmasked identities remain in the NSA’s files, and the agency’s policy is to hold on to “incidentally” collected U.S. content, even if it does not appear to contain foreign intelligence.

In one exchange captured in the files, a young American asks a Pakistani friend in late 2009 what he thinks of the war in Afghanistan. The Pakistani replies that it is a religious struggle against 44 enemy states.

Startled, the American says “they, ah, they arent heavily participating . . . its like . . . in a football game, the other team is the enemy, not the other teams waterboy and cheerleaders.”


“No,” the Pakistani shoots back. “The ther teams water boy is also an enemy. it is law of our religion.”

“haha, sorry thats kind of funny,” the American replies.

When NSA and allied analysts really want to target an account, their concern for U.S. privacy diminishes. The rationales they use to judge foreignness sometimes stretch legal rules or well-known technical facts to the breaking point.

In their classified internal communications, colleagues and supervisors often remind the analysts that PRISM and Upstream collection have a “lower threshold for foreignness ‘standard of proof’ ” than a traditional surveillance warrant from a FISA judge, requiring only a “reasonable belief” and not probable cause.

One analyst rests her claim that a target is foreign on the fact that his e-mails are written in a foreign language, a quality shared by tens of millions of Americans. Others are allowed to presume that anyone on the chat “buddy list” of a known foreign national is also foreign.

In many other cases, analysts seek and obtain approval to treat an account as “foreign” if someone connects to it from a computer address that seems to be overseas. “The best foreignness explanations have the selector being accessed via a foreign IP address,” an NSA supervisor instructs an allied analyst in Australia.

Apart from the fact that tens of millions of Americans live and travel overseas, additional millions use simple tools called proxies to redirect their data traffic around the world, for business or pleasure. World Cup fans this month have been using a browser extension called Hola to watch live-streamed games that are unavailable from their own countries. The same trick is routinely used by Americans who want to watch BBC video. The NSA also relies routinely on locations embedded in Yahoo tracking cookies, which are widely regarded by online advertisers as unreliable.


In an ordinary FISA surveillance application, the judge grants a warrant and requires a fresh review of probable cause — and the content of collected surveillance — every 90 days. When renewal fails, NSA and allied analysts sometimes switch to the more lenient standards of PRISM and Upstream.

“These selectors were previously under FISA warrant but the warrants have expired,” one analyst writes, requesting that surveillance resume under the looser standards of Section 702. The request was granted.

‘I don’t like people knowing’
She was 29 and shattered by divorce, converting to Islam in search of comfort and love. He was three years younger, rugged and restless. His parents had fled Kabul and raised him in Australia, but he dreamed of returning to Afghanistan.

One day when she was sick in bed, he brought her tea. Their faith forbade what happened next, and later she recalled it with shame.

“what we did was evil and cursed and may allah swt MOST merciful forgive us for giving in to our nafs [desires]”

Still, a romance grew. They fought. They spoke of marriage. They fought again.

All of this was in the files because, around the same time, he went looking for the Taliban.

He found an e-mail address on its English-language Web site and wrote repeatedly, professing loyalty to the one true faith, offering to “come help my brothers” and join the fight against the unbelievers.

On May 30, 2012, without a word to her, he boarded a plane to begin a journey to Kandahar. He left word that he would not see her again.

If that had been the end of it, there would not be more than 800 pages of anguished correspondence between them in the archives of the NSA and its counterpart, the Australian Signals Directorate.


He had made himself a target. She was the collateral damage, placed under a microscope as she tried to adjust to the loss.

Three weeks after he landed in Kandahar, she found him on Facebook.

“Im putting all my pride aside just to say that i will miss you dearly and your the only person that i really allowed myself to get close to after losing my ex husband, my dad and my brother.. Im glad it was so easy for you to move on and put what we had aside and for me well Im just soo happy i met you. You will always remain in my heart. I know you left for a purpose it hurts like hell sometimes not because Im needy but because i wish i could have been with you.”

His replies were cool, then insulting, and gradually became demanding. He would marry her but there were conditions. She must submit to his will, move in with his parents and wait for him in Australia. She must hand him control of her Facebook account — he did not approve of the photos posted there.

She refused. He insisted:

“look in islam husband doesnt touch girl financial earnigs unless she agrees but as far as privacy goes there is no room….i need to have all ur details everything u do its what im supposed to know that will guide u whether its right or wrong got it”

Later, she came to understand the irony of her reply:

“I don’t like people knowing my private life.”

Months of negotiations followed, with each of them declaring an end to the romance a dozen times or more. He claimed he had found someone else and planned to marry that day, then admitted it was a lie. She responded:


“No more games. You come home. You won’t last with an afghan girl.”

She begged him to give up his dangerous path. Finally, in September, she broke off contact for good, informing him that she was engaged to another man.

“When you come back they will send you to jail,” she warned.

They almost did.

In interviews with The Post, conducted by telephone and Facebook, she said he flew home to Australia last summer, after failing to find members of the Taliban who would take him seriously. Australian National Police met him at the airport and questioned him in custody. They questioned her, too, politely, in her home. They showed her transcripts of their failed romance. When a Post reporter called, she already knew what the two governments had collected about her.

Eventually, she said, Australian authorities decided not to charge her failed suitor with a crime. Police spokeswoman Emilie Lovatt declined to comment on the case.

Looking back, the young woman said she understands why her intimate correspondence was recorded and parsed by men and women she did not know.

“Do I feel violated?” she asked. “Yes. I’m not against the fact that my privacy was violated in this instance, because he was stupid. He wasn’t thinking straight. I don’t agree with what he was doing.”

What she does not understand, she said, is why after all this time, with the case long closed and her own job with the Australian government secure, the NSA does not discard what it no longer needs.

Jennifer Jenkins and Carol D. Leonnig contributed to this report.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Wed Jul 09, 2014 9:41 am

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On
By Glenn Greenwald and Murtaza Hussain9 Jul 2014, 12:01 AM EDT 126
The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

• Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

• Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

• Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

• Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

• Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”—short for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also “are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens.

The spreadsheet shows 7,485 email addresses listed as monitored between 2002 and 2008. Many of the email addresses on the list appear to belong to foreigners whom the government believes are linked to Al Qaeda, Hamas, and Hezbollah. Among the Americans on the list are individuals long accused of terrorist activity, including Anwar al-Awlaki and Samir Khan, who were killed in a 2011 drone strike in Yemen.

But a three-month investigation by The Intercept—including interviews with more than a dozen current and former federal law enforcement officials involved in the FISA process—reveals that in practice, the system for authorizing NSA surveillance affords the government wide latitude in spying on U.S. citizens.

The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.

“I just don’t know why,” says Gill, whose AOL and Yahoo! email accounts were monitored while he was a Republican candidate for the Virginia House of Delegates. “I’ve done everything in my life to be patriotic. I served in the Navy, served in the government, was active in my community—I’ve done everything that a good citizen, in my opinion, should do.”

(An Intercept video interview with Gill is below, as are videos of Ghafoor and Awad.)


Given that the government’s justifications for subjecting Gill and the other U.S. citizens to surveillance remain classified, it is impossible to know why their emails were monitored, or the extent of the surveillance. It is also unclear under what legal authority it was conducted, whether the men were formally targeted under FISA warrants, and what, if anything, authorities found that permitted them to continue spying on the men for prolonged periods of time. But the five individuals share one thing in common: Like many if not most of the people listed in the NSA spreadsheet, they are of Muslim heritage.

“I believe that they tapped me because my name is Asim Abdur Rahman Ghafoor, my parents are from India, I travelled to Saudi Arabia as a young man, and I do the pilgrimage,” says Ghafoor, when told that no non-Muslim attorneys who defended terror suspects had been identified on the list. “Yes, absolutely I believe that had something to do with it.”

The FBI—which is listed as the “responsible agency” for surveillance on the five men—has a controversial record when it comes to the ethnic profiling of Muslim-Americans. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained.

John Guandolo, a former FBI counterterrorism official who takes credit for developing a training program for agents on the “Muslim Brotherhood and their subversive movement in the United States,” told The Intercept that he participated in investigations of some of the individuals whose email accounts were monitored. Echoing the “red under every bed” hysteria of the McCarthy era, Guandolo believes that “hundreds” of covert members of the Muslim Brotherhood are active in the United States, that some of them have succeeded in infiltrating the Pentagon, and that CIA director John Brennan is a secret Muslim.

Other former and current federal officials say such beliefs are not representative of the FBI or Justice Department. But blatant prejudice against Muslim-Americans is also documented in the Snowden archive.

In one 2005 document, intelligence community personnel are instructed how to properly format internal memos to justify FISA surveillance. In the place where the target’s real name would go, the memo offers a fake name as a placeholder: “Mohammed Raghead.”

raghead



The vast majority of individuals on the “FISA recap” spreadsheet are not named. Instead, only their email addresses are listed, making it impossible in most cases to ascertain their identities. Under the heading “Nationality,” the list designates 202 email addresses as belonging to “U.S. persons,” 1,782 as belonging to “non-U.S. persons,” and 5,501 as “unknown” or simply blank. The Intercept identified the five Americans placed under surveillance from their email addresses.

It is unclear whether the government obtained any legal permission to monitor the Americans on the list. The FBI and the Justice Department declined to comment for this story. During the course of multiple conversations with The Intercept, the NSA and the Office of the Director of National Intelligence urged against publication of any surveillance targets. “Except in exceptional circumstances,” they argued, surveillance directly targeting Americans is conducted only with court-approved warrants. Last week, anonymous officials told another news outlet that the government did not have a FISA warrant against at least one of the individuals named here during the timeframe covered by the spreadsheet.

The FISA process was enacted in 1978 in response to disclosures that J. Edgar Hoover and a long line of presidents from both parties had used U.S. intelligence agencies to spy on dissidents and political enemies. Intended to allow authorities to covertly investigate suspected spies or terrorists on U.S. soil, the surveillance is often used simply to gather intelligence, not to build a criminal case. The law was revised in 2008—in part to place limits on the controversial program of warrantless wiretaps initiated by George W. Bush after 9/11, and in part to legalize the program’s warrantless eavesdropping on Americans when they speak with foreign surveillance targets.

Under current law, the NSA may directly target a “U.S. person” (an American citizen or legal permanent resident) for electronic surveillance only with a warrant approved by the Foreign Intelligence Surveillance Court. Because the FISC operates in complete secrecy—only the Justice Department and the FBI are permitted to attend its proceedings on domestic surveillance—it is impossible to assess how the court applies the standard of “probable cause” in cases of suspected terrorism or espionage. But its rulings are notoriously one-sided: In its 35-year history, the court has approved 35,434 government requests for surveillance, while rejecting only 12.

Law enforcement officials familiar with the FISA process told The Intercept that the FISC’s high approval rate is the result of a thorough vetting process that weeds out weak applications before they reach the court. The system, they added, seeks to balance what they consider to be the essential role of surveillance in protecting national security with the civil liberties of potential targets. The NSA issued a statement that reads in part: “No U.S. person can be the subject of FISA surveillance based solely on First Amendment activities, such as staging public rallies, organizing campaigns, writing critical essays, or expressing personal beliefs.”

This excerpt from the FISA Recap spreadsheet includes highlighted entries for email accounts belonging to Nihad Awad and Faisal Gill.
A selection from the FISA Recap spreadsheet; the highlighted entries are email accounts belonging to Nihad Awad (the cair.com address) and Faisal Gill (the Yahoo! and AOL addresses).

But legal experts have long expressed concern that the secretive nature of the FISA process makes it impossible to know what level of evidence is actually used to authorize surveillance, precisely what it means to be an agent of a foreign power, or whether there is any effective oversight to protect civil liberties. “We have very little idea what this probable cause standard means in individual FISA cases,” says Patrick Toomey, a staff attorney for the National Security Project of the American Civil Liberties Union. “No FISA application or order has ever been publicly disclosed, even to a criminal defendant or his lawyer in cases where the government later brings charges based on that FISA surveillance.”

A former Justice Department official involved in FISA policy in the Obama Administration says the process contains too many internal checks and balances to serve as a rubber stamp on surveillance of Americans. But the former official, who was granted anonymity to speak candidly about FISA matters, acknowledges that there are significant problems with the process. Having no one present in court to contest the secret allegations can be an invitation to overreach. “There are serious weaknesses,” the former official says. “The lack of transparency and adversarial process—that’s a problem.”

Indeed, the government’s ability to monitor such high-profile Muslim-Americans—with or without warrants—suggests that the most alarming and invasive aspects of the NSA’s surveillance occur not because the agency breaks the law, but because it is able to exploit the law’s permissive contours. “The scandal is what Congress has made legal,” says Jameel Jaffer, an ACLU deputy legal director. “The claim that the intelligence agencies are complying with the laws is just a distraction from more urgent questions relating to the breadth of the laws themselves.”

Government agencies have invoked a host of legal theories over the years to justify spying on Americans without obtaining individual FISA warrants. Prior to mid-2008, for example, the NSA could target Americans when they were located on foreign soil simply by obtaining an authorization from the attorney general. The NSA also relies on the so-called “FISA backdoor” to read the emails of Americans communicating with foreign targets without obtaining a warrant, and engages in the bulk collection of “metadata” from Internet service providers without individual warrants. In other cases, it can obtain a warrant against an entire organization—and then monitor the emails of individuals allegedly associated with the group.

While the NSA documents do not prove that the government has been systematically monitoring the communications of political dissidents, Jaffer notes that some of the most abusive surveillance practices carried out by the FBI during the 1960s were arguably legal at a time when many Americans believed that the groups targeted by Hoover’s FBI—including anti-government activists on the left and right—posed a threat to the country.

“Some of the government’s surveillance practices today are reminiscent of those earlier abusive practices,” Jaffer says. “Today’s American-Muslim activists occupy the same position that civil-rights and anti-war activists occupied during the 1960s.”



Current and former law enforcement officials reject that analogy, and say that the FISA process is too rigorous to permit any abuse. Still, several acknowledge that political speech is sometimes viewed as a sufficient reason to launch an investigation that can culminate in full-blown surveillance.

“If you are a political activist calling for violent jihad—yes, that could trigger an investigation,” says Marion “Spike” Bowman, the top FBI lawyer whose office handled all law enforcement requests for FISA surveillance under the Clinton and Bush administrations. Bowman stresses that such investigations are launched only when the bureau believes that speech has crossed the line into incitement.

When Edward Snowden turned over a trove of NSA documents last year, he explained that he included the spreadsheet of monitored emails because he wanted to give people subjected to electronic surveillance the opportunity to challenge the spying as unconstitutional. For years, the government has succeeded in having such challenges dismissed on the ground that the various plaintiffs lack standing to sue because they could not prove that they were personally targeted.

Thanks to Snowden’s disclosures, those seeking to obtain such a ruling now have specific cases of surveillance against American citizens to examine. So do those charged with reforming the FISA process. Richard Clarke, a former counterterrorism official in the Clinton and Bush administrations, served on the recent White House intelligence review panel convened to address concerns raised by the Snowden revelations. If he had seen the NSA spreadsheet, Clarke says, he would have asked more questions about the process, and reviewed individual FISA warrants.

“Knowing that, I would specifically ask the Justice Department: How many American citizens are there active FISAs on now?” he says. “And without naming names, tell me what categories they fall into—how many are counterterrorism, counterintelligence, espionage cases? We’d want to go through [some applications], and frankly, we didn’t. It’s not something that five part-time guys can do—rummage through thousands of FISA warrants.”

The “FISA recap” spreadsheet offers a revealing if incomplete glimpse into the murky world of government surveillance. Each email address is accompanied by a date that appears to denote the beginning of surveillance, and another that indicates when it was set to expire. A column called “Collection Status” indicates whether the surveillance was “terminated,” “sustained,” or “pending” as of a particular date. In some cases, the spreadsheet also names the federal agency that requested the surveillance, and a terrorist group, target, or foreign power affiliated with the email address. In addition, each address has a corresponding “Case Notation” code beginning with the prefix “XX.SQF”—a designation that, according to other documents in the Snowden archive, is assigned to all “FISA accounts” as a unique identifier.

The five Americans whose email accounts were placed on the list come from different backgrounds, and hold different religious and political views. None was designated on the list as connected to a foreign power. Some have come under sharp public scrutiny for their activities on behalf of Muslim-Americans, and several have been investigated by the government. But despite being subjected to what appears to be long periods of government surveillance, none has been charged with a crime, let alone convincingly linked to terrorism or espionage on behalf of a foreign power. Taken together, their personal stories raise disturbing questions about who the government chooses to monitor, and why.



Faisal Gill

faisal

Gill is an American citizen whose parents emigrated from Pakistan when he was eight years old. He grew up in Northern Virginia, earned a law degree from American University in 1996, and joined the U.S. Navy. As a boy, he had dreamed of flying with the Blue Angels, but was disqualified as a pilot for poor eyesight. Instead, he became a JAG officer.

After leaving the Navy, Gill worked as a consultant for the American Muslim Council, which was founded by the political activist Abdul Rahman al-Amoudi to encourage participation by American Muslims in the political process. A Republican since high school, Gill joined the Bush Administration in the aftermath of 9/11, eventually moving to the White House Office of Homeland Security, where he briefly worked with Richard Clarke and obtained a top-secret security clearance. After roughly a year, he joined the Department of Homeland Security as a senior policy adviser, where he was cleared to access sensitive compartmented information, a classification level reserved for some of the nation’s most closely held secrets.

In 2003, al-Amoudi was arrested for participating in a Libyan plot to assassinate Saudi Crown Prince Abdullah and for illegal financial transactions with the Libyan government, crimes for which he eventually pleaded guilty. Because Gill’s name had turned up in al-Amoudi’s papers, he was investigated by DHS security officials and asked not to report to work pending the outcome. He told investigators that he had met al-Amoudi only three or four times and didn’t work closely with him during his time at the American Muslim Council. After passing a polygraph test, Gill says, he was told by DHS that he was “good to go” and returned to work.

Not long after that incident, Salon reporter Mary Jacoby wrote an article accusing Gill of failing to disclose his freelance work for the American Muslim Council on his application for a security clearance. (The clearance form asked for former employers; Gill, who had previously disclosed the consulting job to the White House and on a separate publicly available ethics disclosure, says he did not think he was being asked to list his freelance work.) The DHS again investigated Gill, and again cleared him of any wrongdoing. “Our investigation found no evidence to suggest that you falsified or intentionally omitted relevant information,” the acting inspector general informed Gill in a 2005 letter. He continued at DHS, he says, with full security clearance.

After leaving the government, Gill founded a law firm with his friend Asim Ghafoor. The NSA spreadsheet indicates that a year later, in April 2006, the email surveillance began. The agency apparently began monitoring a second email account of Gill’s in May 2007, the year he secured the Republican nomination for a seat in the Virginia House of Delegates. During that campaign, hardline neoconservatives in his own party—inspired by the work of the anti-Islamic pundit Frank Gaffney—resurrected the accusations that Gill had concealed allegedly nefarious ties to a Muslim group, provoking an outpouring of anti-Muslim animus. With the GOP divided over Gill’s candidacy, he narrowly lost the general election in November.

That same year, Gill and Ghafoor traveled to Sudan to meet with government officials there about representing the country in U.S. court. Many family members of victims of Al Qaeda terror attacks were suing the government of Sudan for aiding the operations; the white-shoe law firm Hunton & Williams was representing Sudan in similar litigation over the USS Cole attack, and Ghafoor wanted to pitch his services on the other cases. Ghafoor was ultimately retained, and Gill performed contract work on one case.

While Gill and Ghafoor both ended up being surveilled, none of the Hunton & Williams lawyers who represented Sudan appear to be listed in the NSA spreadsheet. Also missing from the list is any apparent mention of the multitude of American, non-Muslim politicians who have represented foreign governments, including former House Majority Leader Dick Gephardt (Turkey), former Senate Majority Leader Bob Dole (United Arab Emirates), former Rep. Bob Livingston (Libya), and former Clinton adviser Lanny Davis (Honduras post-coup).

Under U.S. law, Gill’s legal work for the Sudanese government could not have been used to justify targeting him for surveillance, absent any other evidence. “Representation of a foreign government in legal matters by itself does not make a U.S. lawyer an agent of a foreign power,” NSA spokesperson Vanee Vines said in a statement. According to the NSA spreadsheet, Gill’s surveillance was terminated in February 2008.

Asked whether he believes he would have been monitored by the NSA if he were not Muslim, Gill is blunt. “Absolutely not,” he says. “Look, I’ve never made an appearance or been a lawyer for anyone who’s been [associated with terrorism]. But there are plenty of other lawyers who have made those appearances and actually represented those governments, and their name isn’t Faisal Gill and they weren’t born in Pakistan and they aren’t on this list.”

Gill says he is deeply concerned by what the NSA was able to collect. “I’m sure there was private stuff with my wife where we were arguing about stuff, as well as emails of a more private nature,” he says. “Things that obviously I don’t want anyone looking at.”

Gill knows he faces a personal and professional risk in agreeing to discuss the government’s surveillance of his emails. “Maybe people will say, ‘Hey he was being surveilled—the government must have some reason for doing it, especially if there’s a FISA warrant.’ There will be a lot of folks who will say it was justified and there’s something there. I’m sure it’ll have some sort of negative impact with clients, and who knows what else.”

Despite those concerns, Gill agreed to discuss the surveillance. “The real reason I’m talking to you is that I don’t have anything to hide,” he says. “I didn’t do anything wrong. I served my country, the whole time.”



Asim Ghafoor

asim

Ghafoor was born in St. Louis in 1969. A first-generation American whose Muslim parents emigrated from India, he has been a lawyer for two decades.

In 1997, Ghafoor worked for a Texas state representative, Ciro Rodriguez, who won a special election to the U.S. Congress. Ghafoor moved to Washington and became Rodriguez’s legislative assistant. At the time, he says, he was only one of three Muslim staffers he knew of on Capitol Hill.

Ghafoor left government shortly before 9/11 to become a public relations consultant, lobbyist, lawyer, and civil rights advocate on behalf of American Muslims. In the climate of anxiety after the attacks, the need for representation and access for American Muslims in Washington rapidly expanded. Ghafoor became a prominent behind-the-scenes operator on Capitol Hill for the Muslim community.

In 2003, the Al Haramain Islamic Foundation, a Saudi charity, hired Ghafoor after its U.S. assets were frozen by the Treasury Department over claims that it funded terrorist operations. The government alleged that there were “direct links” between the U.S. branch of the charity and Osama bin Laden. Al Haramain had previously been represented by some of the biggest and most prestigious American law firms, including the D.C. powerhouse Akin Gump. Ghafoor’s work with Al Haramain led him to other controversial clients, including Mohammed Jamal Khalifa, a brother-in-law of Osama bin Laden who was the subject of FBI and CIA surveillance for years, as well as the government of Sudan.


In 2004, during the Al Haramain litigation, the Treasury Department accidentally provided one of the foundation’s lawyers with a top-secret call log showing that the government had been eavesdropping on Ghafoor’s calls with his clients. FBI agents quickly showed up to retrieve the document, and they took Ghafoor’s laptop for a week to “scrub” it of any trace of the classified information. At the time, neither Ghafoor nor Wendell Belew, the other attorney whose conversations were monitored, knew what to make of the log. The following year, when James Risen and Eric Lichtblau of The New York Times revealed the Bush Administration’s illegal wiretapping program, Ghafoor realized that his attorney-client conversations had been surveilled without a warrant.

“When I received a document that proved I had been tapped talking to my clients, I was shocked beyond belief,” Ghafoor recalls. “It’s like finding out there was a peeping tom. You just wonder: What else did they violate?”

The attorneys and Al Haramain sued the U.S. government, claiming that the eavesdropping violated their constitutional rights. After nearly five years of litigation, Ghafoor was awarded more than $20,000 in damages and the government was ordered to pay his legal fees of $2.5 million. Those judgments were later reversed on appeal, on the grounds that the law does not explicitly entitle those targeted by surveillance to damages from the government, even if they prove that the surveillance was illegal.

Ghafoor with President George W. Bush and Hillary Clinton (photos courtesy Asim Ghafoor)
Ghafoor with President George W. Bush and Hillary Clinton (photos courtesy Asim Ghafoor)

In a 2008 article that featured Ghafoor’s case, a Justice Department official told the Times that the government does not specifically target attorneys. “It’s not as if we’re targeting the lawyer for surveillance,” the official said. “It’s not like we’re eager to violate lawyer-client privilege. The lawyer is just one of the people whose calls from the suspect are being swept up.” Last February, in response to revelations that the NSA had monitored the communications of a U.S. law firm representing the government of Indonesia, then-NSA chief Keith Alexander assured the American Bar Association that the “NSA has afforded, and will continue to afford, appropriate protection to privileged attorney-client communications acquired during its lawful foreign intelligence mission.”

In Ghafoor’s case, however, the NSA appears to have gone beyond monitoring an attorney who represented clients in a case against the U.S. government. During the time he was monitored, from March 2005 until at least March 2008—at which point the NSA spreadsheet indicates that his surveillance was “sustained” for an unspecified period—Ghafoor was personally suing the government over its prior, illegal surveillance of his own communications.

The discovery that he was surveilled has not changed Ghafoor’s core views of his country. “I’m really proud to have grown up in the U.S.,” he says. “And if you ever tap my calls and read my emails you’ll see that even though I sued the government, I love my country. I love America.”

But Ghafoor has no doubts that he was placed under government surveillance because of his name, his religion, and his legal work. When he would go to court to represent Saudi interests, he points out, “there were over 40 lawyers from every blue-chip law firm in D.C. representing the Saudi government, Saudi princes—I’m not the only lawyer representing a foreign government.

“There were former Bush Administration officials representing Saudi entities, and I doubt their emails were tapped,” he continues. “And if they were, at some point some official would’ve said, ‘Why are we tapping [former Bush Justice Department official] Viet Dinh?’ I’d be shocked if they were tapping Viet Dinh. But Asim Ghafoor—’Oh, well he’s Muslim.’”



Agha Saeed

agha

Saeed has lived in the U.S. since 1974, when, as a graduate student in Pakistan, he was accepted to Iowa State University. He became an American citizen in 1982, then received a second masters degree from the University of California at Berkeley and a joint Ph.D. from Berkeley and Harvard’s Kennedy School of Government. For years, he taught in the communications and political science departments at Berkeley and California State University in Hayward.

For two decades, Saeed’s political activism has been largely devoted to organizing American Muslims to register to vote and to participate in the political process: “I am an American, I am a Muslim, and I vote,” he declared in one 2003 speech. He founded the American Muslim Alliance, which The New York Times described in October 2001 as “the main organization devoted to the political assimilation of the nation’s seven million Arab-Americans.” By 2009, the group grew to more than 100 chapters in more than 30 states, and Saeed met with high-ranking officials from both political parties.

In 2000, as chair of the American Muslim Political Coordination Council Political Action Committee, a coalition of four major Muslim organizations, Saeed announced the group’s endorsement of George W. Bush for president.

Agha Saeed (Image credit: Julie Plasencia/San Francisco Chronicle/Corbis)
Agha Saeed (Julie Plasencia/San Francisco Chronicle/Corbis)

On the day of the 9/11 attack, Saeed was in Washington, D.C. He was scheduled to meet that afternoon with President Bush in the White House, along with several other prominent American Muslim leaders. In the weeks after the attack, he was again invited by Bush to the White House. The Times described him as a symbol of moderation and assimilation who urged Arab-American cooperation with law enforcement authorities and preached “forbearance…to his constituents alarmed at all the investigative attention American Muslims have been garnering.”

Since 9/11, however, Saeed has emerged as a leading advocate against sweeping and secretive government surveillance. He was one of the principal organizers against the 2006 reauthorization of the Patriot Act, serving as a coordinator for the California Civil Rights Alliance, which persuaded the California legislature to enact a resolution calling for limitations on the law.

The only notable public controversy involving Saeed occurred in 2000, two days after the American Muslim Alliance announced its endorsement of Bush. The New York Daily News attempted to demonize a $50,000 donation the group made to Hillary Clinton’s Senate campaign by highlighting Saeed’s support for the right of Palestinians to armed resistance against occupation if peaceful means fail—a right affirmed in a series of resolutions by the United Nations General Assembly.

Yielding to pressure, Clinton quickly condemned the remarks and announced that she was returning the donation. Her GOP opponent, Rick Lazio, attacked her for receiving “blood money” and criticized her and her husband for having invited Muslim-Americans who opposed the Middle East peace process to the White House.

But even if Saeed had asserted that Palestinian violence is justified in response to Israeli occupation, such a statement could not legally be used to authorize surveillance under FISA. In the 1969 case Brandenburg v. Ohio, the U.S. Supreme Court unanimously ruled that “advocacy of the use of force” is protected by the First Amendment unless it is likely to incite imminent violence. In a statement to The Intercept, the NSA also emphasized that “no U.S. person can be found to be an agent of a foreign power based solely on activity protected by the First Amendment.”

According to the NSA spreadsheet, the agency’s surveillance of Saeed began in June 2007 and was still sustained as of May 2008.

Today, Saeed suffers from advanced Parkinson’s disease, making communications difficult. Via email, he told The Intercept that he believes he was placed on the NSA list because of his political activism and his friendship with controversial figures such as Sami Al-Arian, a former University of South Florida professor and activist who pleaded guilty to a conspiracy to aid the militant group Palestinian Islamic Jihad in a case that many civil libertarians regard as prosecutorial overreach motivated by anti-Muslim hysteria.

“The government is always looking for a pretext to surveil people who are critical of policy,” Saeed said by telephone, with the help of an interpreter who can decipher his muffled speech. “Now it has become common to accuse people of Islamist ties to do this; before, it was communism and leftists. The FBI has questioned me over both these things in my lifetime. In the 1980s they were suspicious of me over my opposition to arming Afghan Islamists; now they accuse me of being an Islamist.”



Nihad Awad

nihad

Awad is the co-founder and executive director of the Council on American-Islamic Relations, the nation’s largest Muslim civil rights organization. A Palestinian born in Jordan, he was naturalized as an American citizen and has lived in the U.S. for more than two decades.

Awad has worked with U.S. officials at the highest levels. In 1997, he served on Vice President Al Gore’s Civil Liberties Advisory Panel to the White House Commission on Aviation Safety and Security, and he has personally met with Presidents Clinton and Bush, as well as former Secretaries of State Madeleine Albright and Colin Powell, to discuss issues relating to the American Muslim community. A few days after 9/11, Awad was one of the few American Muslim leaders who participated in a press conference with President Bush at the Islamic Center of Washington.


“I’m outraged as an American citizen that my government, after decades of civil rights struggle, still spies on political activists and civil right activists and leaders,” says Awad. “I’m really angry that despite all the work that we have been doing in our communities to serve the nation, we are treated with suspicion.”

The bulk of CAIR’s work is devoted to protecting the civil liberties of Muslim-Americans. (Full disclosure: Glenn Greenwald, a co-author of this story, has given paid speeches before CAIR’s regional affiliates.) The group frequently provides legal counsel to those who believe their rights have been infringed, and litigates constitutional challenges to state and federal laws. Awad says he is particularly incensed about the surveillance given the close cooperation that CAIR has provided the U.S. government in denouncing violent extremism. “The government knows very well that I am not a foreign agent,” he says.

Despite its political moderation and relationship to federal law enforcement agencies, CAIR became a primary target of hardline neoconservatives after 9/11. In 2007, the Justice Department named the group as one of more than 300 “unindicted co-conspirators” in its controversial prosecution of the Holy Land Foundation, then the largest Muslim charity in the U.S., which was eventually convicted of providing material support to Hamas. The Justice Department later attempted to justify its inclusion of CAIR by referring to wiretap evidence showing that in 1993, a Palestinian advocacy group that prosecutors believed was linked to Hamas met in a Philadelphia hotel and talked about founding CAIR. In 1994, Awad voiced public support for Hamas—before the group’s campaign of suicide attacks against civilians and subsequent placement on the State Department’s terrorist list in 1997.

“I do not support Hamas,” Awad says today, pointing out that the group was not involved in terrorist activities at the time he made the statement. “It was not on the list of organizations that sponsor or conduct terrorism by the State Department. And when the organization took those acts, CAIR has condemned it, repeatedly.”

Awad’s surveillance appears to have coincided with the timing of the Holy Land Foundation case: It began in July 2006, and two other email accounts belonging to Awad were added in September and November of that year. The surveillance is marked “terminated” as of February 2008.

The government’s denunciation of CAIR as an “unindicted co-conspirator” cast the group in a nefarious light while denying it the opportunity to defend itself in court. It also caused the FBI to terminate its formal community outreach efforts with the group in 2008, despite the fact that, as The Christian Science Monitor reported, “CAIR itself has never been charged with any wrongdoing.”

Awad cites how much scrutiny the group has received, combined with the fact that it has never been charged with a crime, as proof of its purely civic and legal activities. “Our door has been open for 20 years,” he says. “The government—obviously from the scrutiny we have seen so far—they know everything. And they know perfectly well that we are a transparent, above-the-board, American, true success story.”

Nonetheless, CAIR and its leaders have been publicly maligned as terrorist supporters by the Muslim-focused fringes of the far right, led by activists such as Frank Gaffney, Pamela Geller, and Daniel Pipes. FBI sources told The Intercept that CAIR is still on the government’s “radar screen,” and it was one of the primary targets of a 2011 investigation led by GOP Rep. Peter King into what he called the “radicalization of the American Muslim community.” The New York Times denounced those hearings as spreading “fear and bigotry” and seemingly “designed to stoke fear against American Muslims,” while Slate labeled them “Muslim McCarthyism.”

“I think all Americans should be worried about NSA surveillance and the targeting of American Muslims,” Awad says. “Because if it is American Muslims today, it is going to be them next. ”



Hooshang Amirahmadi

hooshang

Amirahmadi is a professor at Rutgers University, where he has been on the faculty since 1983, and is the former director of the school’s Center for Middle Eastern Studies. He is also the founder and president of the American Iranian Council, a nonprofit group devoted to public policy research on the relationship between the U.S. and Iran, and the president of Caspian Associates, a consulting firm that works with developing nations.

The AIC is affiliated with many senior U.S. government officials and diplomats. Its honorary board includes former Health and Human Services Secretary Donna Shalala and former Deputy Secretary of State Thomas Pickering, and its board of directors include former Senator J. Bennett Johnston and former Assistant Secretary of State Richard Murphy. Past directors include Cyrus Vance and Sargent Shriver. Vice President Joe Biden, Madeleine Albright, Secretary of State John Kerry, and Secretary of Defense Chuck Hagel have all spoken at events organized by Amirahmadi.

Hooshang Amirahmadi (Julia Cortez/AP)
Hooshang Amirahmadi (Julia Cortez/AP)

Amirahmadi has dual citizenship as an American and an Iranian. A secularist, he has twice launched quixotic candidacies to become the president of Iran (in 2005 and again in 2013) as a statement against the Iranian political establishment. He was prevented both times from appearing on the ballot by the Guardian Council, which controls the election process in Iran.

Amirahmadi holds many Western liberal views, describing homosexuality as a “non-problem” and pledging during his last campaign to name a female vice president. He has said that “every Iranian citizen regardless of their religion, ethnicity, race, color, gender … are equal in front of the law.” He has been a strong advocate for improving ties between the U.S. and Iran, and he vehemently opposes any attempt by Iran to acquire a nuclear weapon. He also recognizes the validity of Israel’s right to exist as a sovereign state. “Israel is a reality,” he says. “It has to be recognized as a reality.”

But mixed in with those conventional pro-Western views, Amirahmadi has voiced substantial dissent from America’s foreign policy toward Iran. Much of his work within the U.S. foreign policy community, in fact, has been devoted to persuading high-level officials that sanctions against Iran, as well as external efforts to bring about regime change, will backfire. In 2007, he defended the regime of Iranian president Mahmoud Ahmadinejad, claiming in an interview that Iranian connections to terrorism are a “myth” and that “Hezbollah and Hamas are not terrorist organizations, they are defending their country and their nations.” Last year conservative media outlets seized on those comments to mount a campaign against Hagel’s nomination as defense secretary, claiming that his association with Amirahmadi should disqualify him.

The Wall Street Journal editorial page and other neoconservative outlets also criticized Amirahmadi’s connections to the Alavi Foundation, a U.S. charity that federal investigators believe is controlled by Iran. The foundation donated money to Amirahmadi’s program at Rutgers, and has made similar contributions to Persian culture programs at Harvard University, Columbia University, and other schools.

Leaders in the Iranian expatriate community say privately that Amirahmadi cultivated ties to the Ahmadinejad regime in order to raise his profile as a potential broker of détente between the U.S. and Iran. The sources also note that he was in regular contact with the State Department over the past decade, and was an unlikely candidate for the role of foreign spy.

Amirahmadi, who does not self-identify as a Muslim and describes himself as an atheist, believes that the NSA surveillance was motivated by his diplomatic work, not his religious heritage. While he considers the surveillance to be illegal and has no objection to it being made public, he declined to comment further on the matter. His surveillance began in August 2007, with a second email account added in November of that year and a third in February 2008. The government’s apparent monitoring of Amirahmadi’s emails was still marked as “sustained” as of May 2008.



Even if the government obtained FISA warrants to monitor some or all of the five Muslim-Americans, the law’s standards do not always appear to be applied uniformly. More than a dozen former and current law enforcement officials contacted by The Intercept say that the process for seeking a FISA warrant is so bureaucratically complex and larded with privacy safeguards that it is essentially inviolate. If the surveillance court approved a warrant, they say, then the target must have deserved it.

“The Justice Department was notoriously difficult to get a FISA warrant through,” says Bowman, the top FBI lawyer for national security matters from 1995 to 2006. “They always wanted more than probable cause. And so they would frequently, at least 50 percent of the time, send it back [to the FBI] with questions.”

According to Bowman, whose office handled all requests for domestic FISA surveillance throughout the intelligence community, requests for warrants involve multiple stages of approval. Starting at an FBI field office, a request moves up through FBI supervisory agents at headquarters and attorneys at the bureau’s National Security Branch, then on to the Justice Department’s Office of Intelligence—with the various gatekeepers frequently rejecting applications or sending them back for further review. It is only once all the hurdles have been cleared, Bowman says, that the Justice Department prepares a formal application “package” for a judge with the Foreign Intelligence Surveillance Court.

Those packages, Bowman says, range anywhere from 35 to 150 pages. The warrant applications are supposed to establish probable cause that a target is an agent of a foreign power and is engaged in—or about to engage in—one of what Bowman calls the “three crimes” spelled out by the FISA statute: an actual or potential attack or other grave hostile act, sabotage or international terrorism, or clandestine intelligence activities. The standard for probable cause used by the court, Bowman adds, is “more than a suspicion, but less than a certainty.”

Taken together, he says, the hurdles and safeguards prevent any potential abuse. “I’ve never seen the FBI in my experience in the 11 years I was there, ever begin an investigation strictly on political issues,” Bowman says.

But one former law enforcement official paints a different picture of the process. FISC judges who approve the warrants, he says, often rely implicitly on the claims of the agents seeking them. “I got a lot of warrants signed by a judge at 2 a.m., in his pajamas in his living room. The judge would size you up, and if he believed you that you had probable cause, he would sign the warrant.”

One current senior federal prosecutor who has participated in high-level counterterrorism and intelligence cases also describes a looser standard for obtaining a FISA warrant. The process, he says, requires only that the government establish probable cause that the target meets a broad definition as an “agent of a foreign power”—not that they are actually engaged in terrorism, espionage, sabotage, or other criminal activity.

“If you are dealing with a foreign power, I don’t think you have any choice,” says the prosecutor. “I don’t believe it is realistic to say that you can only get a FISA when you have probable cause that an agent of a foreign power is committing a crime—because you’ll never know. And often the best way to figure out what is going on is not to prosecute them criminally, but to just watch what they do.”

Such a standard, law enforcement officials say, takes advantage of what amount to loopholes in the FISA law, which requires that warrants demonstrate probable cause that an agent of a foreign power is engaged in activities that “involve or may involve” criminal activity, are “about to involve” criminal activity, or constitute aiding someone who is. In a statement to The Intercept, an NSA spokesperson confirmed that warrants must demonstrate probable cause that targets “are or may be engaged in certain criminal activity … on behalf of a foreign power.”

Asked how many Americans could currently be under FISA surveillance given the looser guidelines he cites, the prosecutor is unequivocal. “I would think it would be a large number of people,” he says.



Whatever the merits of the process, it is clear that at least some of the law enforcement officials involved in it harbored conspiratorial and bigoted views about Americans of Muslim descent. John Guandolo, the former counterterrorism agent who was active at the time several of the five identified Americans were monitored, provides a candid view of that mindset. Asked by The Intercept about the men, he responded with a series of uncorroborated accusations, suggesting that many of them are part of a vast Muslim conspiracy to infiltrate and topple the United States from within.

To hear Guandolo tell it, Faisal Gill, the former homeland security official under Bush, was “a major player in the Muslim Brotherhood in the United States.” Asim Ghafoor, Gill’s fellow attorney, is “a jihadi” who was “directly linked to Al Qaeda guys” simply because of his representation of the Al Haramain Foundation. “He had knowledge of who they were and what they were doing,” Guandolo says. (Such logic would subject every lawyer representing defendants accused of terrorism to government surveillance.) To Guandolo, Agha Saeed was yet another secret operative for the Muslim Brotherhood. “He’s a pretty senior guy with them,” Guandolo says, “affiliated with several groups.” (“That’s a big lie,” Saeed says, “and given my life history, absurd” because he has “always been a leftist.”)

Such far-fetched accusations don’t bear serious scrutiny, given Guandolo’s increasingly bizarre and paranoid views since leaving the FBI. (Last year, for instance, he told a talk-radio host that CIA director John Brennan secretly converted to Islam and is a tool of Saudi intelligence.) But during his tenure at the FBI, Guandolo worked on cases to obtain FISA warrants, and his anti-Islamic views were deemed acceptable enough to be reflected in basic training materials within the bureau.

Numerous other current and former agents interviewed about the surveillance process say it’s possible that the overseas connections and political beliefs of the five Americans played a role in arousing suspicions. They cite Ghafoor’s representation of Al Haramain at a time when it was under so many terrorism investigations, and Amirahmadi’s ties to Iran at a time when the country was a major target of NSA surveillance because of its suspected nuclear weapons program and support for terrorist organizations.

One former FBI counterterrorism agent also said that Saeed’s speech echoing the UN resolution on Palestinian armed resistance likely helped lead the bureau to launch an investigation against him, although the government surveillance began seven years after that statement. While the comments alone wouldn’t have been enough to secure FISA authorization for electronic surveillance, the remarks may have been viewed as sufficient to get the process started.

Law enforcement officials say that the FBI’s interest in Gill was likely sparked by the smear campaign waged against him by neoconservatives. And they also cite Nihad Awad’s political comments and connections—including the public support that he offered for Hamas and the accusations against CAIR stemming from the Holy Land Foundation Case—as enough in the FBI’s eyes to merit an investigation that could lead to surveillance.



Asked about the document that refers to a potential target of FISA surveillance as a “raghead,” an NSA spokeswoman said the agency “has not and would not approve official training documents that include insulting or inflammatory language. Any use of racial or ethnic stereotypes, slurs, or other similar language by employees is both unacceptable and inconsistent with NSA policy and core values.”

The Justice Department did not respond to repeated requests for comment on this story, or for clarification about why the five men’s email addresses appear on the list. But in the weeks before the story was published, The Intercept learned that officials from the department were reaching out to Muslim-American leaders across the country to warn them that the piece would contain errors and misrepresentations, even though it had not yet been written.

Prior to publication, current and former government officials who knew about the story in advance also told another news outlet that no FISA warrant had been obtained against Awad during the period cited. When The Intercept delayed publication to investigate further, the NSA and the Office of the Director of National Intelligence refused to confirm or deny the claim, or to address why any of the men’s names appear on the FISA spreadsheet. Prior to 2008, however, FISA required only an authorization from the attorney general—not a court warrant—for surveillance against Americans located overseas. Awad frequently travelled to the Middle East during the timeframe of his surveillance.

Whatever the specific reasons and methods used to monitor the five men’s emails, the surveillance against them took place during the chaos and fear that enveloped the national security community in the years after 9/11. The Clinton Administration had avoided investigating potential links between Muslim charities and suspected terrorists, and the FBI was scrambling to catch up and scrutinize dozens of organizations on the orders of the Bush Administration. Those probes led to some prosecutions and convictions, but they also generated a huge backlash of criticism for targeting innocent groups. One former law enforcement official said that, while the FBI was diligent in trying to hew to the law, there may have been “some missteps” along the way.

Those missteps have landed heavily on Americans of Muslim heritage. Even when the surveillance process is overseen by officials and judges who don’t share the Islamophobic mindset of John Guandolo, mainstream and constitutionally protected forms of activism by American Muslims have come to be seen by some within the intelligence community as potentially dangerous—a dynamic that raises the potential for abuse, especially when warrants are issued in secret and authorized by a law that gives wide latitude to those seeking them. A Washington Post report earlier this week found that the government used FISA procedures to intercept and retain vast amounts of private data belonging to “ordinary internet users” who had no evident connection to terrorism or espionage and had been “caught in a net the [NSA] had cast for somebody else.”

Asim Ghafoor says his first-hand experience working on behalf of other Muslim-Americans has led him to believe that “the U.S. government embarked on a very systematic approach” to target his community.

“I saw the government specifically go after Muslim people who were involved in certain activities such as charity work, humanitarian work, political activism,” he says. “Maybe they had some website that had some speeches that nobody ever read or even noticed, maybe they had some bloodcurdling speeches. So the government just treated you like you were blowing up the next tower. They treated you like you were going to be the Manchurian Candidate, you were going to destroy America from within. There were U.S. attorneys, FBI agents, DHS agents, customs agents all over the country that were trying to find the next terror cell in their midst. If you were involved in those activities and maybe you were on a student visa and you didn’t quite fill out the paperwork, you were hosed. There is no question about it, you were worse off than a migrant worker in Dubai. You were just packed up and sent home. Life became very, very unbearable for them.”

Even a U.S. citizen like Faisal Gill, who served his country both in the armed forces and in the White House, found himself spied on by his own government. “I was a very conservative, Reagan-loving Republican,” he says. “If somebody like me could be surveilled, then [there are] other people out there I can only imagine who are under surveillance.

“I went to school here as a fourth grader – learned about the Revolutionary War, learned about individual rights, Thomas Jefferson, all these things,” he continues. “That is ingrained in you – your privacy is important. And to have that basically invaded for no reason whatsoever – for the fact that I didn’t do anything – I think that’s troubling. And I think that certainly goes to show how we need to shape policy differently than it is right now.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Thu Jul 10, 2014 8:34 am

THURSDAY, JUL 10, 2014 06:43 AM CDT
First Amendment’s racial tumult: Why Greenwald’s latest revelation matters
We're now wiretapping minority groups -- just as we once did with African-Americans. Here's what we've become
MARCY WHEELER


First Amendment's racial tumult: Why Greenwald's latest revelation matters
Edward Snowden, Glenn Greenwald (Credit: AP/Kin Cheung)
In a much-anticipated story, the Intercept has profiled five Muslim-Americans who were wiretapped under FISA. Of the five, four are affiliated with — in two cases the founders of — Muslim-American civil society organizations, including the Council on American-Islamic Relations (the nation’s largest Muslim civil rights organization), the American Muslim Council, the American Muslim Alliance and the American-Iranian Council. The fifth person profiled represented Muslim organizations, including a charity accused of ties to terrorism, in legal matters.

The Intercept story raises the specter that the government has resumed wiretapping civil society organizations representing minorities, just as it did when it surveilled African-American groups under COINTELPRO.

The Department of Justice and the Office of the Director of National Intelligence released a statement today, denying a claim the Intercept did not make explicitly (and making no mention of the article) that these men were spied on because of their First Amendment protected activity. “It is entirely false that U.S. intelligence agencies conduct electronic surveillance of political, religious or activist figures solely because they disagree with public policies or criticize the government, or for exercising constitutional rights.” The Intercept instead suggests that these men were wiretapped because of their associations plus their Muslim descent.

The DOJ/ODNI statement goes on to claim no one can be surveilled for First Amendment activities – some First Amendment activities, that is — specifically. “No U.S. person can be the subject of surveillance based solely on First Amendment activities, such as staging public rallies, organizing campaigns, writing critical essays, or expressing personal beliefs.”

Of course, that formulation leaves out several parts of the First Amendment, such as religion (though they mentioned that earlier in the statement) and association, which goes unmentioned in the statement.

ADVERTISEMENT

That’s significant because the government has argued that it may spy on people because of association via communication. In a 2008 memo describing who could be spied on under the phone and Internet dragnets, for example, it argued freedom of association was just an “extension of the other constitutional protections” under the First Amendment. Based on that claim, the government protections against spying for First Amendment reasons “are not intended … to preclude entirely the conclusion of association based on communications contact observed in communications metadata.”

In other words, the government has maintained that it can spy on Americans based on whom they talk to via email or on the phone.

Tellingly, that memo does not appear to cite a 1957 Supreme Court case, NAACP v. Alabama, which protects the membership of formal organizations like the African-American civil rights group — and like these Muslim-American organizations. The NAACP decision held that “the right of the members to pursue their lawful private interests privately and to associate freely with others in so doing … come[s] within the protection of the Fourteenth Amendment.”

While the government’s response to the Intercept story suggests the government claims to respect specific actions — staging a public rally — it’s not clear that its spying respects the right to belong to organizations that do such things.

All that is particularly important given the government’s reported spying on Nihad Awad, the co-founder and executive director of CAIR, from 2006 until 2008. During that same period, DOJ included CAIR on a list of “unindicted co-conspirators” in a material support for terrorism case; a judge later found release of the list violated CAIR’s Fifth Amendment rights. The FBI also refused to turn over records it held on CAIR under a FOIA request.

Just as important, CAIR is already suing the government based on a First Amendment claim to association rights. It is a named plaintiff in the Electronic Frontier Foundation lawsuit challenging NSA’s phone dragnet. The suit argues that by collecting all the phone records of the plaintiffs – which show both their own communications and those they advocate on behalf of – has harmed their ability to engage in that advocacy.

According to the dragnet orders, Awad’s targeting under FISA means his phone number (and presumably email addresses) could be used to seed the phone dragnet with no further approval process. It’s likely, then, that the government not only collected Awad’s email content, but mapped his contacts, as well as anyone three degrees of separation from him. It’s likely, that is, the government mapped out the associations of CAIR going back to 2006.

Just before the Intercept published this article last week, the government told journalists it never had a FISA warrant on Awad, in spite of the NSA spreadsheet showing it had, which delayed the publication of the story.

It’s possible, however, that DOJ’s refusal to comment about Awad’s targeting — and its careful silence about freedom of association — stems from a hope it can avoid litigating the question of whether NSA can spy on Americans because of their associations, whether they be emails to someone targeted by the government, or aggressive advocacy for a target’s rights.

Note, DOJ already destroyed the records that would have covered this period; EFF claims it did so in violation of a protection order issued in 2008.

In the 1970s, the FBI got caught spying on advocacy organizations, particularly those advocating for the rights of African-Americans. Because of this Intercept story, we may well find out whether it believes it has a legal right to do so still.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Thu Jul 17, 2014 5:50 pm

Snowden reports NSA employees intercept, share private nude photos
BY ZACH HONIG @ZACHHONIG 3 HOURS AGO


Edward Snowden is currently holed up in Russia, but the Guardian recently paid him a visit, and today published an interview today in which the former government contractor discussed numerous privacy violations, including the "routine enough" practice of intercepting nude photos shared privately through email and other means. According to Snowden, NSA employees come across nude photos on a regular basis, but rather than labeling such content as irrelevant, they often pass it along to colleagues. "They turn around in their chair and they show their co-worker. And their co-worker says: 'Oh hey, that's great. Send that to Bill down the way.' And then Bill sends it to George, George sends it to Tom. And sooner or later this person's whole life has been seen by all of these other people."

Snowden reports that violations are often overlooked, with management unaware of specific instances due to the weak auditing in place with individual employee computers. In fact, he states that access to such content is seen as a "fringe benefit" of working in a surveillance position. You'll likely disagree. "The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communications stream, from the intended recipient and given to the government without any specific authorization, without any specific need, is itself a violation of your rights." You can see more in this excerpt of Snowden's Guardian interview. The unabridged version is due to appear tomorrow.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Sat Jul 26, 2014 10:16 pm

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police
By Glenn Greenwald and Murtaza Hussain25 Jul 2014, 4:19 PM EDT 167

Image
Featured photo - The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police Barack Obama and Saudi Arabia's King Abdullah in 2010. Photo credit: Ron Edmonds/AP
The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters.

The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.

But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration’s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI, the memo describes “a period of rejuvenation” for the NSA’s relationship with the Saudi Ministry of Defense.

In general, U.S. support for the Saudi regime is long-standing. One secret 2007 NSA memo lists Saudi Arabia as one of four countries where the U.S. “has [an] interest in regime continuity.”

But from the end of the 1991 Gulf War until recently, the memo says, the NSA had a “very limited” relationship with the Saudi kingdom. In December 2012, the U.S. director of national intelligence, James Clapper, authorized the agency to expand its “third party” relationship with Saudi Arabia to include the sharing of signals intelligence, or “SIGINT,” capability with the MOD’s Technical Affairs Directorate (TAD).

“With the approval of the Third Party SIGINT relationship,” the memo reports, the NSA “intends to provide direct analytic and technical support to TAD.” The goal is “to facilitate the Saudi government’s ability to utilize SIGINT to locate and track individuals of mutual interest within Saudi Arabia.”

Even before this new initiative in 2012, the CIA and other American intelligence agencies had been working with the Saudi regime to bolster “internal security” and track alleged terrorists. According to the memo, the NSA began collaborating with the MOD in 2011 on a “sensitive access initiative… focused on internal security and terrorist activity on the Arabian Peninsula”; that partnership was conducted “under the auspices of CIA’s relationship with the MOI’s Mabahith (General Directorate for Investigations, equivalent to FBI).”

The NSA’s formal “Third Party” relationship with the Saudis involves arming the MOI with highly advanced surveillance technology. The NSA “provides technical advice on SIGINT topics such as data exploitation and target development to TAD,” the memo says, “as well as a sensitive source collection capability.”

The Saudi Ministry of Defense also relies on the NSA for help with “signals analysis equipment upgrades, decryption capabilities and advanced training on a wide range of topics.” The document states that while the NSA “is able to respond to many of those requests, some must be denied due to the fact that they place sensitive SIGINT equities at risk.”

Over the past year, the Saudi government has escalated its crackdown on activists, dissidents, and critics of the government. Earlier this month, Saudi human rights lawyer and activist Waleed Abu al-Khair was sentenced to 15 years in prison by a so-called “terrorist court” on charges of undermining the state and insulting the judiciary. In May, a liberal blogger, Raif Badawi, was sentenced to 10 years in prison and 1,000 lashes; in June, human rights activist Mukhlif Shammari was sentenced to five years in prison for writing about the mistreatment of Saudi women.

At the time of the al-Khair sentencing, State Department spokesperson Jen Psaki issued a statement saying, “We urge the Saudi government to respect international human rights norms, a point we make to them regularly.”

Asked if the U.S. takes human rights records into account before collaborating with foreign security agencies, a spokesman for the office of the director of national intelligence told The Intercept: “Yes. We cannot comment on specific intelligence matters but, as a general principle, human rights considerations inform our decisions on intelligence sharing with foreign governments.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Mon Jul 28, 2014 8:55 am

Report: FISC judges own stock in telecoms they let NSA access
Disclosures given to Vice show two judges with Verizon shares, but the ethics are gray.

by Nathan Mattise - July 27 2014, 6:35pm CDT
GOVERNMENT NATIONAL SECURITY

Two years ago, the acronyms FISC or FISA would require a majority to frantically hit the Google search. But thanks to Edward Snowden and his leaked information regarding the NSA, the general public is now aware of the domestic-based Foreign Intelligence Surveillance Court's role: approving all government requests to engage in its various spying initiatives.

This weekend, Vice discovered an unusual, additional role for two FISC judges—stakeholder. According to 2013 financial disclosures obtained by the website, FISC Judge Susan Wright and FISC Judge Dennis Saylor each owned Verizon stock. Wright purchased (Scribd) $15,000 or less on October 22 and Saylor collected (Scribd) less than $1,000 from his stock in 2013. (As Vice notes, "the precise amount and value of each investment is unclear—like many government ethics disclosures, including those for federal lawmakers, investments amounts are revealed within certain ranges of value.)


TOP SECRET DOC SHOWS NSA DEMANDS VERIZON HAND OVER MILLIONS OF PHONE RECORDS DAILY
The Guardian unearths an order making surveillance of Americans trivial.
There is an ethics law for federal judges that, among other things, requires judges to avoid cases where they have a financial stake or where they may act in bias. This scenario isn't quite that clear-cut. While FISC absolutely ruled on situations involving Verizon, Vice points out FISC proceedings are ex parte. Telecoms may absolutely have a stake in these FISC rulings, but they aren't an active party for the NSA requests FISC rules on.
The website pointed out that FISC judges in the past have also owned telecom stock, though Verizon is the only named telecom in the NSA leaks to comply so far. Vice's requests for comment to the direct judges went unanswered as expected, but legal ethicists speaking to the site recommended the best solution is simply steering clear of such gray situations in the first place.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Criminal N.S.A.

Postby seemslikeadream » Tue Aug 26, 2014 8:39 am

Image

NEWS
The Surveillance Engine: How the NSA Built Its Own Secret Google
By Ryan Gallagher25 Aug 2014, 1:09 PM EDT 82
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.

ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden.

Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.

Image

ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. A planning document from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA documents.

“The ICREACH team delivered the first-ever wholesale sharing of communications metadata within the U.S. Intelligence Community,” noted a top-secret memo dated December 2007. “This team began over two years ago with a basic concept compelled by the IC’s increasing need for communications metadata and NSA’s ability to collect, process and store vast amounts of communications metadata related to worldwide intelligence targets.”

The search tool was designed to be the largest system for internally sharing secret surveillance records in the United States, capable of handling two to five billion new records every day, including more than 30 different kinds of metadata on emails, phone calls, faxes, internet chats, and text messages, as well as location information collected from cellphones. Metadata reveals information about a communication—such as the “to” and “from” parts of an email, and the time and date it was sent, or the phone numbers someone called and when they called—but not the content of the message or audio of the call.

ICREACH does not appear to have a direct relationship to the large NSA database, previously reported by The Guardian, that stores information on millions of ordinary Americans’ phone calls under Section 215 of the Patriot Act. Unlike the 215 database, which is accessible to a small number of NSA employees and can be searched only in terrorism-related investigations, ICREACH grants access to a vast pool of data that can be mined by analysts from across the intelligence community for “foreign intelligence”—a vague term that is far broader than counterterrorism.

Image

Data available through ICREACH appears to be primarily derived from surveillance of foreigners’ communications, and planning documents show that it draws on a variety of different sources of data maintained by the NSA. Though one 2010 internal paper clearly calls it “the ICREACH database,” a U.S. official familiar with the system disputed that, telling The Intercept that while “it enables the sharing of certain foreign intelligence metadata,” ICREACH is “not a repository [and] does not store events or records.” Instead, it appears to provide analysts with the ability to perform a one-stop search of information from a wide variety of separate databases.

In a statement to The Intercept, the Office of the Director of National Intelligence confirmed that the system shares data that is swept up by programs authorized under Executive Order 12333, a controversial Reagan-era presidential directive that underpins several NSA bulk surveillance operations that monitor communications overseas. The 12333 surveillance takes place with no court oversight and has received minimal Congressional scrutiny because it is targeted at foreign, not domestic, communication networks. But the broad scale of 12333 surveillance means that some Americans’ communications get caught in the dragnet as they transit international cables or satellites—and documents contained in the Snowden archive indicate that ICREACH taps into some of that data.

Legal experts told The Intercept they were shocked to learn about the scale of the ICREACH system and are concerned that law enforcement authorities might use it for domestic investigations that are not related to terrorism.

“To me, this is extremely troublesome,” said Elizabeth Goitein, co-director of the Liberty and National Security Program at the New York University School of Law’s Brennan Center for Justice. “The myth that metadata is just a bunch of numbers and is not as revealing as actual communications content was exploded long ago—this is a trove of incredibly sensitive information.”

Brian Owsley, a federal magistrate judge between 2005 and 2013, said he was alarmed that traditional law enforcement agencies such as the FBI and the DEA were among those with access to the NSA’s surveillance troves.

“This is not something that I think the government should be doing,” said Owsley, an assistant professor of law at Indiana Tech Law School. “Perhaps if information is useful in a specific case, they can get judicial authority to provide it to another agency. But there shouldn’t be this buddy-buddy system back-and-forth.”

Jeffrey Anchukaitis, an ODNI spokesman, declined to comment on a series of questions from The Intercept about the size and scope of ICREACH, but said that sharing information had become “a pillar of the post-9/11 intelligence community” as part of an effort to prevent valuable intelligence from being “stove-piped in any single office or agency.”

Using ICREACH to query the surveillance data, “analysts can develop vital intelligence leads without requiring access to raw intelligence collected by other IC [Intelligence Community] agencies,” Anchukaitis said. “In the case of NSA, access to raw signals intelligence is strictly limited to those with the training and authority to handle it appropriately. The highest priority of the intelligence community is to work within the constraints of law to collect, analyze and understand information related to potential threats to our national security.”

One-Stop Shopping

The mastermind behind ICREACH was recently retired NSA director Gen. Keith Alexander, who outlined his vision for the system in a classified 2006 letter to the then-Director of National Intelligence John Negroponte. The search tool, Alexander wrote, would “allow unprecedented volumes of communications metadata to be shared and analyzed,” opening up a “vast, rich source of information” for other agencies to exploit. By late 2007 the NSA reported to its employees that the system had gone live as a pilot program.

The NSA described ICREACH as a “one-stop shopping tool” for analyzing communications. The system would enable at least a 12-fold increase in the volume of metadata being shared between intelligence community agencies, the documents stated. Using ICREACH, the NSA planned to boost the amount of communications “events” it shared with other U.S. government agencies from 50 billion to more than 850 billion, bolstering an older top-secret data sharing system named CRISSCROSS/PROTON, which was launched in the 1990s and managed by the CIA.

To allow government agents to sift through the masses of records on ICREACH, engineers designed a simple “Google-like” search interface. This enabled analysts to run searches against particular “selectors” associated with a person of interest—such as an email address or phone number—and receive a page of results displaying, for instance, a list of phone calls made and received by a suspect over a month-long period. The documents suggest these results can be used reveal the “social network” of the person of interest—in other words, those that they communicate with, such as friends, family, and other associates.

https://prod01-cdn02.cdn.firstlook.org/ ... number.png[img]
[/img]The purpose of ICREACH, projected initially to cost between $2.5 million and $4.5 million per year, was to allow government agents to comb through the NSA’s metadata troves to identify new leads for investigations, to predict potential future threats against the U.S., and to keep tabs on what the NSA calls “worldwide intelligence targets.”

However, the documents make clear that it is not only data about foreigners’ communications that are available on the system. Alexander’s memo states that “many millions of…minimized communications metadata records” would be available through ICREACH, a reference to the process of “minimization,” whereby identifying information—such as part of a phone number or email address—is removed so it is not visible to the analyst. NSA documents define minimization as “specific procedures to minimize the acquisition and retention [of] information concerning unconsenting U.S. persons”—making it a near certainty that ICREACH gives analysts access to millions of records about Americans. The “minimized” information can still be retained under NSA rules for up to five years and “unmasked” at any point during that period if it is ever deemed necessary for an investigation.

The Brennan Center’s Goitein said it appeared that with ICREACH, the government “drove a truck” through loopholes that allowed it to circumvent restrictions on retaining data about Americans. This raises a variety of legal and constitutional issues, according to Goitein, particularly if the data can be easily searched on a large scale by agencies like the FBI and DEA for their domestic investigations.

“The idea with minimization is that the government is basically supposed to pretend this information doesn’t exist, unless it falls under certain narrow categories,” Goitein said. “But functionally speaking, what we’re seeing here is that minimization means, ‘we’ll hold on to the data as long as we want to, and if we see anything that interests us then we can use it.’”

A key question, according to several experts consulted by The Intercept, is whether the FBI, DEA or other domestic agencies have used their access to ICREACH to secretly trigger investigations of Americans through a controversial process known as “parallel construction.”

Parallel construction involves law enforcement agents using information gleaned from covert surveillance, but later covering up their use of that data by creating a new evidence trail that excludes it. This hides the true origin of the investigation from defense lawyers and, on occasion, prosecutors and judges—which means the legality of the evidence that triggered the investigation cannot be challenged in court.

In practice, this could mean that a DEA agent identifies an individual he believes is involved in drug trafficking in the United States on the basis of information stored on ICREACH. The agent begins an investigation but pretends, in his records of the investigation, that the original tip did not come from the secret trove. Last year, Reuters first reported details of parallel construction based on NSA data, linking the practice to a unit known as the Special Operations Division, which Reuters said distributes tips from NSA intercepts and a DEA database known as DICE.

Tampa attorney James Felman, chair of the American Bar Association’s criminal justice section, told The Intercept that parallel construction is a “tremendously problematic” tactic because law enforcement agencies “must be honest with courts about where they are getting their information.” The ICREACH revelations, he said, “raise the question of whether parallel construction is present in more cases than we had thought. And if that’s true, it is deeply disturbing and disappointing.”

Anchukaitis, the ODNI spokesman, declined to say whether ICREACH has been used to aid domestic investigations, and he would not name all of the agencies with access to the data. “Access to information-sharing tools is restricted to users conducting foreign intelligence analysis who have the appropriate training to handle the data,” he said.

Image

Project CRISSCROSS

The roots of ICREACH can be traced back more than two decades.

In the early 1990s, the CIA and the DEA embarked on a secret initiative called Project CRISSCROSS. The agencies built a database system to analyze phone billing records and phone directories, in order to identify links between intelligence targets and other persons of interest. At first, CRISSCROSS was used in Latin America and was “extremely successful” at identifying narcotics-related suspects. It stored only five kinds of metadata on phone calls: date, time, duration, called number, and calling number, according to an NSA memo.

The program rapidly grew in size and scope. By 1999, the NSA, the Defense Intelligence Agency, and the FBI had gained access to CRISSCROSS and were contributing information to it. As CRISSCROSS continued to expand, it was supplemented with a system called PROTON that enabled analysts to store and examine additional types of data. These included unique codes used to identify individual cellphones, location data, text messages, passport and flight records, visa application information, as well as excerpts culled from CIA intelligence reports.

An NSA memo noted that PROTON could identify people based on whether they behaved in a “similar manner to a specific target.” The memo also said the system “identifies correspondents in common with two or more targets, identifies potential new phone numbers when a target switches phones, and identifies networks of organizations based on communications within the group.” In July 2006, the NSA estimated that it was storing 149 billion phone records on PROTON.

According to the NSA documents, PROTON was used to track down “High Value Individuals” in the United States and Iraq, investigate front companies, and discover information about foreign government operatives. CRISSCROSS enabled major narcotics arrests and was integral to the CIA’s rendition program during the Bush Administration, which involved abducting terror suspects and flying them to secret “black site” prisons where they were brutally interrogated and sometimes tortured. One NSA document on the system, dated from July 2005, noted that the use of communications metadata “has been a contribution to virtually every successful rendition of suspects and often, the deciding factor.”

However, the NSA came to view CRISSCROSS/PROTON as insufficient, in part due to the aging standard of its technology. The intelligence community was sensitive to criticism that it had failed to share information that could potentially have helped prevent the 9/11 attacks, and it had been strongly criticized for intelligence failures before the invasion of Iraq in 2003. For the NSA, it was time to build a new and more advanced system to radically increase metadata sharing.

A New Standard

In 2006, NSA director Alexander drafted his secret proposal to then-Director of National Intelligence Negroponte.

Alexander laid out his vision for what he described as a “communications metadata coalition” that would be led by the NSA. His idea was to build a sophisticated new tool that would grant other federal agencies access to “more than 50 existing NSA/CSS metadata fields contained in trillions of records” and handle “many millions” of new minimized records every day—indicating that a large number of Americans’ communications would be included.

The NSA’s contributions to the ICREACH system, Alexander wrote, “would dwarf the volume of NSA’s present contributions to PROTON, as well as the input of all other [intelligence community] contributors.”

Alexander explained in the memo that NSA was already collecting “vast amounts of communications metadata” and was preparing to share some of it on a system called GLOBALREACH with its counterparts in the so-called Five Eyes surveillance alliance: the United Kingdom, Australia, Canada, and New Zealand.

ICREACH, he proposed, could be designed like GLOBALREACH and accessible only to U.S. agencies in the intelligence community, or IC.

A top-secret PowerPoint presentation from May 2007 illustrated how ICREACH would work—revealing its “Google-like” search interface and showing how the NSA planned to link it to the DEA, DIA, CIA, and the FBI. Each agency would access and input data through a secret data “broker”—a sort of digital letterbox—linked to the central NSA system. ICREACH, according to the presentation, would also receive metadata from the Five Eyes allies.

The aim was not necessarily for ICREACH to completely replace CRISSCROSS/PROTON, but rather to complement it. The NSA planned to use the new system to perform more advanced kinds of surveillance—such as “pattern of life analysis,” which involves monitoring who individuals communicate with and the places they visit over a period of several months, in order to observe their habits and predict future behavior.

The NSA agreed to train other U.S. government agencies to use ICREACH. Intelligence analysts could be “certified” for access to the massive database if they required access in support of a given mission, worked as an analyst within the U.S. intelligence community, and had top-secret security clearance. (According to the latest government figures, there are more than 1.2 million government employees and contractors with top-secret clearance.)

In November 2006, according to the documents, the Director of National Intelligence approved the proposal. ICREACH was rolled out as a test program by late 2007. It’s not clear when it became fully operational, but a September 2010 NSA memo referred to it as the primary tool for sharing data in the intelligence community. “ICREACH has been identified by the Office of the Director of National Intelligence as the U.S. Intelligence Community’s standard architecture for sharing communications metadata,” the memo states, adding that it provides “telephony metadata events” from the NSA and its Five Eyes partners “to over 1000 analysts across 23 U.S. Intelligence Community agencies.” It does not name all of the 23 agencies, however.

The limitations placed on analysts authorized to sift through the vast data troves are not outlined in the Snowden files, with only scant references to oversight mechanisms. According to the documents, searches performed by analysts are subject to auditing by the agencies for which they work. The documents also say the NSA would conduct random audits of the system to check for any government agents abusing their access to the data. The Intercept asked the NSA and the ODNI whether any analysts had been found to have conducted improper searches, but the agencies declined to comment.

While the NSA initially estimated making upwards of 850 billion records available on ICREACH, the documents indicate that target could have been surpassed, and that the number of personnel accessing the system may have increased since the 2010 reference to more than 1,000 analysts. The intelligence community’s top-secret “Black Budget” for 2013, also obtained by Snowden, shows that the NSA recently sought new funding to upgrade ICREACH to “provide IC analysts with access to a wider set of shareable data.”

In December last year, a surveillance review group appointed by President Obama recommended that as a general rule “the government should not be permitted to collect and store all mass, undigested, non-public personal information about individuals to enable future queries and data-mining for foreign intelligence purposes.” It also recommended that any information about United States persons should be “purged upon detection unless it either has foreign intelligence value or is necessary to prevent serious harm to others.”

Peter Swire, one of the five members of the review panel, told The Intercept he could not comment on whether the group was briefed on specific programs such as ICREACH, but noted that the review group raised concerns that “the need to share had gone too far among multiple agencies.”
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 31 guests